Skip to content
arrow_back
search
ISM-1586 policy ASD Information Security Manual (ISM)

Record All Data Imports and Exports

Keep logs to track every time data is transferred into or out of the system.

record_voice_over

Plain language

This control is about making sure you keep records every time data moves into or out of your system. It's important because without these logs, you might not notice if sensitive information is taken or something goes wrong during a transfer. Keeping good records helps protect your business from data breaches and ensures accountability.

Framework

ASD Information Security Manual (ISM)

Control effect

Detective

Classifications

NC, OS, P, S, TS

ISM last updated

July 2020

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Data transfer logs are used to record all data imports and exports from systems.
policy ASD Information Security Manual (ISM) ISM-1586
priority_high

Why it matters

Without data transfer logs for all imports/exports, unauthorised transfers can go undetected, delaying incident response and increasing the impact of data breaches.

settings

Operational notes

Record all imports/exports with timestamp, user, source/destination and data set; regularly review logs for anomalies and retain/protect logs to support investigations.

Mapping detail

Mapping

Direction

Controls