Skip to content
arrow_back
search
ISM-1400 policy ASD Information Security Manual (ISM)

Continuous System Security Monitoring and Threat Management

System owners must always check their systems for security threats and handle risks effectively.

record_voice_over

Plain language

System owners need to regularly check and manage the security of their systems. This is important because ignoring potential threats can lead to data breaches, financial loss, or damage to your reputation.

Framework

ASD Information Security Manual (ISM)

Control effect

Proactive

Classifications

OS, P

ISM last updated

Mar 2026

Control Stack last updated

24 Mar 2026

E8 maturity levels

N/A

Official control statement

Personnel using privately-owned mobile devices or desktop computers to access OFFICIAL: Sensitive or PROTECTED systems or data have enforced separation of classified data and personal data.
policy ASD Information Security Manual (ISM) ISM-1400
priority_high

Why it matters

If not monitored, systems can become vulnerable to breaches, potentially resulting in financial loss and loss of client trust.

settings

Operational notes

Regularly updating security protocols and keeping communication open across teams ensures ongoing system protection and threat readiness.

Mapping detail

Mapping

Direction

Controls