Skip to content
arrow_back
search
ISM-1203 policy ASD Information Security Manual (ISM)

Risk Assessment for System Security

System owners work with authorising officers to assess threats and risks for each system.

record_voice_over

Plain language

System owners need to collaborate with the person responsible for authorising each system to assess what might go wrong and how to protect each specific system. This matters because if you don't understand the unique risks each system faces, you could expose your organisation to data breaches, financial losses, or damage to your reputation.

Framework

ASD Information Security Manual (ISM)

Control effect

Proactive

Classifications

NC, OS, P, S, TS

ISM last updated

May 2025

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

System owners, in consultation with each system's authorising officer, conduct a threat and risk assessment for each system.
policy ASD Information Security Manual (ISM) ISM-1203
priority_high

Why it matters

Without a system-specific threat and risk assessment, owners may miss key threats and weaknesses, increasing likelihood of breach and disruption.

settings

Operational notes

Review the system threat and risk assessment with the authorising officer at least annually and after major changes; record risks, treatments and residual risk.

Mapping detail

Mapping

Direction

Controls