Skip to content
arrow_back
search
ISM-1431 policy ASD Information Security Manual (ISM)

Strategies for Mitigating Denial-of-Service Attacks

Discuss with cloud providers how to handle costs and actions for denial-of-service attacks to maintain service continuity.

record_voice_over

Plain language

A denial-of-service attack happens when someone floods your online systems with too much traffic, making them slow or unavailable to your customers. This control is about planning with your cloud provider to handle such attacks, so your business can keep running smoothly, avoid unexpected costs, and maintain customer trust.

Framework

ASD Information Security Manual (ISM)

Control effect

Proactive

Classifications

NC, OS, P, S, TS

ISM last updated

May 2023

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Denial-of-service attack mitigation strategies are discussed with cloud service providers, specifically: - their capacity to withstand denial-of-service attacks - costs likely to be incurred as a result of denial-of-service attacks - availability monitoring and thresholds for notification of denial-of-service attacks - thresholds for turning off any online services or functionality during denial-of-service attacks - pre-approved actions that can be undertaken during denial-of-service attacks - any arrangements with upstream service providers to block malicious network traffic as far upstream as possible.
policy ASD Information Security Manual (ISM) ISM-1431
priority_high

Why it matters

Without agreed DoS capacity, alert thresholds and pre-approved actions with the cloud provider, attacks may cause prolonged outages, unexpected costs and reputational harm.

settings

Operational notes

Agree with the cloud provider on DoS alert thresholds, service shutoff triggers, pre-approved response actions, and upstream traffic blocking; review these arrangements regularly.

Mapping detail

Mapping

Direction

Controls