Skip to content
arrow_back
search
ISM-1967 policy ASD Information Security Manual (ISM)

Ensure Security Assessment of TOP SECRET Systems

System owners and officers ensure TOP SECRET systems are correctly assessed for security measures.

record_voice_over

Plain language

If you own a system that stores top secret information, you need to make sure it's properly checked for security. This is crucial because if something isn’t secure, sensitive information might be exposed, which could cause major damage to national security or your organisation's reputation.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

TS

ISM last updated

Feb 2025

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

System owners, in consultation with each system's authorising officer, ensure controls for each TOP SECRET system and its operating environment, including each sensitive compartmented information system and its operating environment, undergo a security assessment by ASD assessors (or their delegates) to determine if they have been implemented correctly and are operating as intended.
policy ASD Information Security Manual (ISM) ISM-1967
priority_high

Why it matters

If ASD assessors do not assess TOP SECRET controls and operating environments, weaknesses may go undetected, enabling compromise of compartmented information and national security harm.

settings

Operational notes

Schedule ASD (or delegate) assessments for each TOP SECRET system and its operating environment; track findings and evidence of correct operation, then provide results to the authorising officer.

Mapping detail

Mapping

Direction

Controls