Skip to content
arrow_back
search
ISM-1409 policy ASD Information Security Manual (ISM)

Implement Restrictive OS Hardening Guidelines

Ensure operating systems follow strictest security guidelines from ASD or vendors.

record_voice_over

Plain language

This control is about making sure your computer systems are set up with the most secure settings available. It's important because if you don't use the strictest security settings, you leave the door open for hackers to get into your systems and cause harm, like stealing sensitive information or disrupting your business operations.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Nov 2023

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Operating systems are hardened using ASD and vendor hardening guidance, with the most restrictive guidance taking precedence when conflicts occur.
policy ASD Information Security Manual (ISM) ISM-1409
priority_high

Why it matters

Without restrictive OS hardening baselines, insecure services and settings may be enabled, increasing attack surface and enabling unauthorised access.

settings

Operational notes

Regularly compare OS builds to ASD and vendor hardening baselines; when guidance conflicts, apply the most restrictive setting and document any exceptions.

Mapping detail

Mapping

Direction

Controls