Skip to content
arrow_back
search
ISM-1966 policy ASD Information Security Manual (ISM)

Register Management of Organisational Systems

The CISO keeps an updated list of all systems used by the organisation.

record_voice_over

Plain language

The Chief Information Security Officer (CISO) needs to keep an updated list of all systems the organisation uses, like the software and tools everyone relies on every day. This is important because if you don't know what systems are in use, it could lead to outdated or insecure systems slipping through the cracks, increasing the risk of hacking or system failures.

Framework

ASD Information Security Manual (ISM)

Control effect

Proactive

Classifications

NC, OS, P, S, TS

ISM last updated

Nov 2024

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

The CISO develops, implements, maintains and verifies on a regular basis a register of systems used by their organisation.
policy ASD Information Security Manual (ISM) ISM-1966
priority_high

Why it matters

Without a current register of organisational systems, unknown or unmanaged systems can be missed for monitoring, patching and decommissioning, increasing breach and outage risk.

settings

Operational notes

Review and verify the system register monthly by reconciling it with asset discovery/CMDB data; record system owner, purpose, location and lifecycle status (new/changed/decommissioned).

Mapping detail

Mapping

Direction

Controls