Skip to content
arrow_back
search
ISM-1913 policy ASD Information Security Manual (ISM)

Develop and Maintain Approved IT Configurations

Ensure IT equipment is set up with approved configurations to enhance security.

record_voice_over

Plain language

This control is about making sure all your computer and IT devices are set up in a way that's been officially approved to keep your business safe from cyber threats. If your hardware and software settings aren’t configured correctly, it makes it easier for hackers and malware to cause trouble, potentially leading to data breaches or loss of sensitive information.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

May 2024

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Approved configurations for IT equipment are developed, implemented and maintained.
policy ASD Information Security Manual (ISM) ISM-1913
priority_high

Why it matters

If approved configuration baselines aren’t maintained, systems drift into insecure states, creating gaps and inconsistent hardening that can be exploited for unauthorised access.

settings

Operational notes

Define approved baseline builds, deploy via configuration management, and routinely verify against the baseline; investigate and remediate drift and only apply changes via approved change control.

Mapping detail

Mapping

Direction

Controls