Skip to content
arrow_back
search
ISM-1638 policy ASD Information Security Manual (ISM)

Maintain a Comprehensive Outsourced Cloud Service Register

Keep a detailed list of cloud services used, including provider details, service purpose, and security review schedule.

record_voice_over

Plain language

This control is about keeping a detailed list of all cloud services your organisation uses, kind of like having a detailed contact list. It's important because if you don't know what services you are using, who provides them, or when you need to check their security, you could end up with sensitive information at risk and face unexpected issues or costs.

Framework

ASD Information Security Manual (ISM)

Control effect

Proactive

Classifications

NC, OS, P, S, TS

ISM last updated

Aug 2022

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

An outsourced cloud service register contains the following for each outsourced cloud service: - cloud service provider's name - cloud service's name - purpose for using the cloud service - sensitivity or classification of data involved - due date for the next security assessment of the cloud service - contractual arrangements for the cloud service - point of contact for users of the cloud service - 24/7 contact details for the cloud service provider.
policy ASD Information Security Manual (ISM) ISM-1638
priority_high

Why it matters

Without an outsourced cloud service register, services can be missed for review, exposing sensitive data and causing compliance failures.

settings

Operational notes

Keep a register per service: CSP/service name, purpose, data classification, contract, POC, 24/7 CSP contacts, and next assessment due date; review monthly.

Mapping detail

Mapping

Direction

Controls