Skip to content
arrow_back
search
ISM-1211 policy ASD Information Security Manual (ISM)

System Admin Activities Follow Change Management Plan

Admins follow a defined plan for system changes to ensure proper management.

record_voice_over

Plain language

Think of system administration like running a well-organised kitchen. Just as chefs follow a recipe to avoid serving up something unexpected, system administrators follow a set plan when they make changes to computer systems. This prevents accidents, such as unexpected system outages or security issues, which could lead to data loss or damage to your business's reputation.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Feb 2025

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

System administrators perform system administration activities in accordance with the system's change and configuration management plan.
policy ASD Information Security Manual (ISM) ISM-1211
priority_high

Why it matters

If admins bypass the change/configuration management plan, unauthorised changes can cause outages, weaken controls, and enable breaches.

settings

Operational notes

Perform admin work only via the change/configuration management plan: raise a change record, assess risk, obtain approvals, implement, and record outcomes.

Mapping detail

Mapping

Direction

Controls