Skip to content
arrow_back
search
ISM-1798 policy ASD Information Security Manual (ISM)

Develop Secure Configuration Guidelines for Software

Provide users with guides to securely set up software configurations.

record_voice_over

Plain language

This control focuses on creating easy-to-follow guides for setting up software in a secure way. It's important because if software isn't configured securely, it could become an easy target for cybercriminals, leading to data breaches or system failures.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

May 2025

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Secure configuration guidance, in the form of a hardening guide or loosening guide, is produced and made available to consumers as part of software development.
policy ASD Information Security Manual (ISM) ISM-1798
priority_high

Why it matters

Without a published hardening/loosening guide, consumers may deploy insecure defaults or misconfigure the software, increasing exploitable attack surface and incidents.

settings

Operational notes

For each release, produce and publish a consumer-facing hardening/loosening guide with recommended settings, rationale, and verification steps; version and host it centrally.

Mapping detail

Mapping

Direction

Controls