Skip to content
arrow_back
search
ISM-1914 policy ASD Information Security Manual (ISM)

Ensure Operating Systems Have Approved Configurations

Organisations must create and maintain approved configurations for all operating systems.

record_voice_over

Plain language

This control is all about making sure your computers and servers follow a set of approved rules about how they should be set up. This is important because a computer that isn't set up right can act like an unlocked door, letting in viruses or hackers who can steal data and cause chaos in your business.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Feb 2024

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Approved configurations for operating systems are developed, implemented and maintained.
policy ASD Information Security Manual (ISM) ISM-1914
priority_high

Why it matters

Without approved OS configurations, insecure defaults and configuration drift increase vulnerability exposure, enabling compromise, data breaches and outages.

settings

Operational notes

Define approved OS hardening baselines, deploy via configuration management, and regularly scan for drift; remediate deviations or document exceptions via change control.

Mapping detail

Mapping

Direction

Controls