Skip to contentAbout Fig Group

Asset Discovery

Build a governed asset register with automated discovery, ownership tracking, and audit-ready evidence.

The challenge

Does this sound familiar?

Spreadsheet-based asset registers drift immediately. Shadow IT goes untracked. Audit scope becomes impossible to determine.

How Fig helps

Asset Discovery with Fig

Automated Discovery

Assets aggregate from hardware, cloud, domain scanning, and integrations with automatic conflict resolution.

Governed Ownership

Every asset has a documented owner with reassignment workflows, approval chains, and full audit trail.

Fig Asset Discovery platform view
Core Capability

Fig ingests signals from connected tooling to build a live register of assets in your estate, including their security configuration and compliance status.

Lifecycle Tracking

Track provisioning, changes, reviews, and decommissioning with timestamped evidence at every stage.

Audit-Ready Export

Structured evidence packs include lifecycle records, review history, and reconciliation events.

Audit-ready workflow

How Asset Discovery becomes evidence

Asset Discovery should not be treated as a standalone tool surface. In Fig it is part of a governed workflow: a signal is captured, an owner is assigned, a control or risk is updated, and evidence is retained so the organisation can prove what happened later.

Lifecycle

Where it sits in the operating model

The Discover phase is where this capability sits in the wider Fig operating model. Spreadsheet-based asset registers drift immediately. Shadow IT goes untracked. Audit scope becomes impossible to determine. Fig turns that problem into a repeatable lifecycle so MSPs, risk teams, and auditors are not relying on static spreadsheets or ad hoc screenshots when a buyer asks for proof.

Evidence captured

What auditors and buyers see

For asset discovery, useful evidence normally includes the triggering record, the affected asset or supplier, the control requirement, the assigned owner, the decision made, the timestamp, and the outcome. That evidence is mapped back to frameworks such as Cyber Essentials, ISO 27001, NIS2, DORA, GDPR, CMMC, and internal policy requirements where relevant.

Implementation checks

Four steps to roll this out

  • 01Define who owns asset discovery and what events should trigger review.
  • 02Connect the relevant source systems so evidence is collected continuously.
  • 03Map outputs to the frameworks and policies that matter to the organisation.
  • 04Review exceptions, accepted risks, and overdue actions before audit or renewal.

Useful references

Independent sources buyers and auditors recognise

The exact evidence required still depends on your scope, risk profile, sector, and framework obligations.

Built for you

Who uses this?

MSPs & MSSPs

Multi-client standardised registers with continuous discovery. One view across all customers.

Learn more

Security & risk teams

Vulnerability, incident, and risk records attached directly to assets. Full traceability.

Learn more

Compliance & audit

Pre-assessment evidence documentation. Scope definition backed by live data.

Learn more

Common questions

Frequently asked questions

Does Fig replace our CMDB?

Fig operates as a governance layer above your existing tools. It adds compliance tracking and ownership documentation without replacing your CMDB.

How does discovery work for cloud resources?

Fig connects directly to AWS, Azure, and GCP via API integrations and continuously discovers new resources as they are provisioned.

Can we track assets across multiple clients?

Yes. Multi-tenant isolation ensures each client environment is separated while providing portfolio-level visibility for MSPs.

How long does it take to get an accurate asset register?

Most organisations see a complete initial register within 48 hours of connecting their first integrations. Cloud resources appear within minutes. On-premise discovery depends on agent deployment, but the majority of clients have full coverage within a week.

What happens when assets are decommissioned or replaced?

Fig tracks the full lifecycle. When an asset is marked for decommissioning, it moves through an approval workflow, retains its compliance history, and is archived with a timestamped record. Auditors can still access historical evidence for decommissioned assets.

Next step

See Asset Discovery in action.

Book a walkthrough tailored to your frameworks and tooling.