Software asset management is an organization process, which is outlined in
ISO/IEC 19770-1. It is also now embraced within
ISO/IEC 27001:2005 Information Technology - Security Techniques - Information Security Management Systems - Requirements and
ISO/IEC 17799:2005 Information Technology - Security Techniques - Code of Practice for Information Security Management. Software asset management is a comprehensive strategy that has to be addressed from top to bottom in an organization to be effective, to minimize risk. A software compliance audit is an important sub-set of software asset management and is covered in the above referenced standards. At its simplest it involves the following: • Identification of Software Assets. • Verifying the Software Assets including licenses, usage, and rights. • Identifying gaps that may exist between what exists on the installations, and the licenses possessed, and the rights of usage. • Taking action to close any gaps. • Recording the results in a centralized location with Proof Of Purchase records. The audit process itself should be a continuing action, and modern SAM software identifies what is installed, where it is installed, its usage, and provides a reconciliation of this discovery against usage. This is a very useful means of controlling software installations and lowering the costs of licensing. Large organizations could not do this without discovery and inventory applications. From time to time internal or external (by major accounting firms) audits may take a forensic approach to establish what is installed on the computers in an organization with the purpose of ensuring that it is all legal and authorized and to ensure that its process of processing transactions or events is correct. Though one might be confronted with a software vendor audit by fair contractual and legal means, one should know and reserve one's crucial rights in an audit situation as well. Software audits are a component of corporate risk management, and they certainly minimize the risk of prosecution for
copyright infringement due to use of unlicensed software. Most vendors permit the company to settle without prosecution though in serious cases, prosecutions certainly occur. In addition with a strict software usage policy the risk of
computer viruses are minimized by preventing uncontrolled software copying. ==Organizations==