Skip to content
arrow_back
search
ISM-1660 policy ASD Information Security Manual (ISM)

Central Logging of Application Events

All application events, whether allowed or blocked, must be recorded centrally.

record_voice_over

Plain language

This control is about making sure that every time an application on your computer system does something important—like allowing or blocking an action—it's reported to one central location. If you don't do this, you risk missing signs that something is going wrong, which means you might not catch a problem or an attack before it causes serious harm.

Framework

ASD Information Security Manual (ISM)

Control effect

Detective

Classifications

NC, OS, P, S, TS

ISM last updated

Nov 2023

Control Stack last updated

19 Mar 2026

E8 maturity levels

ML2, ML3

Official control statement

Allowed and blocked application control events are centrally logged.
policy ASD Information Security Manual (ISM) ISM-1660
priority_high

Why it matters

Without central logging of allowed and blocked application control events, suspicious executions may be missed, delaying detection and response to malware or misuse.

settings

Operational notes

Forward allowed/blocked application control events to a central log store, verify coverage across hosts, and alert on repeated blocks or unexpected allows.

Mapping detail

Mapping

Direction

Controls