User:Jjgw/sandbox

exposure, Field of application clause for a description of related assets) and ongoing support costs and contracts;
 * Risk management: for example mitigating interruption or deterioration of IT/services; legal and regulatory
 * Cost control: reduced direct costs of software and reduced direct costs of software, related assets (see
 * Competitive advantage: better business decisions and satisfaction from trustworthy data always at-hand.


 * Discover and identify installed software for purposes of security management: It is a requirement of security management to identify the assets within the scope of the information security management system.
 * Limit overhead associated with managing and supporting software by streamlining and/or automating IT processes (such as inventory tracking, software deployment, issue tracking, and patch management).
 * Establish ongoing policies and procedures surrounding the acquisition, documentation, deployment, usage and retirement of software in an effort to recognize long-term benefits of SAM

A revision of this standard was published in 2012. This revised standard is designed to allow the implementation of SAM processes to be "accomplished in multiple increments and to that increment most suited to the needs of the organization."