Australian Information Security Manual
ACSC Information Security Manual. Australian Government cybersecurity controls baseline.
Framework summaries on this platform are AI-assisted interpretations for educational and compliance planning purposes. They do not reproduce or replace the official standards. Refer to the authoritative source for the definitive text. Framework names and trademarks belong to their respective organisations.
Framework Domains (21)
Communications Infrastructure
| Code | Title |
|---|---|
| ISM-0181 | Cable inspections |
| ISM-0294 | Cabling labelling |
| ISM-0833 | Physical security of facilities |
| ISM-0834 | Visitor management |
| ISM-1053 | Cabling infrastructure standards |
| ISM-1101 | Cable colour coding |
| ISM-1187 | Wireless access point placement |
| ISM-1188 | Wireless protocol restrictions |
Communications Systems
| Code | Title |
|---|---|
| ISM-0229 | Telephone systems classification |
| ISM-0240 | Fax machine restrictions |
| ISM-1078 | Off-hook audio protection |
| ISM-1297 | Video conferencing security |
| ISM-1297b | Recording of classified meetings |
| ISM-1297v | Voice over IP security |
Cryptography
| Code | Title |
|---|---|
| ISM-0455 | Key management |
| ISM-0467 | Data in transit encryption |
| ISM-0469 | Data at rest encryption |
| ISM-1139 | TLS minimum version |
| ISM-1505 | Approved cryptography |
| ISM-1505b | PKI usage |
| ISM-1883 | Cloud key management |
Cybersecurity Documentation
| Code | Title |
|---|---|
| ISM-0027 | System security plan |
| ISM-0072 | Authority to operate |
| ISM-0790 | Authority to operate review |
| ISM-0888 | Incident response plan documented |
| ISM-1163b | Risk register maintained |
| ISM-1543b | Data classification |
| ISM-1556 | Continuous monitoring plan |
Cybersecurity Incidents
| Code | Title |
|---|---|
| ISM-0123 | Cybersecurity incident response plan |
| ISM-0125 | Reporting incidents to ACSC |
| ISM-0576 | Evidence preservation |
| ISM-0581 | Security event escalation |
| ISM-1784 | Incident response exercises |
| ISM-1791 | Notifiable Data Breach scheme |
| ISM-1819 | Post-incident reviews |
| ISM-1886 | Tabletop exercises for executives |
| ISM-1887 | Crisis communication plan |
Cybersecurity Roles
| Code | Title |
|---|---|
| ISM-0714 | Chief Information Security Officer appointment |
| ISM-1478 | CISO responsibilities |
| ISM-1525 | System owners identified |
| ISM-1526 | System owner responsibilities |
Cybersecurity Strategy
| Code | Title |
|---|---|
| ISM-0042 | Cybersecurity strategy |
| ISM-1163 | Risk management framework |
| ISM-1163c | Threat assessment |
| ISM-1163d | Penetration testing |
| ISM-1212 | Threat intelligence |
| ISM-1542 | Outsourcing security responsibilities |
| ISM-1543 | Data sovereignty considerations |
| ISM-1779 | Cybersecurity insurance considerations |
| ISM-1791b | Privacy impact assessment |
| ISM-1820 | Supplier security assessment |
| ISM-1821 | Supplier contractual security |
| ISM-1825 | Cloud service approvals |
| ISM-1826 | IRAP assessment |
| ISM-1859 | Cloud identity federation |
| ISM-1888 | Annual cybersecurity review |
| ISM-1889 | Business continuity alignment |
| ISM-1896 | Cybersecurity metrics and reporting |
| ISM-1897 | Independent assurance |
| ISM-1898 | Essential Eight maturity assessment |
Data Transfers
| Code | Title |
|---|---|
| ISM-0664 | Data transfer approvals |
| ISM-0665 | Data transfer logging |
| ISM-0675 | Data export review |
Database Systems
| Code | Title |
|---|---|
| ISM-0414 | Database hardening |
| ISM-0414b | Database backup security |
| ISM-0415 | Database encryption |
| ISM-1245 | Database access control |
| ISM-1277 | Database activity monitoring |
| ISM-1278 | Database privileged action approval |
| Code | Title |
|---|---|
| ISM-0270 | Email classification |
| ISM-0270b | Outbound protective marking |
| ISM-0561 | Email content filtering |
| ISM-1023 | TLS for email |
| ISM-1234 | DMARC implementation |
| ISM-1789 | Sender Policy Framework |
| ISM-1894 | Email impersonation protections |
Enterprise Mobility
| Code | Title |
|---|---|
| ISM-0240m | Remote wipe capability |
| ISM-0863 | Mobile device policy |
| ISM-1145 | Mobile device management |
| ISM-1297m | Mobile encryption at rest |
| ISM-1554 | Travel briefings |
| ISM-1554b | Mobile device anti-theft |
Evaluated Products
| Code | Title |
|---|---|
| ISM-0280 | Evaluated products selection |
| ISM-0285 | High Assurance products |
| ISM-0289 | Product handling restrictions |
Gateways
| Code | Title |
|---|---|
| ISM-0631 | Gateway between networks |
| ISM-1037 | Cross domain solutions |
| ISM-1196 | Web content filtering |
| ISM-1416g | Email gateway anti-malware |
| ISM-1416r | Reverse proxy hardening |
| ISM-1430s | DNS sinkholing |
| ISM-1812 | DNS filtering |
ICT Equipment
| Code | Title |
|---|---|
| ISM-0293 | Equipment labelling |
| ISM-0303 | Equipment movement records |
| ISM-0306 | Tamper-evident seals |
| ISM-0311 | Equipment disposal |
| ISM-0316 | Equipment maintenance |
| ISM-0813 | ICT equipment inventory |
Media
| Code | Title |
|---|---|
| ISM-0323 | Media labelling |
| ISM-0325 | Media handling procedures |
| ISM-0347 | Media sanitisation |
| ISM-0350 | Destruction of media |
| ISM-0359 | Removable media restrictions |
| ISM-0831 | Media transport |
| ISM-1294 | Removable media encryption |
| ISM-1893 | Removable media in OT |
Networking
| Code | Title |
|---|---|
| ISM-0263 | Network segmentation |
| ISM-1006 | Firewall rule review |
| ISM-1182 | Wireless network security |
| ISM-1186 | Wireless intrusion detection |
| ISM-1295 | Wireless guest network isolation |
| ISM-1416 | Network DDoS protection |
| ISM-1419c | VPN access |
| ISM-1430 | DNS security |
| ISM-1437 | Network access control |
| ISM-1455 | Web application firewall |
| ISM-1884 | Cloud egress controls |
| ISM-1891 | Third-party connectivity controls |
| ISM-1892 | OT and ICS segmentation |
Personnel Security
| Code | Title |
|---|---|
| ISM-0432 | Personnel security clearance |
| ISM-0434 | Need to know enforced |
| ISM-0816 | Conditions of use for systems |
| ISM-0817 | Cybersecurity awareness training |
| ISM-1565 | Privileged user training |
| ISM-1591 | Termination of access |
| ISM-1895 | Phishing simulation |
Software Development
| Code | Title |
|---|---|
| ISM-0400 | Secure development standards |
| ISM-1238 | Security testing of software |
| ISM-1238b | Production data in test |
| ISM-1419 | Separation of environments |
| ISM-1750 | Open source component review |
| ISM-1876 | API security |
| ISM-1877 | Container security |
| ISM-1878 | Infrastructure as code review |
| ISM-1879 | Secrets management |
| ISM-1880 | Software signing |
System Hardening
| Code | Title |
|---|---|
| ISM-0418 | Password complexity |
| ISM-0421 | Password storage |
| ISM-0843 | Patch operating systems |
| ISM-1144 | Vulnerability scanning |
| ISM-1304 | Account lockout policy |
| ISM-1407 | Server hardening baseline |
| ISM-1410 | Default credentials changed |
| ISM-1411 | Disable unused services |
| ISM-1414 | Anti-malware configuration |
| ISM-1417 | Application control |
| ISM-1417b | Application control rule maintenance |
| ISM-1490 | Multi-factor authentication |
| ISM-1493 | Patch applications |
| ISM-1494 | Patch firmware |
| ISM-1546 | Restrict admin privileges |
| ISM-1654 | Boot integrity |
| ISM-1657 | Hardened user application config |
| ISM-1664 | Browser hardening |
| ISM-1667 | PDF reader hardening |
| ISM-1671 | Macros restriction |
| ISM-1815b | Anti-malware on endpoints |
| ISM-1860 | Conditional access |
| ISM-1872 | Endpoint detection and response |
| ISM-1881 | Cloud workload protection |
| ISM-1885 | Data loss prevention |
System Management
| Code | Title |
|---|---|
| ISM-0140 | Removal of unauthorised software |
| ISM-0813b | Software inventory |
| ISM-0938 | Privileged account separation |
| ISM-0974 | Privileged access just-in-time |
| ISM-1175 | Privileged workstations |
| ISM-1405 | Configuration management |
| ISM-1511 | Backups performed |
| ISM-1512 | Backup testing |
| ISM-1567 | Change management |
| ISM-1810 | Backup immutability |
| ISM-1873 | Privilege access management |
| ISM-1874 | Identity governance |
| ISM-1875 | Service account governance |
| ISM-1890 | Disaster recovery testing |
System Monitoring
| Code | Title |
|---|---|
| ISM-0109 | Time synchronisation |
| ISM-0120 | Log review |
| ISM-0582 | Event logging policy |
| ISM-0586 | Event log content |
| ISM-0859 | Centralised logging |
| ISM-1228 | Log retention |
| ISM-1419d | Privilege escalation logging |
| ISM-1815 | Logging of privileged actions |
| ISM-1816 | Detection of unusual activity |
| ISM-1816b | User behaviour analytics |
| ISM-1882 | Cloud audit logging |
Your Compliance Coverage
If you comply with Australian Information Security Manual, you already cover:
CSA CCM v4
5%
9 controls mapped
Compare →CSA STAR (Security, Trust, Assurance, and Risk)
5%
9 controls mapped
Compare →PAS 1192-5:2015 — Security-Minded Approach to BIM and Digital Built Environments
5%
9 controls mapped
Compare →+ 508 more: Canada ITSG-33 — IT Security Risk Management (5%), New Zealand Information Security Manual (NZISM) (5%)
See all 511 mapped frameworks ↓Maps to 511 other frameworks
Frequently Asked Questions
What is Australian Information Security Manual?
Australian Information Security Manual is a compliance framework from Australia with 21 domains and 186 controls. ACSC Information Security Manual. Australian Government cybersecurity controls baseline. It is used by organisations to establish and maintain compliance with industry standards and regulatory requirements.
How many controls does Australian Information Security Manual have?
Australian Information Security Manual has 186 controls organised across 21 domains. The largest domains are System Hardening (25 controls), Cybersecurity Strategy (19 controls), System Management (14 controls). Each control defines specific requirements that organisations must implement to achieve compliance.
What frameworks does Australian Information Security Manual map to?
Australian Information Security Manual maps to 511 other compliance frameworks. The top mapping partners are CSA CCM v4 (5% coverage), CSA STAR (Security, Trust, Assurance, and Risk) (5% coverage), PAS 1192-5:2015 — Security-Minded Approach to BIM and Digital Built Environments (5% coverage). Use our comparison tool to explore control-level mappings between frameworks.
How do I get started with Australian Information Security Manual compliance?
Start your Australian Information Security Manual compliance journey by running a self-assessment on our platform to identify your current compliance posture. Our AI advisory can answer specific questions about Australian Information Security Manual requirements, and cross-framework mapping helps you leverage existing controls from other frameworks you may already comply with. Create a free account to access all 186 controls and track your progress.
Start Your Compliance Journey
Create a free account to run self-assessments, get AI advisory, and track your compliance progress across 769 frameworks.
Get Started Free →Free forever — no credit card required