Mechanisms exist to create and maintain a map of technology assets where sensitive/regulated data is stored, transmitted or processed.
Does the organization create and maintain a map of technology assets where sensitive/regulated data is stored, transmitted or processed?