Skip to content
arrow_back
search
ISM-2071 policy ASD Information Security Manual (ISM)

Training on Managing Social Engineering Threats

Staff handling user accounts learn to identify and handle social engineering threats.

record_voice_over

Plain language

This control is about teaching the people who manage user accounts how to recognise and deal with social engineering threats, like phishing emails or fake phone calls. It's important because if these threats aren't managed correctly, bad actors could trick someone into giving away confidential information, potentially leading to data breaches or financial loss.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Aug 2025

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Personnel dealing with user account details are advised of what social engineering attacks are, how to manage such situations and how to report them.
policy ASD Information Security Manual (ISM) ISM-2071
priority_high

Why it matters

Without training on social engineering, staff handling account details may be tricked by phishing or impersonation, leading to credential compromise and unauthorised access to sensitive information.

settings

Operational notes

Run annual training for staff handling account details; include phishing/impersonation examples and clear reporting steps. Refresh quarterly with updated scenarios and periodic mock-phishing drills.

Mapping detail

Mapping

Direction

Controls