Skip to content

Commit c38a048

Browse files
authored
Change document date to 09/08/2025
1 parent 809f7ff commit c38a048

File tree

1 file changed

+4
-1
lines changed

1 file changed

+4
-1
lines changed

exposure-management/classify-critical-assets.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: dlanger
66
manager: ornat-spodek
77
ms.topic: overview
88
ms.service: exposure-management
9-
ms.date: 07/23/2025
9+
ms.date: 09/08/2025
1010
---
1111

1212
# Review and classify critical assets
@@ -34,6 +34,9 @@ Impact analysis and crown jewels analysis are essential methodologies for identi
3434

3535
The NIST Cybersecurity Framework (CSF) 800-53 also emphasizes guidance for asset management and criticality analysis, as outlined in ID.AM-05, which can be found at: [https://csf.tools/reference/nist-cybersecurity-framework/v2-0/id/id-am/id-am-05/](https://csf.tools/reference/nist-cybersecurity-framework/v2-0/id/id-am/id-am-05/).
3636

37+
> [!NOTE]
38+
> When multiple classification rules apply to an asset, the rule with the highest criticality level takes precedence. This classification remains in effect until the asset no longer meets the criteria for that rule, at which point it will automatically revert to the next applicable classification level.
39+
3740
## Prerequisites
3841

3942
Before you begin, ensure you meet the following requirements for working with critical assets in Microsoft Security Exposure Management.

0 commit comments

Comments
 (0)