Skip to Content
← Back to Articles

Asset Tagging and Serial Number Tracking: Building a Defensible Hardware Inventory from the Ground Up

In 2023, a mid-size healthcare organization suffered a breach traced back to a decommissioned laptop that never made it to the e-waste vendor. It was still on the network, unpatched for eleven months, and completely absent from their asset inventory. The uncomfortable truth is that you cannot secure what you cannot see—and most organizations have far more ghost assets than they want to admit.


Why Serial-Number-Level Tracking Matters

Asset tagging goes beyond slapping a barcode on a laptop lid. At a security level, tying every endpoint, switch, server, and peripheral to a unique serial number creates an authoritative source of truth that feeds into vulnerability management, incident response, access control, and compliance reporting.

Frameworks like NIST CSF (ID.AM-1, ID.AM-2) and CIS Control 1 explicitly require organizations to maintain an accurate inventory of hardware assets. Without serial-number-level granularity, you are essentially flying blind when answering questions like: "Was this device authorized? When was it provisioned? Who had custody when the incident occurred?"

Establishing Your Tagging Schema

Before deploying a single tag, define a naming and numbering convention. A well-designed schema encodes useful metadata without becoming unwieldy.

A practical pattern:

[SITE]-[TYPE]-[YEAR]-[SEQ]
Example: NYC-LT-2024-0387
Code Meaning
NYC New York City office
LT Laptop
2024 Year of procurement
0387 Sequential number

Pair this internal tag with the OEM serial number in your CMDB. The internal tag is your controlled identifier; the OEM serial is your manufacturer-correlated proof of provenance.

Automated Discovery and Serial Number Collection

Manual spreadsheets decay immediately. Automate collection using tools you likely already have.

Windows (PowerShell via Intune or SCCM):

Get-CimInstance -ClassName Win32_BIOS | Select-Object SerialNumber, Manufacturer
Get-CimInstance -ClassName Win32_ComputerSystem | Select-Object Model, Name

Linux (Ansible fact gathering across a fleet):

- name: Collect serial numbers
  hosts: all
  tasks:
    - name: Grab DMI serial
      command: dmidecode -s system-serial-number
      register: serial_output
    - debug:
        msg: '{{ inventory_hostname }}: {{ serial_output.stdout }}'

Network equipment (Cisco IOS):

show inventory
show version | include Processor board ID

Feed these outputs into your CMDB—ServiceNow, Snipe-IT, or even a well-structured PostgreSQL database—via scheduled jobs or webhook integrations.

Lifecycle Governance: From Receiving Dock to Disposal

Tracking is only valuable if it spans the full lifecycle. Define mandatory checkpoints:

  1. Procurement: PO is linked to serial numbers upon receiving. Photograph the asset tag affixed to the device.
  2. Provisioning: The device is enrolled in your MDM/EDR. Serial number is validated against the CMDB record.
  3. Assignment: Custodian (user) is mapped to the asset. This is critical for chain-of-custody during investigations.
  4. Transfer/Repair: Every custody change triggers a CMDB update with timestamp and approver.
  5. Decommission: Disk wipe is verified (certificate of destruction logged against the serial number), and physical disposal is confirmed with the vendor's manifest.

Auditing and Drift Detection

Schedule quarterly reconciliation. Compare your CMDB against live network discovery scans (Nmap, Rumble/runZero, or Qualys asset inventory) to identify two categories of drift:

  • Ghosts: Assets in the CMDB but absent from the network (potentially lost or stolen).
  • Rogues: Assets on the network but absent from the CMDB (potentially unauthorized).
# Simple diff between CMDB export and network scan results
comm -23 <(sort cmdb_serials.txt) <(sort discovered_serials.txt) > ghost_assets.txt
comm -13 <(sort cmdb_serials.txt) <(sort discovered_serials.txt) > rogue_assets.txt

Both lists demand immediate investigation.

Final Takeaway

Asset tagging and serial number tracking is not an IT housekeeping task—it is a foundational security control. Every untagged, untracked device is a potential blind spot in your detection pipeline, a gap in your compliance posture, and a liability during incident response. Start with a clear schema, automate collection ruthlessly, enforce lifecycle governance, and audit for drift. The organizations that do this well do not just pass audits—they respond to incidents faster and with defensible evidence.


Have questions about asset tagging and serial number tracking? I'm always happy to talk shop — reach out or connect with me on LinkedIn.

← Back to Articles