Maintain a Comprehensive Managed Service Register
Keep a detailed register of all managed services, including providers, purpose, data sensitivity, assessment schedules, and contacts.
🏛️ Framework
ASD Information Security Manual (ISM)
🧭 Control effect
Proactive
🔐 Classifications
NC, OS, P, S, TS
🗓️ ISM last updated
Aug 2022
✏️ Control Stack last updated
19 Mar 2026
🎯 E8 maturity levels
N/A
Topic
Managed ServicesA managed service register contains the following for each managed service: - managed service provider's name - managed service's name - purpose for using the managed service - sensitivity or classification of data involved - due date for the next security assessment of the managed service - contractual arrangements for the managed service - point of contact for users of the managed service - 24/7 contact details for the managed service provider.
Source: ASD Information Security Manual (ISM)
Plain language
This control is about keeping an organised list of all the outside services you use for things like cloud storage or IT support. It matters because if you don’t know who is managing your important data and when their security was last checked, you might miss a critical issue that could lead to a data breach or service interruption.
Why it matters
Without a managed service register, provider contacts, contracts and assessment due dates are missed, raising unmanaged service and data breach risk.
Operational notes
Keep a register per service: provider, purpose, data classification, contract, user POC, 24/7 contacts, and next assessment due date; update on change.
Implementation tips
- The office manager should create a list of all managed services the organisation uses. They can start by going through invoices or contracts because these documents usually list the service providers and what they do for the company.
- The IT team should assess the sensitivity of the data handled by each service. They can do this by considering what kind of information each service manages, such as personal client details or financial records, and categorise it accordingly.
- The procurement team should ensure that contractual details are well-documented in the register. They should include info like contract start and end dates, renewal terms, and any clauses about data protection to keep track of important deadlines and responsibilities.
- Each managed service should have a designated point of contact within the organisation. Managers should assign this role and record contact details in the register so there's a clear person responsible for communication about each service.
- The IT team should schedule regular security assessments for each managed service. This can be done by setting calendar reminders to review the provider’s security measures and ensuring they meet the organisation’s standards.
Audit / evidence tips
-
Ask: the managed service register: Request a copy of the current register listing all managed services
Good: will show a detailed and up-to-date record with clear contact points for each service
-
Ask: data sensitivity classifications: Request documentation showing how data handled by each service is classified
Good: will have a clear explanation and classification for each type of data handled by the service
-
Ask: the security assessment schedule: Request the timetable or reminders for the next security checks on each service
Good: will show a documented schedule, ensuring ongoing oversight
-
Ask: evidence of contractual arrangements: Request sight of current contracts with each service provider
Good: will include contracts with clear terms and up-to-date validity
-
Ask: who the internal points of contact are: Request identification of the staff responsible for each service
Good: will show named individuals for each service with their responsibilities clearly defined
Cross-framework mappings
How ISM-1737 relates to controls across ISO/IEC 27001, Essential Eight, and ASD ISM.
These mappings show relationships between controls across frameworks. They do not imply full equivalence or certification.
ISO 27001
| Control | Notes | Details |
|---|---|---|
| Partially overlaps (1) | ||
| Annex A 5.9 | Annex A 5.9 requires maintaining an inventory of information and associated assets, including ownership | |
| Supports (3) | ||
| Annex A 5.19 | ISM-1737 requires organisations to maintain a comprehensive managed service register capturing provider details, purpose, data sensitivit... | |
| Annex A 5.20 | ISM-1737 requires documenting contractual arrangements for each managed service in a managed service register, along with who to contact ... | |
| Annex A 5.22 | ISM-1737 requires a managed service register that includes, for each service, the due date for the next security assessment and 24/7 prov... | |
| Related (1) | ||
| Annex A 5.21 | Annex A 5.21 requires defined processes and procedures to manage information security risks associated with ICT supply chain products and... | |