Skip to content
Control Stack logo Control Stack
Control Stack logo Control Stack

Australian ISO 27001, Essential Eight, and ASD ISM controls in one searchable library.

Control Stack gives Australian teams one place to interpret ISO/IEC 27001, ASD Essential Eight and ASD ISM controls. Plain-English statements, implementation tips, audit evidence and cross-framework mappings to accelerate certification and compliance projects.

3 Frameworks
1315 Controls
3636 Mappings
About the tool

What Is Control Stack?

Control Stack is a free compliance control library built for Australian organisations. Browse and compare controls across three core frameworks — the ASD Essential Eight, the ASD Information Security Manual (ISM), and ISO/IEC 27001:2022 — with plain-English explanations, implementation guidance, and cross-framework mappings.

Whether you are preparing for an ISO 27001 certification audit, uplifting your Essential Eight maturity, or aligning with ISM requirements for a government system, Control Stack gives you a single searchable library to check your compliance posture.

📚 Framework navigator

Frameworks Available in Control Stack

Control Stack covers the three compliance frameworks most relevant to Australian organisations. Pick a framework to see spotlight controls, implementation notes and ready-made crosswalks you can reference in governance documents or Statements of Applicability.

The Essential 8 is the Australian Signals Directorate's baseline set of mitigation strategies designed to protect organisations against the most common cyber threats. Control Stack covers all Essential Eight strategies across Maturity Levels 1, 2, and 3, with detailed guidance on what each maturity level requires and how to demonstrate compliance. Whether you are starting your first Essential 8 assessment or planning an uplift to Maturity Level 3, the library explains each control in context.

The Information Security Manual is the Australian Government's detailed cyber security framework published by the Australian Signals Directorate. It provides hundreds of security guidelines covering everything from personnel security to network hardening. Control Stack presents every ASD ISM control with plain-English summaries and classification filters, making it easier to navigate the ISM manual for system accreditation, PSPF compliance, and government contract requirements.

The international standard for information security management systems. Control Stack includes all 93 ISO 27001 Annex A controls organised by theme — organisational, people, physical, and technological. Each control page provides a plain-English explanation, implementation tips for Australian organisations, and mappings to Essential Eight and ASD ISM controls so you can build a Statement of Applicability that accounts for your existing compliance work.

Built for

Who Uses Control Stack?

IT security managers

Checking Essential Eight compliance and building remediation plans for maturity uplift.

GRC teams

Mapping ISO 27001 Annex A controls across frameworks for Statements of Applicability.

Government agencies

Referencing the Information Security Manual for system accreditation and PSPF compliance.

Consultants

Preparing clients for ISO 27001 certification audits with plain-English control guidance and evidence tips.

MSPs

Assessing client security posture across multiple frameworks and building standardised compliance documentation.

Quick start

How It Works

  1. 1
    Choose your framework — pick the Essential Eight, ASD ISM, or ISO 27001 depending on your compliance requirements. Each framework page opens with an overview of the standard and the number of controls it covers.
  2. 2
    Browse controls — read plain-English summaries that explain what each control requires and why it matters. Use the search bar or topic tags to jump straight to controls on subjects like backups, identity management, or network security.
  3. 3
    Check implementation tips — view practical guidance and audit evidence requirements for each control. Every control includes a plain-language explanation of what auditors look for and how to demonstrate compliance.
  4. 4
    Map across frameworks — see which ASD ISM controls align with Essential 8 strategies and ISO 27001 Annex A requirements. Cross-framework mappings let you reuse evidence and reduce duplicate compliance effort.
🎯 Control effects

How controls behave

Understand the four effect types we use to describe control intent across frameworks.

Preventative

Stops incidents from occurring with hardening, access control and baselines.

Proactive

Improves readiness before incidents through policies, training, planning and reviews.

Detective

Identifies events or incidents via logging, monitoring and detection.

Responsive

Acts after detection with response, containment and recovery.

🏷️ Browse by topic

Popular tags

Use curated tags to jump straight to controls covering topics like backups, identity or resilience across ISO 27001, the Essential Eight, and ASD ISM.

Open controls →
🔗 Cross-framework overlaps

Make mappings work for you

Use overlaps between ISO/IEC 27001 and the Essential Eight to reduce duplicate effort and simplify audits.

Open controls →

One control, multiple obligations

Spot where an ISO Annex A control also satisfies Essential Eight outcomes. Design once and reuse evidence in both Statements of Applicability and E8 uplift plans.

Cut duplicate effort

Use overlaps to consolidate policies, procedures and hardening guides instead of maintaining separate playbooks per framework.

Better audit prep

Link evidence to both frameworks so auditors can trace controls back to sources without extra spreadsheets.

Benefits

How Control Stack Helps Your Compliance Program

Managing compliance across multiple frameworks is time-consuming. Organisations pursuing ISO 27001 certification while maintaining Essential 8 maturity and aligning with ASD ISM requirements often find themselves maintaining separate spreadsheets and documents for each compliance framework. Control Stack solves this by bringing all three frameworks into a single searchable library.

Need ISO 27001 training? Our partner Mindset Cyber offers PECB-accredited ISO 27001 Lead Implementer, Lead Auditor, and Foundation courses — available as self-paced eLearning or live weekend training.