Skip to content
Control Stack logo Control Stack
ISM-1563 ASD Information Security Manual (ISM)

Generate Comprehensive Security Assessment Reports

Create a report detailing the scope, weaknesses, risks, and controls of a system after assessment.

🏛️ Framework

ASD Information Security Manual (ISM)

🧭 Control effect

Responsive

🔐 Classifications

NC, OS, P, S, TS

🗓️ ISM last updated

May 2022

✏️ Control Stack last updated

22 Feb 2026

🎯 E8 maturity levels

N/A

Official control statement
At the conclusion of a security assessment for a system, a security assessment report is produced by the assessor and covers: - the scope of the security assessment - the system's strengths and weaknesses - security risks associated with the operation of the system - the effectiveness of the implementation of controls - any recommended remediation actions.

Source: ASD Information Security Manual (ISM)

Plain language

Creating a security assessment report is like having a thorough health check-up for your business IT systems. It's important because it tells you what's working, what needs fixing, and what risks might harm your business if left unchecked. Without this clarity, you could be in for unexpected costs or data breaches.

Why it matters

Without a security assessment report, assessment scope, control effectiveness, risks and remediation can be missed, increasing breach likelihood.

Operational notes

Document scope, strengths/weaknesses, control effectiveness, key risks and prioritised remediation actions in the final assessor report.

Implementation tips

  • The IT team should carry out a thorough assessment of the systems in place. They need to evaluate each component of the system, identifying which parts are secure and which pose a risk. This can be done by running security scans and reviewing past incidents.
  • System owners need to clearly define the scope of the assessment. They should decide which systems and components are included and why, ensuring nothing critical is left unchecked. Documenting this scope helps maintain focus and clarity.
  • Managers should work with the IT team to identify system weaknesses and strengths. A meeting should be held to discuss the findings of the security scans and how each weakness might impact the business operations.
  • The IT team should evaluate the current security controls in place. They need to determine how effective these are by testing them against potential threats. This might involve simulating attacks to see if the defences hold up.
  • Based on the assessment, the IT team should recommend actions to address any identified weaknesses. This means prioritising risks, suggesting new security measures, or improving existing ones, and outlining a clear plan and timeline for implementation.

Audit / evidence tips

  • Ask: the security assessment report: Request the final report from the IT team detailing the assessment

    Good: report will clearly outline these elements and provide actionable recommendations

  • Ask: documentation of the meeting where the assessment scope was set

    Good: record will include a reasoned explanation of the scope choices

  • Ask: evidence of security controls testing: Request the results of any tests conducted on current security controls

  • Good: list will align issues with clear, prioritised actions

  • Ask: follow-up schedules: Request documentation of any planned follow-ups or reviews

    Good: schedule will be regular and aligned with the risk profiles identified

Cross-framework mappings

How ISM-1563 relates to controls across ISO/IEC 27001, Essential Eight, and ASD ISM.

These mappings show relationships between controls across frameworks. They do not imply full equivalence or certification.

No cross-framework mappings recorded yet.

Mapping detail

Mapping

Direction

Controls