Skip to content
arrow_back
search
ISM-1228 policy ASD Information Security Manual (ISM)

Analyse Cyber Security Events Promptly

Timely analysis of security events to spot incidents.

record_voice_over

Plain language

This control is about quickly looking at any signs of unusual activity on your computers and networks to see if there might be a security problem. It's important because if you miss or overlook these signs, you might not catch a cyber incident before it causes real harm, like data breaches or system downtime.

Framework

ASD Information Security Manual (ISM)

Control effect

Detective

Classifications

NC, OS, P, S, TS

ISM last updated

Feb 2022

Control Stack last updated

19 Mar 2026

E8 maturity levels

ML2, ML3

Official control statement

Cyber security events are analysed in a timely manner to identify cyber security incidents.
policy ASD Information Security Manual (ISM) ISM-1228
priority_high

Why it matters

Delayed event analysis can let genuine incidents go unnoticed, increasing dwell time and the likelihood of data compromise, loss and reputational harm.

settings

Operational notes

Review key security logs daily (or continuously), tune alert rules, and use SIEM automation to triage events quickly and escalate suspected incidents within defined SLAs.

Mapping detail

Mapping

Direction

Controls