Skip to content
arrow_back
search
ISM-1915 policy ASD Information Security Manual (ISM)

Ensure User Application Configurations are Approved

Make sure that all user applications follow approved setup guidelines to keep systems secure.

record_voice_over

Plain language

This control means making sure every application your team uses is set up in a secure way that's been officially approved. It's important because if apps are left unsecured, hackers might find ways to sneak into your systems, steal data, or damage your reputation.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Feb 2024

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Approved configurations for user applications are developed, implemented and maintained.
policy ASD Information Security Manual (ISM) ISM-1915
priority_high

Why it matters

Unapproved user application configurations can weaken security settings, enabling exploitation, data compromise and disruption to business operations.

settings

Operational notes

Maintain approved application baselines; routinely compare deployed settings to the baseline, and require security approval and change records for any deviations.

Mapping detail

Mapping

Direction

Controls