Skip to content
arrow_back
search
ISM-0047 policy ASD Information Security Manual (ISM)

Approval Process for Cyber Security Documentation

Cyber security documents need approval from the chief security officer or system officer based on their scope.

record_voice_over

Plain language

This control ensures that important cyber security documents are officially approved by the right people in the organisation. It’s vital because if the necessary checks aren't done, important systems could be vulnerable or not compliant with standards, potentially leading to data breaches or other security incidents.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Nov 2025

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Organisational-level cyber security documentation is approved by the chief information security officer while system-specific cyber security documentation is approved by the system's authorising officer.
policy ASD Information Security Manual (ISM) ISM-0047
priority_high

Why it matters

If cyber security documentation is not approved by the CISO or the system authorising officer, controls may be unendorsed, non-compliant and lead to avoidable security incidents.

settings

Operational notes

Record CISO approval for organisational documents and AO approval for system documents; keep signed evidence, and periodically review approval status after major changes.

Mapping detail

Mapping

Direction

Controls