This article builds upon our earlier blog “Defining Security and Network Assets for EN 18031-1:2024 Compliance”. We provide clear definitions and practical examples of asset categories specified in the EN 18031 standard, specifically EN 18031-1: Access, Public, Environment, and Legal. Ideal for quickly understanding and implementing EN 18031 compliance, particularly EN 18031-1.
What does “Access” mean in EN 18031?
Assets classified under “Access” in EN 18031-1 require strong access controls. These sensitive assets must be protected from unauthorized use or alteration.
- Examples of Security Assets (Access):
- Authentication passwords
- Cryptographic private keys
- Examples of Network Assets (Access):
- Firewall access rules
- Secure VPN settings
What does “Public” mean in EN 18031?
“Public” assets are openly available and require no special security measures. Their exposure poses minimal risk.
- Examples of Security Assets (Public):
- Public cryptographic keys
- Publicly issued digital certificates
- Examples of Network Assets (Public):
- Publicly advertised Wi-Fi identifiers (SSIDs)
- Standard public DNS addresses
What does “Environment” mean in EN 18031?
Assets in the “Environment” category are protected naturally by physical or logical measures inherent to their operational context.
- Examples of Security Assets (Environment):
- Physically secured WPS buttons in private areas
- Secure tokens stored in access-controlled locations
- Examples of Network Assets (Environment):
- Ethernet ports locked within secure server rooms
- Private network segments accessible only through controlled environments
What does “Legal” mean in EN 18031?
“Legal” assets must remain accessible due to legal or regulatory requirements. Standard cybersecurity protections are often inappropriate for these assets.
- Examples of Security Assets (Legal):
- Authentication-free emergency service access points
- Legally required public safety messages
- Examples of Network Assets (Legal):
- Emergency communication channels mandated for open public access
- Regulated network functions required to be accessible without protection
Why Clear EN 18031 Asset Categorization Matters
Understanding these asset categories helps:
- Clearly identify and implement necessary security measures.
- Comply with legal and operational standards.
- Balance strong security with usability and compliance.
Using the structured approach provided by EN 18031, particularly EN 18031-1, ensures effective cybersecurity, safeguarding security and network assets, regulatory compliance, and operational reliability.
Take the Next Step with IoT Consulting Partners Group
IoT Consulting Partners assists clients by providing expert guidance on identifying and documenting these critical assets. Additionally, our team supports the entire compliance strategy for the EN 18031 series, ensuring your documentation and implementation align seamlessly with regulatory standards and industry best practices.
Ensuring compliance with global standards for radio, wireless, and electrical equipment is a complex but essential process. IoT Consulting Partners Group is here to guide you through every step, from bringing your wireless idea to life, testing and debugging to certification and market access.
Contact us today or schedule a free consultation to learn how we can help bring your product to market successfully.
![]() |
Do You Have Questions? Schedule a Free Consultation Now! |
![]() |
Frequently Asked Questions (FAQ)
1. Why are assets categorized in EN 18031?
Categorizing assets helps identify the correct security measures, ensures regulatory compliance, and balances security needs with operational requirements.
2. Can you give a quick example of an “Access” asset?
Yes. An “Access” asset could be something like a cryptographic private key or firewall access rules, both requiring strict protection.
3. Are “Public” assets risky to use?
No, public assets, such as public cryptographic keys or Wi-Fi identifiers, are intended to be freely accessible and pose minimal risk.
4. When would an asset be classified as “Legal”?
An asset is classified as “Legal” when legal or regulatory requirements mandate its accessibility without typical cybersecurity protections, such as emergency communication channels.