Skip to content
arrow_back
search
ISM-0261 policy ASD Information Security Manual (ISM)

Log Web Proxy Activity for Security Analysis

Record details of websites accessed through web proxies, including web address and user info, for security tracking.

record_voice_over

Plain language

This control is about keeping track of all the websites that people in your organisation visit using web proxies, along with details like when they visited and how much data was transferred. This is important because it helps catch any unauthorised or suspicious activities that could lead to security breaches or data leaks.

Framework

ASD Information Security Manual (ISM)

Control effect

Detective

Classifications

NC, OS, P, S, TS

ISM last updated

Nov 2023

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

The following details are centrally logged for websites accessed via web proxies: - web address - date and time - user - amount of data uploaded and downloaded - internal and external IP addresses.
policy ASD Information Security Manual (ISM) ISM-0261
priority_high

Why it matters

Without centrally logging web proxy activity, detecting unauthorised browsing or data exfiltration is delayed, increasing the likelihood and impact of a breach.

settings

Operational notes

Centrally log proxy URL, timestamp, user, bytes in/out and internal/external IPs; alert on spikes, suspicious domains and review retention and access controls.

Mapping detail

Mapping

Direction

Controls