Skip to content
arrow_back
search
ISM-1609 policy ASD Information Security Manual (ISM)

Consult System Owners Before Continuing Intrusions

System owners must be asked before allowing intrusions to persist for collecting evidence.

record_voice_over

Plain language

Before continuing to monitor an ongoing cyber intrusion in your systems, you need to talk with the person who owns the system to get their permission. This is important because if you don't, you could risk further damage or misuse of sensitive information without the system owner’s understanding or consent.

Framework

ASD Information Security Manual (ISM)

Control effect

Responsive

Classifications

NC, OS, P, S, TS

ISM last updated

Nov 2021

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

System owners are consulted before allowing intrusion activity to continue on a system for the purpose of collecting further data or evidence.
policy ASD Information Security Manual (ISM) ISM-1609
priority_high

Why it matters

If system owners aren’t consulted before allowing intrusion activity to continue, evidence-gathering may breach authority, increase damage, and erode trust.

settings

Operational notes

During an intrusion, promptly brief the system owner and obtain explicit approval before continuing activity for evidence collection; record decisions and timeframes.

Mapping detail

Mapping

Direction

Controls