Skip to content
arrow_back
search
ISM-1636 policy ASD Information Security Manual (ISM)

Security Assessment for System Controls

System owners ensure security checks for specific systems to verify proper setup and operation.

record_voice_over

Plain language

This control is about making sure that all security measures for important systems are set up correctly and are working as they should. It’s crucial because if these protections are not checked, you could be at risk of losing sensitive data or having your system compromised, leading to potential financial loss or damage to your reputation.

Framework

ASD Information Security Manual (ISM)

Control effect

Detective

Classifications

NC, OS, P, S

ISM last updated

Feb 2025

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

System owners, in consultation with each system's authorising officer, ensure controls for each non-classified, OFFICIAL: Sensitive, PROTECTED and SECRET system and its operating environment undergo a security assessment by their organisation's own assessors or Infosec Registered Assessor Program (IRAP) assessors to determine if they have been implemented correctly and are operating as intended.
policy ASD Information Security Manual (ISM) ISM-1636
priority_high

Why it matters

Without security assessments, controls may be misconfigured or ineffective, increasing the likelihood of compromise and exposure of OFFICIAL: Sensitive to SECRET data.

settings

Operational notes

Schedule periodic assessor or IRAP-led assessments to verify controls are correctly implemented and operating as intended, and record outcomes for the authorising officer.

Mapping detail

Mapping

Direction

Controls