Skip to content
arrow_back
search
ISM-1563 policy ASD Information Security Manual (ISM)

Generate Comprehensive Security Assessment Reports

Create a report detailing the scope, weaknesses, risks, and controls of a system after assessment.

record_voice_over

Plain language

Creating a security assessment report is like having a thorough health check-up for your business IT systems. It's important because it tells you what's working, what needs fixing, and what risks might harm your business if left unchecked. Without this clarity, you could be in for unexpected costs or data breaches.

Framework

ASD Information Security Manual (ISM)

Control effect

Responsive

Classifications

NC, OS, P, S, TS

ISM last updated

May 2022

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

At the conclusion of a security assessment for a system, a security assessment report is produced by the assessor and covers: - the scope of the security assessment - the system's strengths and weaknesses - security risks associated with the operation of the system - the effectiveness of the implementation of controls - any recommended remediation actions.
policy ASD Information Security Manual (ISM) ISM-1563
priority_high

Why it matters

Without a security assessment report, assessment scope, control effectiveness, risks and remediation can be missed, increasing breach likelihood.

settings

Operational notes

Document scope, strengths/weaknesses, control effectiveness, key risks and prioritised remediation actions in the final assessor report.

Mapping detail

Mapping

Direction

Controls