Skip to content
arrow_back
search
ISM-1607 policy ASD Information Security Manual (ISM)

Integrity Monitoring for Shared Servers

Monitor and log system interactions when sharing a server's hardware using software isolation.

record_voice_over

Plain language

This control is about keeping a close watch on what's happening on a shared physical server when it's being divided up and shared using software. It's crucial because if you don't actively monitor and log the activity, you might miss suspicious actions that could compromise sensitive data or the whole system, resulting in data breaches or operational disruptions.

Framework

ASD Information Security Manual (ISM)

Control effect

Detective

Classifications

NC, OS, P, S, TS

ISM last updated

Nov 2024

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

When using a software-based isolation mechanism to share a physical server's hardware, integrity monitoring and centralised event logging is performed for the isolation mechanism and underlying operating system.
policy ASD Information Security Manual (ISM) ISM-1607
priority_high

Why it matters

Without integrity monitoring and centralised logging on the hypervisor/isolation layer and host OS, tampering or compromise may go undetected, enabling cross-tenant access and outages.

settings

Operational notes

Baseline and monitor hypervisor/isolation and host OS files/configs; alert on unauthorised changes. Forward hypervisor and OS logs to a central SIEM for correlation and retention.

Mapping detail

Mapping

Direction

Controls