SOT

SOT

SOAR
Security Orchestration, Automation and Response

Automation of response to information security incidents using dynamic playbooks and information security tools, building an attack chain and with an object-oriented approach

NG SOAR
Next Generation SOAR

Automation of response to information security incidents with built-in basic correlation (SIEM), vulnerability Scanner (VS), collection of raw events directly from information security tools, dynamic playbooks, building an attack chain and an object-oriented approach. AM and VM are included

AM
Asset Management

Description of the IT landscape, detection of new objects on the network, categorization of assets, inventory, life cycle management of equipment and software on automated workstations and servers of organizations

VS
Vulnerability Scanner

Scanning information assets with enrichment from any external services (additional scanners, The Data Security Threats Database and other analytical databases) to analyze the security of the infrastructure.

VM
Vulnerability Management

Building a process for detecting and eliminating technical vulnerabilities, collecting information from existing security scanners, update management platforms, expert external services and other solutions

FinCERT
Financial Computer Emergency Response Team

Bilateral interaction with the Central Bank, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator

GovCERT
Government Computer Emergency Response Team

Bilateral interaction with the state coordination center for computer incidents, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator

Mail us to sales@securityvision.ru or get demo presentation

From asset chaos to service harmony

From asset chaos to service harmony
16.02.2026

Ruslan Rakhmetov, Security Vision


A century ago, to get from one point in the city to another, a person needed to buy a horse, feed it, treat it, and keep it somewhere. But today, we open an app on our smartphone, press a button, and a car is waiting at our door in three minutes. We don't have to worry about changing our oil, paying insurance, or finding a parking space (well, almost). We consume a mobility service, not a car as an asset, and the same is happening in the world of technology. Google's gigantic data centers and banking systems are absolutely identical to the principles by which a prudent homeowner manages their home, car, or even their wardrobe. Behind the apparent simplicity lies a colossal engineering and management machine: for a taxi service to run like clockwork, someone has to manage thousands of cars, the servers running the app, the communication channels, and the payment gateways.


In this review, we will tell you how the digital world is structured and how to bring order to it using the example of IT Asset Management (ITAM) and the logic of the resource-service model (RSM).

 

1.  Assets

2.  Configuration units

3.  Resources

4.  Services

5.  Resource-service model

6.  Control and security

 

In a professional IT Service Management environment ITSM has a strict hierarchy of concepts that often causes confusion even among specialists. To the average person, these terms may seem synonymous, but the difference between them is enormous, so let's first examine the main aspects of this field.

 

1. Assets


An asset, in the broadest sense, is any resource that can be used to create value (this is an economic concept). It's something you own, something that's worth money, and something you expect to put to good use. Assets are described from three perspectives: finances, regulations, and how they are managed. In the context of an IT company, assets include servers, employee laptops, software licenses, patents, and even office furniture.


When you buy a car for 2 million rubles, it becomes your asset: it has residual value, you can sell it, and it depreciates (loses value) each year (this is the financial aspect). You receive a vehicle title, confirming your ownership (the legal aspect). You also pay taxes, purchase insurance, and are responsible for its maintenance (the management aspect).

 

2. Configuration units


A configuration item is the most difficult term to understand, but it's critical to the Resource-Service Model. It's any component that needs to be managed to provide an IT service. While an asset might describe money and property, a configuration item answers the question, "What is it connected to and how is it configured?" and describes its connections and functionality.


For the company's accounting department, a corporate smartphone is Asset #12345, valued at 50,000 rubles. They care about you not losing it. But for tech support, your smartphone is KE. They don't care about its price, but they do care about what version of Android it runs, what Wi-Fi network it's connected to, and what apps are installed. If you can't access your corporate email, the problem isn't the phone's price (Asset), but its settings.

 

3. Resources


A resource is a broader concept that includes everything necessary to complete a task, but is not necessarily subject to strict financial accounting as a fixed asset. Resources can be consumable. In information technology, resources include processor processing power, hard drive space, internet bandwidth, and other measurable characteristics.


If your car is an asset, then the gas in the tank, oil, and antifreeze are resources. You don't account for each liter of gas as a separate asset; you simply spend it. The water in your apartment's tap is also a good example of a resource, as is your free time (perhaps the most valuable asset anyone has).

 

4. Services


A service is the pinnacle of consumption evolution. According to ITIL 4 (a set of IT management best practices), it is a way to deliver value to customers by helping them achieve their desired results without incurring specific costs and risks. In IT, an example of a service that everyone likely uses is email. The user simply needs to send an email; there's no need to purchase a server, install an operating system, configure spam filters, or ensure server room cooling. The IT department or provider (for example, Google) handles all of this. or Yandex).


When you order pizza, the goal is to satisfy your hunger with delicious food. You don't need to buy a pizza oven (an asset), you don't need to learn how to roll out dough (a skill/resource), and you don't need to risk burning your hands. You delegate all of this to the pizzeria and use the service through your smartphone screen without any additional risks. You pay only for the result—a box of hot pizza delivered to your door. That's service.

 

5. Resource-service model


Now that we've defined the terms, we can construct a Resource-Service Model, a logical map that shows how all the objects and concepts are connected to form a Service. It's like an anatomical atlas: we see not just a person (a service), but also the skeleton, muscles, and circulatory system (resources) and understand how they interact (through the configuration units of organ systems).


Let's imagine the company's PCM as a layer cake.

  а)  The infrastructure layer will include hardware, cables, buildings, electricity.

  b)  Platform and application layer – consists of software, databases, operating systems.

  c)  The business process layer links the actions of people using applications and is responsible for automation.

  d)  The service layer is the final benefit for the client.  

 

Understanding the PCM changes your thinking because you can stop seeing things in isolation. When renovating, you think not just about pretty outlets, but about how many appliances will be connected to them and where the router will be located to ensure Wi-Fi coverage throughout the apartment (topology planning). When buying a smart kettle, you understand that it depends not only on electricity but also on Wi-Fi, the manufacturer's servers, and the risks involved (for example, if the manufacturer's Chinese server crashes, the kettle may no longer be able to turn on from a smartphone).


So the resource-service module, built using the Security Vision AM module allows you to find all assets, sort them into categories, and plan the life cycle from planning and acquisition to commissioning, maintenance, modernization, and completion of the cycle through decommissioning.

 

6. Control and security


If you don't know what you have, you can't protect it. In the tech world, inventory management helps combat entropy and "parasites" in the form of shadow assets. These could be "zombie" servers that are running, consuming electricity, requiring licenses, but performing no useful work (they're forgotten after the project ends). Statistics show that up to 30% of servers in data centers may be unused.


At home, these are things you forgot about: buying a new pack of batteries because you didn't realize there were two more in the back drawer, buying a book a second time. And imagine banning your kids from eating sweets, only to have them sneak into their room and eat them under the covers. This is "Shadow Consumption." At the company, the system administrator prohibits the use of Dropbox for work files (for security reasons). Employees feel inconvenienced, so they secretly start sending reports via their personal Telegram, creating a new risk: data leakage. If an employee's personal Telegram is hacked, company secrets will leak. Asset management identifies such "guerrilla" channels and either legalizes them (takes control) or blocks them.


To regularly inventory security, you can, of course, walk around with a barcode scanner and "pick" stickers on laptops. However, specialized services can scan the network and automatically map all connected devices. It's best to do this so the system not only tracks assets but also evaluates their resources, organizes them into configuration units, and links them all with services for risk and benefit assessment, which we'll discuss in more detail in a future article.


This isn't boring bureaucracy for IT professionals, but a true philosophy of order and a way of seeing the world not as a collection of disparate objects, but as a system of interconnected elements serving a single purpose—to benefit people.


Whether it's managing a fleet of tens of thousands of servers for a multinational corporation or organizing a household, the laws are the same:

  1)  Know what you own, take inventory

  2)  Understand relationships, topology, and dependencies

  3)  Calculate the full cost

  4)  Manage your lifecycle

  5)  Manage risks, maintenance, and safety of facilities


By mastering these principles, you'll stop being a passive consumer, baffled by technology breakdowns, and become the architect of your own comfort, capable of building reliable systems in an uncertain world. And we can help you with this when it comes to corporate IT systems and cybersecurity.

Recommended

The two pillars of Linux monitoring
The two pillars of Linux monitoring
Antifraud systems - what is it and how does it work
Antifraud systems - what is it and how does it work
Bad advice on automation
Bad advice on automation
Secure development without barriers: How to build an SSDLC that actually works
Secure development without barriers: How to build an SSDLC that actually works
Cybersecurity incident response scenarios. Part 2: runbooks, playbooks, dynamic scripts
Cybersecurity incident response scenarios. Part 2: runbooks, playbooks, dynamic scripts
Comparative Review: Shodan, ZoomEye , Netlas , Censys , FOFA and Criminal IP. Part 3
Comparative Review: Shodan, ZoomEye , Netlas , Censys , FOFA and Criminal IP. Part 3
Autonomous approach to SOC: applying SRE lessons to Security Operation Center
Autonomous approach to SOC: applying SRE lessons to Security Operation Center
Configuration-as-Code
Configuration-as-Code
Phishing - what is it, how to protect yourself from phishing attacks and emails. Part 2
Phishing - what is it, how to protect yourself from phishing attacks and emails. Part 2
Application of symmetric and asymmetric encryption algorithms
Application of symmetric and asymmetric encryption algorithms
Incident management and orchestration of various SPIs. NG SOAR Review
Incident management and orchestration of various SPIs. NG SOAR Review
Next Generation Firewall (NGFW) – what is it and what does it protect against
Next Generation Firewall (NGFW) – what is it and what does it protect against

Recommended

The two pillars of Linux monitoring
The two pillars of Linux monitoring
Antifraud systems - what is it and how does it work
Antifraud systems - what is it and how does it work
Bad advice on automation
Bad advice on automation
Secure development without barriers: How to build an SSDLC that actually works
Secure development without barriers: How to build an SSDLC that actually works
Cybersecurity incident response scenarios. Part 2: runbooks, playbooks, dynamic scripts
Cybersecurity incident response scenarios. Part 2: runbooks, playbooks, dynamic scripts
Comparative Review: Shodan, ZoomEye , Netlas , Censys , FOFA and Criminal IP. Part 3
Comparative Review: Shodan, ZoomEye , Netlas , Censys , FOFA and Criminal IP. Part 3
Autonomous approach to SOC: applying SRE lessons to Security Operation Center
Autonomous approach to SOC: applying SRE lessons to Security Operation Center
Configuration-as-Code
Configuration-as-Code
Phishing - what is it, how to protect yourself from phishing attacks and emails. Part 2
Phishing - what is it, how to protect yourself from phishing attacks and emails. Part 2
Application of symmetric and asymmetric encryption algorithms
Application of symmetric and asymmetric encryption algorithms
Incident management and orchestration of various SPIs. NG SOAR Review
Incident management and orchestration of various SPIs. NG SOAR Review
Next Generation Firewall (NGFW) – what is it and what does it protect against
Next Generation Firewall (NGFW) – what is it and what does it protect against