Skip to content
arrow_back
search
ISM-0660 policy ASD Information Security Manual (ISM)

Monthly Verification of Data Transfer Logs for SECRET Systems

Check logs every month to ensure safe data transfers in top-secret systems.

record_voice_over

Plain language

This control ensures that the logs of data transfers in top-secret systems are checked every month. Doing this is important because it helps catch and fix any issues early. If these logs aren't reviewed, sensitive information could be at risk of being stolen or misused without anyone knowing.

Framework

ASD Information Security Manual (ISM)

Control effect

Detective

Classifications

S, TS

ISM last updated

Feb 2022

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Data transfer logs for SECRET and TOP SECRET systems are fully verified at least monthly.
policy ASD Information Security Manual (ISM) ISM-0660
priority_high

Why it matters

If monthly verification of SECRET/TOP SECRET data transfer logs is not performed, unauthorised transfers may go undetected, enabling classified data exfiltration and national security compromise.

settings

Operational notes

Monthly, fully verify SECRET/TOP SECRET transfer logs by reconciling each entry to approvals and endpoints; investigate anomalies (unexpected destinations, volume spikes, failures) and retain evidence of completion.

Mapping detail

Mapping

Direction

Controls