Skip to content
arrow_back
search
ISM-1213 policy ASD Information Security Manual (ISM)

Analyse Network Traffic Post-Intrusion Remediation

Capture and analyse network traffic for a week to ensure hackers are removed after an intrusion.

record_voice_over

Plain language

After a hacker breaks into your computer network and you believe you've removed them, this control is about double-checking that they are truly gone. By looking at everything happening on the network for a week, you can spot if the intruders are still lurking and prevent further damage or data theft.

Framework

ASD Information Security Manual (ISM)

Control effect

Responsive

Classifications

NC, OS, P, S, TS

ISM last updated

Aug 2023

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Following intrusion remediation activities, full network traffic is captured for at least seven days and analysed to determine whether malicious actors have been successfully removed from the system.
policy ASD Information Security Manual (ISM) ISM-1213
priority_high

Why it matters

If post-remediation traffic isn’t fully captured and analysed for 7 days, attacker persistence or reinfection may go unnoticed, leading to further compromise.

settings

Operational notes

After remediation, enable full packet/flow capture for at least 7 days, retain logs, and review for C2, beaconing, and repeat IOCs to confirm eradication.

Mapping detail

Mapping

Direction

Controls