Skip to content
arrow_back
search
ISM-1916 policy ASD Information Security Manual (ISM)

Ensure Server Application Configurations Are Approved

Organisations should create and maintain approved settings for server software to ensure security.

record_voice_over

Plain language

This control means that organisations should develop and stick to a set of approved settings for their server software to keep things secure. If this isn't done, servers may become vulnerable to attacks, which could result in data breaches, loss of customer trust, or financial harm.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Feb 2024

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Approved configurations for server applications are developed, implemented and maintained.
policy ASD Information Security Manual (ISM) ISM-1916
priority_high

Why it matters

Without approved server application configurations, insecure settings can be introduced, enabling exploitation and causing data breaches and loss of trust.

settings

Operational notes

Review and update approved server application configuration baselines regularly; enforce change control to prevent unauthorised configuration changes.

Mapping detail

Mapping

Direction

Controls