by instantiating the asset concept and providing the
necessary attributes to detail things like the internal
identification code (e.g. from the inventory system or a
Similar to the identification of assets and threats and
vulnerabilities the possible controls must be identified, stored
and analyzed in order to support information security
managers in their decision making process.