Most senior teams only discover their “asset problem” when something goes wrong.
A ransomware event. A data leak. A suspicious login followed by a weekend of frantic calls.
Then someone asks a simple question that should have been easy:
“What is actually connected to our network, and who owns it?”
If the answer is a shrug, a spreadsheet, or “our vulnerability scanner shows everything,” you’re already in a vulnerable position. Not just technically. Commercially.
Because cyber insurance and Cyber Essentials (where you use it for assurance and eligibility) are both built on a shared assumption: the picture you presented of your environment is broadly true. If your picture is missing dozens of devices, old appliances, test environments, or “temporary” systems that became permanent, then the controls you believe you have may not exist where it counts.
A security breach is often survivable. A coverage dispute at the same moment you’re trying to recover can be existential.
This article isn’t about scaring people with worst-case headlines. It’s about one practical point that keeps showing up in real incidents:
If you can’t account for your entry points, you can’t credibly claim you manage patching, configuration, access, and malware protection across the estate.
And that becomes a problem when someone external—an assessor, an incident responder, or an insurer—starts asking for evidence.
Most organisations don’t set out to misrepresent anything. What happens is more mundane.
None of those feel like a board-level decision. But each can create a real entry point into your network.
Now layer in two realities:
When your Configuration Management Database (CMDB) is incomplete, you are not just missing “assets.” You are missing:
In that context, “we patch” becomes “we patch what we can see.”
That difference matters during underwriting, during certification, and during a claim review.
A common failure mode looks like this:
But discovery is not certainty.
Tools miss things for very ordinary reasons:
And even when a tool does see something, it often doesn’t answer the questions a senior team needs answered fast:
That’s CMDB territory. A vulnerability tool is a sensor. The CMDB is the map.
If you rely on a single sensor to define your entire map, you will have blind spots.
Cyber Essentials is frequently treated as a once-a-year exercise. Answer the questions, pass the assessment, file the certificate.
But the scheme is built on the idea that baseline controls are applied across the in-scope environment: firewalls, secure configuration, access control, malware protection, and security update management.
In practice, the question that causes trouble is not “do you have a policy?” It’s:
“Can you prove your baseline controls apply to the systems that matter?”
If the CMDB is incomplete, two things happen:
Even if your intentions are good, the gap between your attestation and your reality is where risk lives.
The UK Government National Cyber Security Centre (NCSC) offers clear guidance both in their free to download Cyber Essentials: Requirements for IT Infrastructure PDF and on the Government National Cyber Security website
To quote the NCSC:
“Effective asset management doesn’t mean making lists or databases that
are never used. It means creating, establishing and maintaining
authoritative and accurate information about your assets that enables
both day-to-day operations and efficient decision making when you need
it. In particular, it will help you track and control devices as they'reintroduced into your business.”
“You must make sure that all software in scope is kept up to date. All software on in-scope devices must:
• be licensed and supported
• be removed from devices when it becomes unsupported, or removed from scope by using a defined sub-set that prevents all traffic to or from the internet
• have automatic updates enabled where possible
• be updated, including vulnerability fixes, within 14 days of release, where:
An accurate CMDB is not a perfect inventory of every cable and monitor.
It’s a trusted record of the Configuration Items (CIs) that represent:
Accuracy is not a vague concept. It is measurable. A useful definition for senior teams is:
A CMDB is accurate when it is complete enough to support control claims (patching, configuration, access) and fast enough to support incident decisions (impact, isolation, restoration).
That requires four things:
1) Coverage (what you know exists)
You need reconciliation from multiple sources, not just one tool: directory services, endpoint management, network discovery, cloud accounts, procurement records, certificate logs, and service desk records.
2) Correctness (what the thing actually is)
Deduplicate, normalise, and reconcile naming. “SVR-01”, “Server01”, and “ProdFile1” can’t be three separate truths.
3) Ownership (who is responsible)
Every CI needs an accountable owner (not “IT”). For security, you also need an operational owner who can patch, approve downtime, and accept exceptions.
4) Relationships
A device record without service and dependency relationships is a list, not a CMDB. In an incident you need: what does this system support, and what breaks if we isolate it?
This is where many CMDB initiatives fail: they focus on populating records, not on making the data operational.
After a significant incident, insurers and their appointed partners often ask for evidence that goes beyond “we have a policy.” They ask for operational proof.
Examples include:
If your CMDB cannot quickly produce a defensible list of what exists and what is in scope, then producing coherent evidence becomes slower and riskier.
This is where avoidable statements creep into a crisis:
Those statements don’t just hurt recovery. They complicate the narrative around what you represented about your controls.
Under UK law, UK Insurance Act states:
“(1) Before a contract of insurance is entered into, the insured must make to the insurer a fair presentation of the risk.
(2) The duty imposed by subsection (1) is referred to in this Act as “the duty of fair presentation”.
(3) A fair presentation of the risk is one
(a) which makes the disclosure required by subsection (4),
(b) which makes that disclosure in a manner which would be reasonably clear and accessible to a prudent insurer, and
(c) in which every material representation as to a matter of fact is substantially correct, and every material representation as to a matter of expectation or belief is made in good faith.
(4) The disclosure required is as follows, except as provided in subsection (5)—
(a) disclosure of every material circumstance which the insured knows or ought to know, or
(b) failing that, disclosure which gives the insurer sufficient information to put a prudent insurer on notice that it needs to make further enquiries for the purpose of revealing those material circumstances.”
In simple terms, unless you declared that you do not have the ability to secure your environment because you do not have visibility of you IT landscape at the time you took out the policy, your insurer was not aware of the risk they were covering and therefore you are potentially not insured because as the law states “Before a contract of insurance is entered into, the insured must make to the insurer a fair presentation of the risk.”
If you want to know whether your “we’re insured” posture is built on solid ground, test the CMDB with questions a breach will force anyway:
If your current systems can’t answer these questions quickly and consistently, it doesn’t mean you are “bad at security.” It means you are operating without a reliable map.
Apex’s work here is practical and operational. We focus on turning CMDB data into something you can use during assurance and during incidents.
Apex mechanism #1: CMDB accuracy baseline (measured, not assumed)
We establish an evidence-based baseline of CMDB quality using multiple authoritative sources. Typical measures include:
Apex mechanism #2: Data quality fixes that stick (deduplicate, normalise, reconcile)
We implement rules and automation so the CMDB improves every day, not just during a project:
Apex mechanism #3: Operating model and change gates (so the CMDB stays true)
We put in place a lightweight operating model:
Apex mechanism #4: Incident and service impact integration (faster, safer decisions)
We ensure the CMDB is relevant and meanigful to incident and change processes so you can:
This is not “CMDB for CMDB’s sake.” It’s configuration data that supports assurance, resilience, and claim defensibility.
If you want a pragmatic way to start, here’s an approach that doesn’t require a massive programme.
Step 1: Define “in scope” and “must be true”
Step 2: Reconcile from multiple sources
Step 3: Fix the high-risk 20%
Step 4: Put the operating model in place
By the end, you should have a CMDB that is materially more accurate where it matters most.
FAQ 1: Does a breach prove we didn’t do patch management?
No. A breach can happen for many reasons. The issue is whether your evidence supports the controls you declared, and whether unpatched, in-scope systems existed outside your visibility.
FAQ 2: Isn’t our vulnerability scanner enough?
A scanner is an important input, not the source of truth. It can miss segmented systems, remote endpoints, appliances, and anything outside its coverage. A CMDB reconciles multiple sources and adds ownership and relationships.
FAQ 3: What’s the difference between an asset register and a CMDB?
An asset register lists things you own. A CMDB models configuration items and their relationships to services, changes, incidents, and risk. That relationship view is what supports impact analysis and recovery decisions.
FAQ 4: How do we prove CMDB accuracy to auditors or insurers?
By showing reconciliation: multiple authoritative sources mapped to CMDB records, plus governance that keeps records current (change gates, ownership assignment, audits, and exception handling).
FAQ 5: We have “exceptions” we can’t patch. Is that a deal-breaker?
Not necessarily. What matters is that exceptions are known, owned, risk-assessed, time-bound, and reviewed—rather than invisible and unmanaged.
Want to know whether your CMDB is creating insurance and Cyber Essentials risk?
Apex runs a CMDB Accuracy & Exposure Baseline that compares what exists in your environment to what your CMDB says exists, and produces a short, board-ready action plan (coverage gaps, unowned entry points, and the top fixes that reduce exposure fastest).
Book a 30-minute “CMDB blind spot review” (we’ll tell you what to pull and what we’ll measure).