Skip to content
arrow_back
search
ISM-1819 policy ASD Information Security Manual (ISM)

Enact Cyber Security Incident Response Plans

When a cyber incident is identified, the organisation activates its response plan.

record_voice_over

Plain language

Having a cyber security incident response plan in place and ready to go is like having a fire drill plan for emergencies. If a cyber attack happens and there’s no plan, the organisation could suffer extensive damage, financial losses, and harm to its reputation due to a delayed or ineffective response.

Framework

ASD Information Security Manual (ISM)

Control effect

Responsive

Classifications

NC, OS, P, S, TS

ISM last updated

Nov 2023

Control Stack last updated

19 Mar 2026

E8 maturity levels

ML2, ML3

Official control statement

Following the identification of a cyber security incident, the cyber security incident response plan is enacted.
policy ASD Information Security Manual (ISM) ISM-1819
priority_high

Why it matters

Delayed incident response can lead to prolonged breaches, escalating costs, data loss, and significant reputational harm.

settings

Operational notes

Run incident response exercises and confirm triggers, roles and contacts so the plan is enacted immediately after incident identification.

Mapping detail

Mapping

Direction

Controls