Skip to content
arrow_back
search
ISM-0041 policy ASD Information Security Manual (ISM)

Develop a Detailed System Security Plan

Create a security plan detailing system purpose, management, and additional controls.

record_voice_over

Plain language

A system security plan is like a blueprint for protecting your computer systems. It clearly shows what the system does, where it operates, and how it's managed. Without such a plan, you risk leaving gaps in your security, which could lead to data breaches or system failures.

Framework

ASD Information Security Manual (ISM)

Control effect

Proactive

Classifications

NC, OS, P, S, TS

ISM last updated

May 2024

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Systems have a system security plan that includes an overview of the system (covering the system's purpose, the system boundary and how the system is managed) as well as an annex that covers applicable controls from this document and any additional controls that have been identified and implemented.
policy ASD Information Security Manual (ISM) ISM-0041
priority_high

Why it matters

Without a current system security plan, system boundaries, ownership and applicable ISM controls can be unclear, leading to missing controls and unmanaged changes that increase compromise risk.

settings

Operational notes

Update the system security plan for changes to purpose, boundary, hosting or administration; maintain the annex mapping to applicable ISM controls and record versioned review/approval.

Mapping detail

Mapping

Direction

Controls