Skip to content
arrow_back
search
ISM-0663 policy ASD Information Security Manual (ISM)

Develop and Maintain Data Transfer Procedures

Ensure data transfers are securely conducted with proper procedures in place.

record_voice_over

Plain language

This control is about making sure that when you move data from one place to another, it's done safely and securely. If the process isn't secure, sensitive data could be exposed to wrong parties, leading to privacy breaches, financial loss, or damage to your business's reputation.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Nov 2022

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Data transfer processes, and supporting data transfer procedures, are developed, implemented and maintained.
policy ASD Information Security Manual (ISM) ISM-0663
priority_high

Why it matters

Insecure data transfers can leak sensitive information in transit, leading to privacy breaches, legal penalties and reputational harm.

settings

Operational notes

Maintain documented transfer procedures (methods, encryption, approvals and recipients) and review them regularly to address new threats and changes.

Mapping detail

Mapping

Direction

Controls