Skip to content
arrow_back
search
ISM-1625 policy ASD Information Security Manual (ISM)

Develop Insider Threat Mitigation Programs

Create and manage a program to address threats from within the organisation.

record_voice_over

Plain language

An insider threat mitigation program helps organisations manage risks that come from their own employees, contractors, or business partners. This is crucial because trusted insiders can sometimes accidentally or intentionally cause harm, like leaking sensitive information or damaging systems, which can hurt the organisation's reputation and bottom line.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

May 2024

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

An insider threat mitigation program is developed, implemented and maintained.
policy ASD Information Security Manual (ISM) ISM-1625
priority_high

Why it matters

Without an insider threat mitigation program, malicious or inadvertent insiders can exfiltrate sensitive data, cause fraud, and disrupt services, damaging trust and compliance.

settings

Operational notes

Maintain the insider threat program by monitoring and reviewing indicators (access anomalies, privilege misuse) and regularly updating detection rules, reporting paths and response playbooks.

Mapping detail

Mapping

Direction

Controls