Skip to content
arrow_back
search
ISM-1071 policy ASD Information Security Manual (ISM)

Assign System Ownership for Better Oversight

Every system should have a specific person responsible for managing it.

record_voice_over

Plain language

Every system in your organisation needs someone in charge of it. Think of it like assigning a captain for each ship. This matters because when no one is responsible, issues like security holes can slip through the cracks, leading to data loss or costly downtime.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Aug 2018

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Each system has a designated system owner.
policy ASD Information Security Manual (ISM) ISM-1071
priority_high

Why it matters

Without a designated system owner, accountability falters, leaving systems vulnerable to unchecked security gaps and unmanaged incidents.

settings

Operational notes

Maintain a system ownership register and review it quarterly; update the named owner and delegations when staff or responsibilities change.

build

Implementation tips

  • System owners should be assigned by the manager responsible for business operations to take charge of each system. Identify someone who understands the system well and can oversee its management and protection effectively.
  • The system owner should document what the system does, who uses it, and how it supports the business. They can do this by listing the system's primary functions, users, and business applications in a simple document.
  • The IT team should support the system owner by providing technical details about software updates and security patches. This can involve regular meetings or reports summarising recent changes and any risks identified.
  • System owners should work with HR to ensure they have the necessary training and support in cybersecurity practices. They can accomplish this through workshops or online training courses focused on cybersecurity awareness.
  • Each system owner should hold regular meetings with their team to discuss any issues or updates related to their system. These meetings should include a brief review of security logs and user feedback to identify any unusual activity or user experience issues.
fact_check

Audit / evidence tips

  • Askthe system ownership documentation: Request a document that lists each system and its assigned owner by name

    Goodis a dated list with all systems currently in use and designated system owners

  • Askrecords of meetings between system owners and IT teams: Request minutes or summaries from alignment meetings

    Goodshows regular, consistent meetings and documented communication

  • Askto see system management plans from each system owner: Request documentation outlining how each system is managed and secured

    Goodis a detailed plan that references relevant policies and procedures

  • Askevidence of system owner training sessions: Request documentation or certifications showing completed cyber security training

    Goodis proof of regular updates in security skills and knowledge

  • Askto review security incident reports mentioning systems: Request reports on any incidents affecting systems with assigned owners

    Goodshows active owner participation in managing incidents

link

Cross-framework mappings

How ISM-1071 relates to controls across ISO/IEC 27001, Essential Eight, and ASD ISM.

ISO 27001

Control Notes Details
sync_alt Partially overlaps (1) expand_less
Annex A 5.2 Annex A 5.2 requires information security roles and responsibilities to be defined and allocated according to organisational needs
handshake Supports (1) expand_less
Annex A 5.9 Annex A 5.9 requires developing and maintaining an inventory of information and associated assets, including identifying owners

These mappings show relationships between controls across frameworks. They do not imply full equivalence or certification.

Mapping detail

Mapping

Direction

Controls