Skip to content
arrow_back
search
ISM-1634 policy ASD Information Security Manual (ISM)

Tailoring System Controls for Security and Resilience

System owners work with authorising officers to customise security controls to meet system-specific needs.

record_voice_over

Plain language

This control is about making sure that each system's security measures fit its unique needs. It’s important because a one-size-fits-all approach can leave parts of your business vulnerable to cyber threats, leading to data leaks or service disruptions.

Framework

ASD Information Security Manual (ISM)

Control effect

Proactive

Classifications

NC, OS, P, S, TS

ISM last updated

Mar 2026

Control Stack last updated

24 Mar 2026

E8 maturity levels

N/A

Official control statement

System owners, in consultation with each system’s authorising officer, select controls for each system and tailor them to achieve desired security and resilience objectives.
policy ASD Information Security Manual (ISM) ISM-1634
priority_high

Why it matters

Fitting security measures to each system prevents exposure to unique risks, protecting data and maintaining service reliability.

settings

Operational notes

Constant re-evaluation is key. Regularly review if security controls still align with system functions and threat landscapes.

Mapping detail

Mapping

Direction

Controls