The Assets module in LowerPlane provides a centralized inventory of your organization’s technology assets and their associated vulnerabilities. Assets are discovered automatically through connected integrations or added manually, giving you a complete picture of your attack surface for compliance purposes.

Why Asset Management Matters

Every major compliance framework requires organizations to maintain an inventory of information assets and manage vulnerabilities:
FrameworkAsset Management Requirements
ISO 27001A.8.1 (Inventory of assets), A.8.2 (Classification of information)
SOC 2CC6.1 (Logical and physical access to assets), CC3.1 (Risk identification)
HIPAA164.310 (Workstation and device controls), 164.312 (Technical safeguards)
GDPRArticle 30 (Records of processing activities), Article 32 (Security measures)
PCI-DSSReq 2 (System inventory), Req 6 (Vulnerability management), Req 11 (Regular testing)

Asset Types

LowerPlane tracks four categories of assets:

Cloud Resources

Virtual machines, databases, storage buckets, load balancers, serverless functions, and other infrastructure provisioned in cloud providers like AWS, Azure, and GCP.

Endpoints

Employee workstations, laptops, and mobile devices. Discovered through MDM integrations (Jamf, Intune, Kandji) and endpoint protection tools (CrowdStrike, SentinelOne).

Servers

Physical and virtual servers running in your data centers or cloud environments. Includes web servers, application servers, database servers, and infrastructure services.

Applications

Software applications your organization uses or operates. Includes SaaS tools, internal applications, and customer-facing services.

Asset Discovery

Assets enter LowerPlane through two channels:

Automatic Discovery via Integrations

When you connect cloud providers, MDM tools, or endpoint protection platforms, LowerPlane automatically discovers and imports assets:
  • AWS / Azure / GCP — Discovers EC2 instances, VMs, databases, storage, networking, and other cloud resources
  • CrowdStrike / SentinelOne — Discovers endpoints with protection agent installed
  • Jamf / Intune / Kandji — Discovers managed devices from your MDM platform
  • Snyk / Wiz — Discovers applications and repositories under security scanning
Discovered assets sync on the same schedule as their source integration and update automatically.

Manual Entry

For assets not covered by integrations (physical servers, legacy systems, or specialized hardware), you can add them manually from the Assets page.
Start with automatic discovery through integrations and supplement with manual entries for anything not covered. This approach gives you the most complete inventory with the least ongoing maintenance.

Asset Details

Each asset record contains:
FieldDescription
NameDisplay name for the asset
TypeCloud resource, endpoint, server, or application
SourceIntegration that discovered it, or “Manual”
OwnerPerson or team responsible for the asset
StatusActive, inactive, or decommissioned
Compliance statusWhether the asset meets applicable compliance requirements
VulnerabilitiesCount and severity of known vulnerabilities
Last seenWhen the asset was last detected by an integration sync

How Assets Support Compliance

Assets tie into LowerPlane’s compliance engine in several ways:
  1. Evidence generation — Asset inventory exports serve as evidence for asset management controls across all frameworks.
  2. Vulnerability tracking — Vulnerabilities discovered on assets are tracked and linked to remediation controls.
  3. Test evaluation — Automated tests verify that assets meet security requirements (encryption enabled, protection agent installed, etc.).
  4. Risk assessment — Asset data feeds into risk calculations, helping prioritize remediation by business impact.
Assets that are no longer detected by integration syncs may become stale. Review assets with old “last seen” dates periodically to determine whether they have been decommissioned or if the integration needs attention.

Next Steps

Asset Inventory

Browse, filter, and manage your complete asset inventory.

Vulnerabilities

Track and remediate vulnerabilities across your asset inventory.