Skip to content
arrow_back
search
ISM-1731 policy ASD Information Security Manual (ISM)

Coordinate Intrusion Remediation on Separate Systems

Intrusion response activities should be managed from a different system than the one that has been breached.

record_voice_over

Plain language

When responding to a cyberattack, it's crucial to plan and coordinate your actions from a system that hasn't been compromised. This prevents hackers from intercepting your communications or sabotaging your response efforts, helping ensure your plans stay secure and effective.

Framework

ASD Information Security Manual (ISM)

Control effect

Responsive

Classifications

NC, OS, P, S, TS

ISM last updated

Nov 2021

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Planning and coordination of intrusion remediation activities are conducted on a separate system to that which has been compromised.
policy ASD Information Security Manual (ISM) ISM-1731
priority_high

Why it matters

If remediation isn't coordinated from a separate system, attackers could obstruct response efforts, leading to prolonged breaches and greater damage.

settings

Operational notes

Use a dedicated, isolated host for remediation coordination; harden, monitor and keep it ready for use during any incident.

Mapping detail

Mapping

Direction

Controls