Skip to content
arrow_back
search
ISM-0009 policy ASD Information Security Manual (ISM)

Identify Supplementary Controls for System Security

System owners consult officers to add extra security controls based on system specifics and organisational risk tolerance.

record_voice_over

Plain language

System owners must work with the person who formally approves each system to decide if extra security measures are needed for that specific system. This matters because different systems face different risks — if you don’t tailor protections you could expose sensitive data, lose operational time, or suffer financial and reputational damage.

Framework

ASD Information Security Manual (ISM)

Control effect

Proactive

Classifications

NC, OS, P, S, TS

ISM last updated

May 2025

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

System owners, in consultation with each system's authorising officer, identify any supplementary controls required based upon the unique nature of each system, its operating environment and the organisation's risk tolerances.
policy ASD Information Security Manual (ISM) ISM-0009
priority_high

Why it matters

If supplementary controls aren’t identified for a system’s unique environment and risks, gaps remain, increasing likelihood of compromise, data loss or service outage.

settings

Operational notes

With the authorising officer, assess each system’s unique environment and risk tolerance, document required supplementary controls, and revalidate after major changes or incidents.

Mapping detail

Mapping

Direction

Controls