Operating Cadence

IT System Documentation as Operational Discipline: Building the Technology Inventory Before You Need It

Most middle market companies have a complete picture of their physical assets but no equivalent inventory of their technology systems, licenses, integrations, and data flows. That gap creates operational risk, slows every new employee onboarding, and produces diligence surprises in a sale. Building the IT inventory as an ongoing discipline eliminates all three problems.

Best for:Operators & management teamsFounders improving execution
Use this perspective to narrow the reporting, KPI, cadence, or accountability issue that needs attention first.

Key takeaways

  • An IT system inventory is a living document that captures every technology system the business relies on: what it does, who owns it, what it costs, what it connects to, and what breaks if it goes down.
  • The most common technology diligence finding in middle market M&A is undocumented integrations: data flows between systems that exist but are unknown to anyone except the person who built them.
  • Shadow IT, systems and applications purchased by individual departments without IT or management awareness, represents on average 30–40% of total software spend in mid-size companies. It also represents unmanaged data risk.
  • License compliance is a hidden cost in most IT environments. Software deployed beyond its licensed scope creates liability that surfaces in due diligence and can require retroactive licensing fees.
  • The IT documentation that takes three months to build from scratch during a sale process can be built in two weeks if it is maintained as a living document throughout the year.
Research finding
Gartner IT Asset Management Research, ISACA Governance Standards, Deloitte Tech Diligence Data

30–40%

Average share of software spend that is shadow IT in mid-size companies

$50K–$200K

Typical retroactive software license cost discovered in technology diligence

6–10 weeks

Time to build an IT inventory from scratch during a sale process

3–5 business days

Time to produce the same inventory when it has been maintained throughout the year

When a buyer's technology diligence team arrives, they are looking for three things: what systems does the business run on, what does it cost, and what are the risks. Systems that are undocumented, licenses that are non-compliant, and integrations that have no owner are all findings that affect deal certainty and valuation.

The founder who waits until a sale process to build the technology inventory is doing the most expensive version of this work. The same documentation built and maintained throughout the year costs a fraction of the effort and produces operating benefits long before any sale.

What belongs in an IT system inventory

An IT system inventory is not an IT support ticket. It is a management document that captures every system the business depends on and the key attributes of each.

1

The seven fields every system record should include

2

System name and category

The name of the system, the vendor, and the function it serves: ERP, CRM, payroll, accounting, project management, communication, security.

3

Owner

The internal person responsible for the system: who manages the vendor relationship, who approves user changes, and who is called first when something breaks.

4

User count and access scope

How many people have access, what roles they have, and which departments use the system. This determines the license compliance position.

5

Annual cost

License fees, support fees, and implementation or customization costs paid in the current year. Include all contracts, not just the primary license.

6

Data stored and sensitivity classification

What data lives in this system: customer records, employee records, financial data, intellectual property. Classify by sensitivity: public, internal, confidential, regulated.

7

Integrations and dependencies

What other systems does this system connect to? Are those integrations documented, or are they undocumented scripts that someone built? What breaks if this system goes down?

8

Contract terms and renewal date

When does the license expire or auto-renew? What are the termination provisions? Is there a change of control clause that requires consent from the vendor in a sale?

The integrations field is the most important and most commonly missing. A business running on an ERP, a CRM, a payroll system, and a project management tool likely has four to eight integrations between those systems. If those integrations are not documented, no one knows what data flows where or what breaks if one system is changed.

Shadow IT: the systems management does not know about

Shadow IT refers to technology systems purchased and operated by individual departments or employees outside of any central IT awareness or approval process. It is not a sign of malicious intent; it is the natural result of departments solving their own problems when central IT is slow or unresponsive.

The problem with shadow IT is not that the tools are bad. It is that the data in those tools is unmanaged: customer data stored in a departmental tool with no security controls, financial data processed in a system not covered by the company's data backup, or vendor contracts signed for systems that no one else knows the company has.

1

How to identify shadow IT in your organization

2

Credit card and expense report audit

Search expense reports and company credit card statements for software subscriptions. Every recurring charge to an online software vendor that is not in the IT inventory is shadow IT.

3

Department manager survey

Ask each department head to list every tool their team uses. Ask specifically about tools purchased on personal cards and reimbursed, tools used under a free or freemium plan, and tools used by one or two people that no one else knows about.

4

Email domain search

Search the email archive for subscription confirmation emails from software vendors. Every "Your subscription to [Vendor]" email that is not in the IT inventory represents a system to add.

5

Network scan (if applicable)

For companies with on-premise networks or managed WiFi, a network scan can identify devices and applications connecting to the network that are not in the inventory.

Once shadow IT is identified, the decision for each system is: formalize and manage it, migrate its data to an approved system, or terminate it. The decision should be made based on the data risk and operational dependency, not on whether the tool is liked by the team that uses it.

Working through this yourself?

Kolton works directly with founders on M&A readiness, deal structure, and AI implementation — one advisor, not a team of generalists.

Schedule a conversation →

License compliance and change of control provisions

Software license compliance is a specific IT documentation requirement that has direct financial consequences in a sale process. Most software licenses specify how many users can access the system, how the system can be deployed, and what happens if the company is acquired.

License non-compliance discovered during diligence creates liability for retroactive licensing fees. A vendor who discovers their software has been deployed for 80 users against a 40-user license can demand a true-up payment before the sale closes. These amounts are typically non-negotiable.

License TypeCommon Compliance IssueTypical Retroactive Cost
Per-user SaaS subscriptionDeployed to more users than licensed; shared logins used to avoid per-seat fees$15K–$80K depending on user count and subscription price
On-premise softwareInstalled on more servers or machines than the license permits; installed in a test environment without a test license$20K–$150K; vendor audits are common pre-close
Open source with commercial restrictionUsed in a commercial context that violates the open source license terms (GPL, LGPL)Unpredictable; can range from renegotiation to injunction in extreme cases
Change of control provisionVendor license requires consent and may trigger renegotiation upon a change of ownership$0–$200K+ depending on vendor and negotiating leverage

Change of control provisions in software licenses are a frequently overlooked closing risk. A CRM or ERP vendor whose contract includes a change of control clause may require consent to transfer the license, may impose a transfer fee, or may use the change of control as an opportunity to renegotiate pricing. Reviewing all major software contracts for change of control provisions is a pre-sale task, not a diligence-response task.

Maintaining the inventory as a living document

An IT inventory built once and never updated becomes stale within six months as new systems are added, old systems are retired, and integrations change. The maintenance discipline is what makes the inventory valuable.

1

Minimum IT inventory maintenance cadence

2

When a new system is purchased or subscribed to

Add a record to the inventory within five business days of going live; do not allow systems to operate without a record

3

When a user changes (new hire, termination, role change)

Update user counts in the inventory; remove access for terminated employees on the day of termination

4

Quarterly

Review all systems for usage; retire unused licenses; confirm user counts are accurate; check for upcoming renewals

5

Annual

Conduct a full license compliance review for the top 10 systems by cost; review all vendor contracts for change of control and auto-renewal provisions; confirm integrations are still operating as documented

The quarterly review is the highest-leverage maintenance activity. It catches unused licenses before they auto-renew, identifies user count drift before it becomes a compliance issue, and surfaces new shadow IT before it accumulates into a documentation problem.

Work with Glacier Lake Partners

Build Your IT Documentation Before You Need It

We help middle market companies build the technology documentation that supports operations and survives diligence.

Start a Conversation

Research sources

Gartner: IT Asset Management for Mid-Size OrganizationsISACA: IT Documentation and Governance StandardsDeloitte: Technology Diligence in Private Company M&A

Disclaimer: Financial figures and case studies in this article are illustrative, based on representative middle market assumptions, and are not guarantees of outcome. Statistical references are drawn from cited third-party research; individual transaction and operational results vary based on business characteristics, market conditions, and deal structure. This content is for informational purposes only and does not constitute legal, financial, or investment advice. Consult qualified advisors for guidance specific to your situation.

Explore adjacent topics

M&A Readiness

Why transaction readiness starts before the CIM

AI-Enabled Execution

AI should remove friction, not create a science project

Found this useful?Share on LinkedInShare on X

Next Step

Recognized a situation? A direct conversation is faster.

If a perspective maps to an active transaction, operating, or AI challenge, the right next step is a short discussion — not more reading.

Confidential inquiriesReviewed personally1 business day response target