Security Principle: G2; Revision: ; Updated: ; Applicability: ALL; Essential Eight: N/A The identity and value of systems, applications and data is determined and documented.