IT Asset Inventory Management Checklist
Asset Identification
Pull the current asset register from Intune, Jamf, or your MDM. Capture laptops, servers, network gear, MFPs, and any device that processes nonpublic personal information under GLBA. Printers handling claim packets count — Part 500 §500.11 vendor-risk scope is broader than IT-only.
List all policy admin, AMS, claims, rating, and document systems — Applied Epic, AMS360, EZLynx, PolicyCenter, ClaimCenter, ImageRight, SERFF, NIPR. Include shadow-IT SaaS surfaced by the CASB. Note whether each system stores NPI; that designation drives downstream risk-tier work.
Assign a stable asset ID that survives reimaging and OS reinstalls. Match the convention used by the CMDB so the inventory reconciles cleanly against ServiceNow or Jira tickets.
Owner is the business accountable party (e.g., Commercial Lines Manager); custodian is the technical holder (e.g., IT Ops). Producers using personal devices for binding or quoting need explicit BYOD designation here.
Tier assets High / Medium / Low based on volume and type of NPI processed. Health data on stop-loss or group dental systems pulls in HIPAA scope on top of GLBA. Upload the classified register for the audit trail.
Inventory Tracking
Cross-check Intune/Jamf-enrolled devices against active Applied Epic, AMS360, or EZLynx user sessions. Departed producers whose devices remain enrolled or whose AMS accounts remain active are the most common finding in a Part 500 audit.
Each disposal needs a certificate of destruction with serial numbers — drives that held NPI cannot be donated or resold without sanitization meeting NIST SP 800-88 standards.
True up rater, AMS, and document-management seat counts. Over-licensing wastes budget; under-licensing surfaces during a vendor audit and can jeopardize the renewal terms.
Configure the SIEM to alert on MFA disablement, encryption-policy rollback, or unenrollment from MDM. Part 500 §500.12(b) requires MFA for any external network access — silent disablement is a reportable cybersecurity event.
Vendor-risk scope includes TPAs, claims vendors, document destruction firms, and any printer or mailhouse handling claim packets. SOC 2 Type II reports must be current — expired reports are a common finding.
Risk Management
Run the threat model against assets tagged High in the classification step. Part 500 expects risk assessments to be ongoing, not just biennial — material changes (new product, M&A, major vendor) trigger an interim assessment.
Walk the encryption inventory: BitLocker on laptops, TLS 1.2+ on carrier portals, encrypted backups. Document any exception with compensating controls — Part 500 §500.15 allows exceptions only with CISO-approved alternative controls.
Confirm RTO/RPO targets for PolicyCenter, ClaimCenter, and the AMS. Loss runs and ACORD-form generation must be recoverable within the binding-authority service window — a 72-hour outage during renewal season is a producer-relations problem, not just an IT one.
Check that the asset register matches the Statement of Values endorsed on the firm's cyber and inland marine policies. New servers added mid-term without a property endorsement create a gap at first-party recovery.
A finding is a control gap that needs a remediation plan; a cybersecurity event under §500.1(g) is an actual or suspected unauthorized access — that triggers the 72-hour DOI notification clock.
File each finding as a tracked ticket with an owner and target close date. Open findings without owners are the single most-cited weakness in DOI examiner reports.
NYDFS Part 500 and the NAIC Insurance Data Security Model Law both require notification within 72 hours of determining a cybersecurity event has occurred. Do not default to GLBA's looser timeline or the HIPAA 60-day window — the state DOI clock is the binding one. Attach the filing confirmation.
Compliance and Reporting
Tie each High-tier asset to the corresponding control in the firm's Written Information Security Program. GLBA Safeguards Rule expects a documented linkage between asset, risk, and control — not just a control list.
Retention runs 5–7 years for most policy and claim records; workers comp can require life-of-claim retention given lifetime medical exposure. Premature destruction creates discoverable spoliation risk in litigation.
Include asset counts by tier, open findings, vendor SOC 2 status, and license-vs-seat reconciliation. The CISO uses this packet for the annual board certification under Part 500 §500.17(b).
Cover device-loss reporting (24-hour internal SLA), NPI handling on the AMS, and the standard for OFAC screening at claim payment. New producers and CSRs get this in Week 1; everyone refreshes annually.
Technology Integration
One source of truth — pick ServiceNow, Jira Assets, or the AMS's asset module and make the others read-only views. Dual-write CMDBs are the second-most-common cause of reconciliation drift after manual spreadsheets.
Surface dormant rater, AMS, and DocuSign seats. Reclaim before renewal — most carrier and SaaS contracts allow seat reductions only at the anniversary.
Independent producers working from home laptops or tablets must enroll in MDM before they touch the AMS. Personal-device exceptions need explicit CISO sign-off and compensating controls under §500.15.
Any new SaaS that touches NPI needs a vendor risk review before procurement signs the order — SOC 2 Type II, breach history, sub-processor list, MFA on admin access. Procurement-led signings without security review are a recurring exam finding.
Use this template in Manifestly
- Annual Insurance Review Checklist
- Risk Management Checklist
- Commercial Policy Renewal Checklist
- Customer Inquiry Checklist
- Insurance Compliance Checklist
- Cyber Security Checklist
- Claims Investigation Checklist
- Complaint Resolution Checklist
- Financial Audit Checklist
- Data Security Checklist
- Risk Mitigation Checklist
- Customer Service Request Handling Checklist
- Disaster Recovery Checklist
- Policy Renewal Checklist
- Customer Retention Checklist
- Policy Issuance Checklist
- Sales Proposal Checklist
- Claims Auditing Checklist
- Policy Cancellation Checklist
- Customer Onboarding Checklist
- Insurance Training and Development Checklist
- Anti-Money Laundering Checklist
- Training Evaluation Checklist
- Insurance Producer Performance Review
- Cybersecurity Incident Response Checklist
- Office Opening Checklist
- Training Needs Assessment Checklist
- Insurance Committee Meeting Planning Checklist
- Skills Development Checklist
- Audit Preparation Checklist
- Network Security Checklist
- Premium Billing and Collection Checklist
- Annual Budgeting Checklist
- Financial Reporting Checklist
- Insurance Agency Lead Generation Checklist
- Compliance Audit Checklist
- Commercial Underwriting Checklist
- Policyholder Feedback Cycle
- Insurance Project Planning Checklist
- Tax Compliance Checklist
- Insurance Agency Office Closing Checklist
- Client Engagement Checklist
- Data Protection Checklist
- Insurance Agency Employee Onboarding
- Enterprise Risk Assessment Checklist
- Training Materials Checklist
- Anti-Fraud Checklist
- Policy Endorsement Checklist
- Quarterly Risk Monitoring Checklist
- Expense Management Checklist
- Insurance IT Security Review Checklist
- Insurance Account Cross-Sell Checklist
- Insurance Project Closure Checklist
- Insurance Marketing Campaign Checklist
- Statutory Financial Reporting Checklist
- Claim Processing Checklist
- Policy Administration Checklist
- Cybersecurity Protocol Checklist
- Cybersecurity Checklist for Real Estate
- Manufacturing Cybersecurity Checklist
- Cyber Security Checklist
- Data Security Checklist
- Disaster Recovery Checklist
- Cybersecurity Incident Response Checklist
- Network Security Checklist
- Insurance IT Security Review Checklist
- Data Security Review Checklist
- Cybersecurity Risk Assessment Checklist
- Financial Services IT Security Audit Checklist
- Cybersecurity Incident Response Checklist
- Motor Carrier Cybersecurity Protocol Checklist
- Risk Management Checklist
- Regulatory Compliance Checklist
- Quarterly Internal Control Review Checklist
- Sales Tax Reporting Checklist
- Legal Entity Management Checklist
- Employee File Audit Checklist
- Anti-Money Laundering Compliance Checklist
- SOX Compliance Checklist
- GDPR Compliance Review Checklist
- IT Security Audit Checklist
- HR Compliance Checklist
- Payroll Processing Checklist
- Building Code Compliance Checklist
- Employee Records Management Checklist
- Legal Document Storage Checklist
- Security Audit Checklist
- Property Risk Assessment Checklist
- Property Safety Inspection Checklist
- Cybersecurity Protocol Checklist
- Fair Housing Compliance Checklist
- Legal Compliance Checklist for New Properties
- Lease Agreement Checklist
- Software Licensing Compliance Checklist
- PCI DSS Compliance Checklist
- Real Estate Legal Compliance Checklist
- HIPAA Compliance Checklist
- MLS Listing Review Checklist
- Real Estate License Renewal Checklist
- GDPR Compliance Checklist
- Real Estate Contract Review Checklist
- Fair Housing Compliance Audit
- Listing Agreement Intake Checklist
- ISO/IEC 27001 Compliance Checklist
- HR Compliance Checklist
- Real Estate Ethics & Compliance Review
- Brokerage Trust Account Management Checklist
- Real Estate Professional Development Checklist
- Brokerage Technology Inventory Audit
- Real Estate Website Audit Checklist
- Continuing Education Checklist
- Employee Termination Checklist
- Employee Records File Audit
- Regulatory Compliance Checklist
- Brokerage HR Policy Compliance Checklist
- Employee Handbook Annual Review
- Employee Termination Checklist
- Data Privacy Compliance Checklist
- Risk Management Checklist
- Insurance Compliance Checklist
- Complaint Resolution Checklist
- Financial Audit Checklist
- Data Security Checklist
- Risk Mitigation Checklist
- Claims Auditing Checklist
- Quarterly Industry Standards Compliance Review
- Insurance Training and Development Checklist
- Anti-Money Laundering Checklist
- Training Evaluation Checklist
- Manufacturing Regulatory Compliance Checklist
- Training Needs Assessment Checklist
- Skills Development Checklist
- Audit Preparation Checklist
- Network Security Checklist
- Employee Offboarding Checklist
- Regulatory Reporting Checklist
- Compliance Audit Checklist
- Insurance Program Initiation Checklist
- Insurance Program Launch Project Monitoring Checklist
- Training Materials Checklist
- Quarterly Risk Monitoring Checklist
- System Backup Checklist
- Employee Benefits Checklist
- Insurance Program Launch Execution Checklist
- Insurance Marketing Campaign Checklist
- Email Compliance Checklist
- Law Firm Compliance Checklist
- Anti-Money Laundering Compliance Checklist
- Law Firm Compliance Checklist
- Professional Responsibility Compliance Review
- Data Privacy Compliance Checklist
- Law Firm Risk Management Checklist
- HR Audit Checklist
- HR Compliance Checklist
- Email Deliverability Checklist
- Law Firm Ethics Compliance Review
- Document Retention Policy Checklist
- Employee File Audit Checklist
- Law Firm Risk Management Checklist
- Cloud Security Checklist
- User Access Review Checklist
- IT Regulatory Compliance Review
- Compliance Audit Checklist
- Security Audit Checklist
- Business Continuity Checklist
- Employee Termination Checklist
- Quarterly Operations and Compliance QA Review
- Expense Management Checklist
- Advisor and Employee Onboarding Checklist
- Client Satisfaction Survey Checklist
- Operational Risk Checklist
- Know Your Customer (KYC) Checklist
- Litigation Preparation Checklist
- Contract Review Checklist
- New Hire Onboarding Checklist
- Client Onboarding Checklist
- Contract Review Checklist
- Regulatory Compliance Checklist
- Monthly Financial Reporting Checklist
- Regulatory Reporting Checklist
- Intellectual Property Management Checklist
- Internal Audit Checklist
- Lead Generation Checklist
- Annual Financial Reporting Checklist
- Annual Compliance Program Review
- Annual Risk Assessment Checklist
- Data Security Review Checklist
- Quarterly Performance Measurement Checklist
- Financial Services Project Initiation Checklist
- IT Policy Review Checklist
- Data Protection Checklist
- E-commerce Sales Tax Reporting Checklist
- Project Execution Checklist
- Project Planning Checklist
- Project Monitoring Checklist
- Financial Statement Review Checklist
- Quarterly Compliance Monitoring Checklist
- Cybersecurity Risk Assessment Checklist
- Project Closure Checklist
- Financial Services IT Security Audit Checklist
- PCI DSS Compliance Checklist
- Advisor and Staff Onboarding Checklist
- Cybersecurity Incident Response Checklist
- E-commerce Risk Management Checklist
- CRM Data Entry Checklist
- Business Continuity Plan Checklist
- E-commerce Legal Compliance Checklist
- Vendor Contract Review Checklist
- Annual Risk Management Review Checklist
- Risk Assessment Checklist
- Agency Compliance and Risk Management Checklist
- Annual School Compliance Audit
- School First Aid and Emergency Medication Audit
- Motor Carrier TSA Security Compliance Checklist
- Internal Controls Checklist
- Client Communication Checklist
- Restaurant Permit and Licensing Renewal Checklist
- New Hire Paperwork Checklist
- Restaurant Policy Update Checklist
- Restaurant New Hire Checklist
- Annual Attorney Professional Conduct Review
- International Fuel Tax Agreement (IFTA) Quarterly Filing Checklist
- Restaurant Licensing Renewal Checklist
- Marketing Strategy Checklist
- Department of Transportation (DOT) Audit Checklist
- Retail Policy Update and Compliance Checklist
Ready to take control of your recurring tasks?
Start Free 14-Day TrialUse Slack? Sign up with one click
