ASD Information Security Manual (ISM)
The Australian Signals Directorate Information Security Manual is the Australian Government's primary cyber security framework. It provides a comprehensive set of cyber security principles and guidelines for protecting systems and data at all classification levels. The ISM contains over 870 controls organized across system hardening, management, monitoring, development, networking, cryptography, gateways, and data transfer guidelines.
Framework summaries on this platform are AI-assisted interpretations for educational and compliance planning purposes. They do not reproduce or replace the official standards. Refer to the authoritative source for the definitive text. Framework names and trademarks belong to their respective organisations.
Framework Domains (14)
Backup and Recovery
Chapter 12: Data backup, restoration, and digital preservation
| Code | Title |
|---|---|
| ISM-1511 | Backup Frequency |
| ISM-1515 | Restoration Testing |
| ISM-1705 | Backup Access Restriction |
| ISM-1810 | Synchronised Backups |
| ISM-1811 | Resilient Backup Storage |
Cryptography
Chapter 18: Cryptographic controls, TLS, SSH, and post-quantum readiness
| Code | Title |
|---|---|
| ISM-0459 | Data at Rest Encryption |
| ISM-0476 | RSA Key Length |
| ISM-0484 | SSH Hardening |
| ISM-1139 | TLS Version |
| ISM-1369 | TLS Encryption Algorithm |
| ISM-1453 | Perfect Forward Secrecy |
| ISM-1506 | SSH v1 Disabled |
| ISM-1553 | TLS Compression Disabled |
| ISM-1917 | Post-Quantum Readiness |
Cyber Security Principles and Governance
Chapters 2-4: Cyber security principles, roles, responsibilities, and security documentation
| Code | Title |
|---|---|
| ISM-0027 | CISO Appointment |
| ISM-0047 | System Security Plan |
| ISM-0714 | System Owners Identified |
| ISM-0888 | Continuous Monitoring Plan |
| ISM-1211 | Incident Response Plan |
| ISM-1526 | Cyber Security Strategy |
| ISM-1563 | Security Assessment Report |
| ISM-1567 | Cyber Supply Chain Risk Management |
| ISM-1568 | Shared Responsibility Model |
Gateways and Content Filtering
Chapter 19: Firewalls, cross-domain solutions, web proxies, and content inspection
| Code | Title |
|---|---|
| ISM-0260 | Web Proxy Requirement |
| ISM-0263 | TLS Traffic Inspection |
| ISM-0631 | Authorised Data Flows Only |
| ISM-0637 | DMZ Implementation |
| ISM-0963 | Content Filter Blocking |
| ISM-1288 | Multi-Engine Antivirus |
| ISM-1389 | Sandbox Analysis |
| ISM-1528 | Evaluated Firewalls |
Media and Facilities Security
Chapters 7-10: Guidelines for media, equipment, and physical facility security
| Code | Title |
|---|---|
| ISM-0159 | Media Sanitisation |
| ISM-0164 | Equipment Maintenance |
| ISM-0336 | ICT Equipment Classification |
| ISM-0363 | Media Destruction |
| ISM-1053 | Emanation Security |
| ISM-1076 | ICT Equipment Disposal |
Network Security
Security requirements for telecoms networks and services
| Code | Title |
|---|---|
| ISM-0520 | Unauthorised Device Prevention |
| ISM-1028 | NIDS/NIPS Deployment |
| ISM-1181 | Network Segmentation |
| ISM-1182 | Network Access Controls |
| ISM-1311 | SNMP v1/v2 Prohibition |
| ISM-1627 | Anonymity Network Inbound Blocking |
| ISM-1628 | Anonymity Network Outbound Blocking |
| ISM-1781 | Data Encryption in Transit |
| ISM-1782 | Protective DNS |
| ISM-1800 | Trusted Firmware |
| UK-TSA-NET-01 | Security Architecture |
| UK-TSA-NET-02 | Access Control and Authentication |
| UK-TSA-NET-03 | Supply Chain Security |
Patch Management
Chapter 12: Patching operating systems, applications, and firmware
| Code | Title |
|---|---|
| ISM-1143 | Patch Management Processes |
| ISM-1691 | Application Patching — Regular |
| ISM-1692 | Application Patching — Critical |
| ISM-1694 | Server OS Patching — Regular |
| ISM-1696 | Workstation OS Patching — Critical |
| ISM-1698 | Vulnerability Scanning — Online Services |
| ISM-1699 | Vulnerability Scanning — Applications |
| ISM-1876 | Online Service Patching — Critical |
| ISM-1877 | Server OS Patching — Critical |
Personnel Security
Requirements for ensuring personnel suitability and managing insider threats
| Code | Title |
|---|---|
| AEO-PS-1 | Employee Vetting |
| AEO-PS-2 | Security Awareness Training |
| AEO-PS-3 | Access Management |
| CTPAT-PE-1 | Pre-Employment Verification |
| CTPAT-PE-2 | Employee Screening |
| CTPAT-PE-3 | Education and Training |
| DSPF-PERS-1 | Personnel Suitability |
| DSPF-PERS-2 | Security Clearances |
| DSPF-PERS-3 | Ongoing Personnel Assessment |
| DSPF-PERS-4 | Insider Threat Management |
| DSPF-PERS-5 | Security Awareness and Training |
| ISM-0252 | Cyber Security Awareness Training |
| ISM-0414 | System Access Revocation |
| ISM-0434 | Privileged User Access Restriction |
| ISM-1146 | Targeted Cyber Security Training |
| ISM-1175 | Temporary Access |
| ISM-1503 | Separate Privileged Operating Environments |
| ISM-1507 | Privileged Access Limitation |
| ISM-1508 | Privileged Access Review |
| PSPF-PERS-1 | Eligibility and Suitability |
| PSPF-PERS-2 | Security Clearances |
| PSPF-PERS-3 | Ongoing Suitability |
| PSPF-PERS-4 | Separation and Transfer |
Software Development Security
Chapter 14: Secure development practices, web application security, and vulnerability management
| Code | Title |
|---|---|
| ISM-0400 | Environment Segregation |
| ISM-0401 | Secure Design Principles |
| ISM-0402 | Security Testing |
| ISM-0971 | Web Application Security Standard |
| ISM-1240 | Input Validation |
| ISM-1241 | Output Encoding |
| ISM-1275 | Database Query Filtering |
| ISM-1424 | Security Headers |
| ISM-1616 | Vulnerability Disclosure Program |
| ISM-1730 | Software Bill of Materials |
| ISM-1780 | SecDevOps |
| ISM-1850 | OWASP Top 10 Mitigation |
System Hardening — Application Control
Chapter 11: Application control (Essential Eight mitigation strategy)
| Code | Title |
|---|---|
| ISM-0843 | Application Control on Workstations |
| ISM-0955 | Application Control Rules |
| ISM-1490 | Application Control on Internet-Facing Servers |
| ISM-1544 | Microsoft Blocklist |
| ISM-1582 | Application Control Validation |
| ISM-1656 | Application Control on Non-Internet Servers |
| ISM-1657 | Application Control Scope |
| ISM-1658 | Driver Execution Control |
| ISM-1870 | Application Control — User Folders |
System Hardening — Application and Browser Hardening
Chapter 11: Hardening of office suites, web browsers, email clients, and PDF applications
| Code | Title |
|---|---|
| ISM-1412 | Web Browser Hardening |
| ISM-1467 | Latest Application Versions |
| ISM-1485 | Block Web Advertisements |
| ISM-1486 | Block Java in Browsers |
| ISM-1667 | Office Child Process Blocking |
| ISM-1668 | Office Executable Content Blocking |
| ISM-1671 | Office Macro Restriction |
| ISM-1674 | Trusted Macro Sources |
| ISM-1859 | Office Suite Hardening |
System Hardening — Authentication
Chapter 11: Multi-factor authentication and credential management
| Code | Title |
|---|---|
| ISM-0421 | Passphrase Complexity |
| ISM-0974 | MFA for Unprivileged Users |
| ISM-1173 | MFA for Privileged Users |
| ISM-1401 | MFA Factor Types |
| ISM-1403 | Account Lockout |
| ISM-1504 | MFA for Sensitive Services |
| ISM-1590 | Credential Rotation |
| ISM-1682 | Phishing-Resistant MFA |
| ISM-1686 | Credential Guard |
System Hardening — Operating Systems
Chapter 11: Operating system hardening and configuration management
| Code | Title |
|---|---|
| ISM-1407 | Latest OS Release |
| ISM-1408 | 64-bit Operating Systems |
| ISM-1409 | OS Hardening |
| ISM-1410 | Local Admin Account Restriction |
| ISM-1584 | Security Function Protection |
| ISM-1588 | SOE Annual Review |
| ISM-1745 | Secure Boot |
System Monitoring and Event Logging
Chapter 13: Event logging, analysis, and centralised monitoring
| Code | Title |
|---|---|
| ISM-0580 | Event Logging Policy |
| ISM-0584 | Authentication Event Logging |
| ISM-0585 | Event Log Content |
| ISM-0586 | Event Log Protection |
| ISM-0859 | Event Log Retention |
| ISM-0988 | Accurate Time Source |
| ISM-1228 | Timely Event Analysis |
| ISM-1405 | Centralised Logging |
Maps to 624 other frameworks
Frequently Asked Questions
What is ASD Information Security Manual (ISM)?
ASD Information Security Manual (ISM) is a compliance framework from Australia with 14 domains and 136 controls. The Australian Signals Directorate Information Security Manual is the Australian Government's primary cyber security framework. It provides a comprehensive set of cyber security principles and guidelines for protecting systems and data at all classification levels. The ISM contains over 870 controls organized across system hardening, management, monitoring, development, networking, cryptography, gateways, and data transfer guidelines. It is used by organisations to establish and maintain compliance with industry standards and regulatory requirements.
How many controls does ASD Information Security Manual (ISM) have?
ASD Information Security Manual (ISM) has 136 controls organised across 14 domains. The largest domains are Personnel Security (23 controls), Network Security (13 controls), Software Development Security (12 controls). Each control defines specific requirements that organisations must implement to achieve compliance.
What frameworks does ASD Information Security Manual (ISM) map to?
ASD Information Security Manual (ISM) maps to 624 other compliance frameworks. The top mapping partners are CSA CCM v4 (37% coverage), South Korea ISMS-P (34% coverage), AWWA Cybersecurity Guidance for the Water Sector (American Water Works Association) (31% coverage). Use our comparison tool to explore control-level mappings between frameworks.
How do I get started with ASD Information Security Manual (ISM) compliance?
Start your ASD Information Security Manual (ISM) compliance journey by running a self-assessment on our platform to identify your current compliance posture. Our AI advisory can answer specific questions about ASD Information Security Manual (ISM) requirements, and cross-framework mapping helps you leverage existing controls from other frameworks you may already comply with. Create a free account to access all 136 controls and track your progress.
Start Your Compliance Journey
Create a free account to run self-assessments, get AI advisory, and track your compliance progress across 692 frameworks.
Get Started Free →Free forever — no credit card required