Asset inventory maintains a complete, accurate list of all hardware and software — you can't protect what you don't know exists. CIS Control #1 and #2.
"You can't secure what you don't know exists." Unknown assets (shadow IT, rogue devices) are high-risk. Network scanning (Nmap, Nessus) discovers unmanaged devices. CMDB tracks assets and their relationships. Automated discovery keeps inventory current.