Skip to content

ISM CONTROL INDEX

ISM ControlStatement
ism-0027

System owners obtain authorisation to operate each system from its authorising officer based on the acceptance of the security risks associated with its operation.

ism-0039

A cyber security strategy is developed, implemented and maintained.

ism-0041

Systems have a system security plan that includes a description of the system and an annex that covers both applicable controls from this document and any additional controls that have been identified.

ism-0042

System administration processes, and supporting system administration procedures, are developed, implemented and maintained.

ism-0043

Systems have an incident response plan that covers the following:

  • guidelines on what constitutes a cyber security incident
  • the types of cyber security incidents likely to be encountered and the expected response to each type
  • how to report cyber security incidents, internally to an organisation and externally to relevant authorities
  • other parties which need to be informed in the event of a cyber security incident
  • the authority, or authorities, responsible for investigating and responding to cyber security incidents
  • the criteria by which an investigation of a cyber security incident would be requested from a law enforcement agency, the Australian Cyber Security Centre or other relevant authority
  • the steps necessary to ensure the integrity of evidence relating to a cyber security incident
  • system contingency measures or a reference to such details if they are located in a separate document.
ism-0047

Organisational-level security documentation is approved by the Chief Information Security Officer while system-specific security documentation is approved by the system’s authorising officer.

ism-0072

Security requirements associated with the confidentiality, integrity and availability of data are documented in contractual arrangements with service providers and reviewed on a regular and ongoing basis to ensure they remain fit for purpose.

ism-0078

Systems processing, storing or communicating AUSTEO or AGAO data remain at all times under the control of an Australian national working for or on behalf of the Australian Government.

ism-0100

Gateways undergo a security assessment by an IRAP assessor at least every 24 months.

ism-0109

Event logs are analysed in a timely manner to detect cyber security events.

ism-0120

Cyber security personnel have access to sufficient data sources and tools to ensure that systems can be monitored for key indicators of compromise.

ism-0123

Cyber security incidents are reported to the Chief Information Security Officer, or one of their delegates, as soon as possible after they occur or are discovered.

ism-0125

A cyber security incident register is developed, implemented and maintained.

ism-0133

When a data spill occurs, data owners are advised and access to the data is restricted.

ism-0137

Legal advice is sought before allowing intrusion activity to continue on a system for the purpose of collecting further data or evidence.

ism-0138

The integrity of evidence gathered during an investigation is maintained by investigators:

  • recording all of their actions
  • maintaining a proper chain of custody
  • following all instructions provided by relevant law enforcement agencies.
ism-0140

Cyber security incidents are reported to the ACSC as soon as possible after they occur or are discovered.

ism-0141

The requirement for service providers to report cyber security incidents to a designated point of contact as soon as possible after they occur or are discovered is documented in contractual arrangements with service providers.

ism-0142

The compromise or suspected compromise of cryptographic equipment or associated keying material is reported to the Chief Information Security Officer, or one of their delegates, as soon as possible after it occurs.

ism-0161

ICT equipment and media are secured when not in use.

ism-0164

Unauthorised people are prevented from observing systems, in particular workstation displays and keyboards, within facilities.

ism-0181

Cabling infrastructure is installed in accordance with relevant Australian Standards, as directed by the Australian Communications and Media Authority.

ism-0187

SECRET cables, when bundled together or run in conduit, are run exclusively in their own individual cable bundle or conduit.

ism-0194

In shared facilities, a visible smear of conduit glue is used to seal all plastic conduit joints and TOP SECRET conduits connected by threaded lock nuts.

ism-0195

In shared facilities, uniquely identifiable SCEC-approved tamper-evident seals are used to seal all removable covers on TOP SECRET cable reticulation systems.

ism-0198

When penetrating a TOP SECRET audio secure room, the Australian Security Intelligence Organisation is consulted and all directions provided are complied with.

ism-0201

Labels for TOP SECRET conduits are a minimum size of 2.5 cm x 1 cm, attached at five-metre intervals and marked as ‘TS RUN’.

ism-0206

Cable labelling processes, and supporting cable labelling procedures, are developed, implemented and maintained.

ism-0208

A cable register contains the following for each cable:

  • cable identifier
  • cable colour
  • sensitivity/classification
  • source
  • destination
  • location
  • seal numbers (if applicable).
ism-0211

A cable register is developed, implemented, maintained and verified on a regular basis.

ism-0213

SECRET and TOP SECRET cables are terminated on their own individual patch panels.

ism-0216

TOP SECRET patch panels are installed in individual TOP SECRET cabinets.

ism-0217

Where spatial constraints demand non-TOP SECRET patch panels be installed in the same cabinet as a TOP SECRET patch panel:

  • a physical barrier in the cabinet is provided to separate patch panels
  • only personnel holding a Positive Vetting security clearance have access to the cabinet
  • approval from the TOP SECRET system’s authorising officer is obtained prior to installation.
ism-0218

If TOP SECRET fibre-optic fly leads exceeding five metres in length are used to connect wall outlet boxes to ICT equipment, they are run in a protective and easily inspected pathway that is clearly labelled at the ICT equipment end with the wall outlet box’s identifier.

ism-0225

Unauthorised RF and IR devices are not brought into SECRET and TOP SECRET areas.

ism-0229

Personnel are advised of the permitted sensitivity or classification of information that can be discussed over both internal and external telephone systems.

ism-0230

Personnel are advised of security risks posed by non-secure telephone systems in areas where sensitive or classified conversations can occur.

ism-0231

When using cryptographic equipment to permit different levels of conversation for different kinds of connections, telephone systems give a visual indication of what kind of connection has been made.

ism-0232

Telephone systems used for sensitive or classified conversations encrypt all traffic that passes over external systems.

ism-0233

Cordless telephone handsets and headsets are not used for sensitive or classified conversations unless all communications are encrypted.

ism-0235

Speakerphones are not used on telephone systems in TOP SECRET areas unless the telephone system is located in an audio secure room, the room is audio secure during conversations and only personnel involved in conversations are present in the room.

ism-0236

Off-hook audio protection features are used on telephone systems in areas where background conversations may exceed the sensitivity or classification that the telephone system is authorised for communicating.

ism-0240

Paging, Multimedia Message Service, Short Message Service and messaging apps are not used to communicate sensitive or classified data.

ism-0241

When sending fax messages, the fax message is encrypted to an appropriate level to be communicated over unsecured telecommunications infrastructure.

ism-0245

A direct connection from an MFD to a digital telephone system is not enabled unless the digital telephone system is authorised to operate at the same sensitivity or classification as the network to which the MFD is connected.

ism-0246

An emanation security threat assessment is sought as early as possible in a system’s life cycle as implementing emanation security can have significant cost implications.

ism-0247

System owners deploying SECRET or TOP SECRET systems with Radio Frequency transmitters inside or co-located with their facility contact the ACSC for an emanation security threat assessment and implement any additional installation criteria derived from the threat assessment.

ism-0248

System owners deploying OFFICIAL or PROTECTED systems with Radio Frequency transmitters that will be co-located with SECRET or TOP SECRET systems contact the ACSC for an emanation security threat assessment and implement any additional installation criteria derived from the threat assessment.

ism-0249

System owners deploying systems or military platforms overseas contact the ACSC for an emanation security threat assessment and implement any additional installation criteria derived from the threat assessment.

ism-0250

ICT equipment meets industry and government standards relating to electromagnetic interference/electromagnetic compatibility.

ism-0252

Cyber security awareness training is undertaken annually by all personnel and covers:

  • the purpose of the cyber security awareness training
  • security appointments and contacts
  • authorised use of systems and their resources
  • protection of systems and their resources
  • reporting of cyber security incidents and suspected compromises of systems and their resources.
ism-0258

A web usage policy is developed, implemented and maintained.

ism-0260

All web access, including that by internal servers, is conducted through web proxies.

ism-0261

The following details are logged for websites accessed via web proxies:

  • address
  • date and time
  • user
  • amount of data uploaded and downloaded
  • internal and external IP addresses.
ism-0263

TLS traffic communicated through gateways is decrypted and inspected.

ism-0264

An email usage policy is developed, implemented and maintained.

ism-0267

Access to non-approved webmail services is blocked.

ism-0269

Emails containing Australian Eyes Only, Australian Government Access Only or Releasable To data are not sent to email distribution lists unless the nationality of all members of email distribution lists can be confirmed.

ism-0270

Protective markings are applied to emails and reflect the highest sensitivity or classification of the subject, body and attachments.

ism-0271

Protective marking tools do not automatically insert protective markings into emails.

ism-0272

Protective marking tools do not allow users to select protective markings that a system has not been authorised to process, store or communicate.

ism-0280

If procuring an evaluated product, a product that has completed a PP-based evaluation, including against all applicable PP modules, is selected in preference to one that has completed an EAL-based evaluation.

ism-0285

Evaluated products are delivered in a manner consistent with any delivery procedures defined in associated evaluation documentation.

ism-0286

When procuring high assurance ICT equipment, the ACSC is contacted for any equipment-specific delivery procedures.

ism-0289

Evaluated products are installed, configured, administered and operated in an evaluated configuration and in accordance with vendor guidance.

ism-0290

High assurance ICT equipment is installed, configured, administered and operated in an evaluated configuration and in accordance with ACSC guidance.

ism-0293

ICT equipment is classified based on the highest sensitivity or classification of data that it is approved for processing, storing or communicating.

ism-0294

ICT equipment, with the exception of high assurance ICT equipment, is labelled with protective markings reflecting its sensitivity or classification.

ism-0296

The ACSC’s approval is sought before applying labels to external surfaces of high assurance ICT equipment.

ism-0298

A centralised and managed approach that maintains the integrity of patches or updates, and confirms that they have been applied successfully, is used to patch or update applications, operating systems, drivers and firmware.

ism-0300

Patches, updates or vendor mitigations for security vulnerabilities in high assurance ICT equipment are applied only when approved by the ACSC, and in doing so, using methods and timeframes prescribed by the ACSC.

ism-0304

Applications that are no longer supported by vendors are removed.

ism-0305

Maintenance and repairs of ICT equipment is carried out on site by an appropriately cleared technician.

ism-0306

If an uncleared technician is used to undertake maintenance or repairs of ICT equipment, the technician is escorted by someone who:

  • is appropriately cleared and briefed
  • takes due care to ensure that data is not disclosed
  • takes all responsible measures to ensure the integrity of the ICT equipment
  • has the authority to direct the technician
  • is sufficiently familiar with the ICT equipment to understand the work being performed.
ism-0307

If an uncleared technician is used to undertake maintenance or repairs of ICT equipment, the ICT equipment and associated media is sanitised before maintenance or repair work is undertaken.

ism-0310

ICT equipment maintained or repaired off site is done so at facilities approved for handling the sensitivity or classification of the ICT equipment.

ism-0311

ICT equipment containing media is sanitised by removing the media from the ICT equipment or by sanitising the media in situ.

ism-0312

ICT equipment, including associated media, that is located overseas and has processed, stored or communicated AUSTEO or AGAO data that cannot be sanitised in situ, is returned to Australia for destruction.

ism-0313

ICT equipment sanitisation processes, and supporting ICT equipment sanitisation procedures, are developed, implemented and maintained.

ism-0315

High assurance ICT equipment is destroyed prior to its disposal.

ism-0316

Following sanitisation, destruction or declassification, a formal administrative decision is made to release ICT equipment, or its waste, into the public domain.

ism-0317

At least three pages of random text with no blank areas are printed on each colour printer cartridge or MFD print drum.

ism-0318

When unable to sanitise printer cartridges or MFD print drums, they are destroyed as per electrostatic memory devices.

ism-0321

When disposing of ICT equipment that has been designed or modified to meet emanation security standards, the ACSC is contacted for requirements relating to its disposal.

ism-0323

Media is classified to the highest sensitivity or classification of data it stores, unless the media has been classified to a higher sensitivity or classification.

ism-0325

Any media connected to a system with a higher sensitivity or classification than the media is reclassified to the higher sensitivity or classification, unless the media is read-only or the system has a mechanism through which read-only access can be ensured.

ism-0330

Before reclassifying media to a lower sensitivity or classification, the media is sanitised or destroyed, and a formal administrative decision is made to reclassify it.

ism-0332

Media, with the exception of internally mounted fixed media within ICT equipment, is labelled with protective markings reflecting its sensitivity or classification.

ism-0336

An ICT equipment register is developed, implemented, maintained and verified on a regular basis.

ism-0337

Media is only used with systems that are authorised to process, store or communicate its sensitivity or classification.

ism-0341

Automatic execution features for removable media are disabled.

ism-0343

If there is no business requirement for writing to removable media and devices, such functionality is disabled via the use of device access control software or by disabling external communication interfaces.

ism-0345

External communication interfaces that allow DMA are disabled.

ism-0347

When transferring data manually between two systems belonging to different security domains, write-once media is used unless the destination system has a mechanism through which read-only access can be ensured.

ism-0348

Media sanitisation processes, and supporting media sanitisation procedures, are developed, implemented and maintained.

ism-0350

The following media types are destroyed prior to their disposal:

  • microfiche and microfilm
  • optical discs
  • programmable read-only memory
  • read-only memory
  • other types of media that cannot be sanitised.
ism-0351

Volatile media is sanitised by removing its power for at least 10 minutes.

ism-0352

SECRET and TOP SECRET volatile media is sanitised by overwriting it at least once in its entirety with a random pattern followed by a read back for verification.

ism-0354

Non-volatile magnetic media is sanitised by overwriting it at least once (or three times if pre-2001 or under 15 GB) in its entirety with a random pattern followed by a read back for verification.

ism-0356

Following sanitisation, SECRET and TOP SECRET non-volatile magnetic media retains its classification.

ism-0357

Non-volatile EPROM media is sanitised by applying three times the manufacturer’s specified ultraviolet erasure time and then overwriting it at least once in its entirety with a random pattern followed by a read back for verification.

ism-0358

Following sanitisation, SECRET and TOP SECRET non-volatile EPROM and EEPROM media retains its classification.

ism-0359

Non-volatile flash memory media is sanitised by overwriting it at least twice in its entirety with a random pattern followed by a read back for verification.

ism-0360

Following sanitisation, SECRET and TOP SECRET non-volatile flash memory media retains its classification.

ism-0361

Magnetic media is destroyed using a degausser with a suitable magnetic field strength and magnetic orientation.

ism-0362

Product-specific directions provided by degausser manufacturers are followed.

ism-0363

Media destruction processes, and supporting media destruction procedures, are developed, implemented and maintained.

ism-0368

Media destroyed using a hammer mill, disintegrator, grinder/sander or by cutting results in media waste particles no larger than 9 mm.

ism-0370

The destruction of media is performed under the supervision of at least one person cleared to its sensitivity or classification.

ism-0371

Personnel supervising the destruction of media supervise its handling to the point of destruction and ensure that the destruction is completed successfully.

ism-0372

The destruction of media storing accountable material is performed under the supervision of at least two personnel cleared to its sensitivity or classification.

ism-0373

Personnel supervising the destruction of media storing accountable material supervise its handling to the point of destruction, ensure that the destruction is completed successfully and sign a destruction certificate afterwards.

ism-0374

Media disposal processes, and supporting media disposal procedures, are developed, implemented and maintained.

ism-0375

Following sanitisation, destruction or declassification, a formal administrative decision is made to release media, or its waste, into the public domain.

ism-0378

Labels and markings indicating the owner, sensitivity, classification or any other marking that can associate media with its prior use are removed prior to its disposal.

ism-0380

Unneeded accounts, components, services and functionality of operating systems are disabled or removed.

ism-0382

Unprivileged users do not have the ability to uninstall or disable approved software.

ism-0383

Default accounts or credentials for operating systems, including for any pre-configured accounts, are changed.

ism-0385

Servers maintain effective functional separation with other servers allowing them to operate independently.

ism-0393

Databases and their contents are classified based on the sensitivity or classification of data that they contain.

ism-0400

Development, testing and production environments are segregated.

ism-0401

Secure-by-design and secure-by-default principles, use of memory-safe programming languages where possible, and secure programming practices are used as part of application development.

ism-0402

Applications are comprehensively tested for security vulnerabilities, using both static application security testing and dynamic application security testing, prior to their initial release and any subsequent releases.

ism-0405

Requests for unprivileged access to systems, applications and data repositories are validated when first requested.

ism-0407

A secure record is maintained for the life of each system covering:

  • all personnel authorised to access the system, and their user identification
  • who provided authorisation for access
  • when access was granted
  • the level of access that was granted
  • when access, and the level of access, was last reviewed
  • when the level of access was changed, and to what extent (if applicable)
  • when access was withdrawn (if applicable).
ism-0408

Systems have a logon banner that requires users to acknowledge and accept their security responsibilities before access is granted.

ism-0409

Foreign nationals, including seconded foreign nationals, do not have access to systems that process, store or communicate AUSTEO or REL data unless effective controls are in place to ensure such data is not accessible to them.

ism-0411

Foreign nationals, excluding seconded foreign nationals, do not have access to systems that process, store or communicate AGAO data unless effective controls are in place to ensure such data is not accessible to them.

ism-0414

Personnel granted access to a system and its resources are uniquely identifiable.

ism-0415

The use of shared user accounts is strictly controlled, and personnel using such accounts are uniquely identifiable.

ism-0417

When systems cannot support multi-factor authentication, single-factor authentication using passphrases is implemented instead.

ism-0418

Credentials are kept separate from systems they are used to authenticate to, except for when performing authentication activities.

ism-0420

Where a system processes, stores or communicates AUSTEO, AGAO or REL data, personnel who are foreign nationals are identified as such, including by their specific nationality.

ism-0421

Passphrases used for single-factor authentication are at least 4 random words with a total minimum length of 14 characters, unless more stringent requirements apply.

ism-0422

Passphrases used for single-factor authentication on TOP SECRET systems are at least 6 random words with a total minimum length of 20 characters.

ism-0428

Systems are configured with a session or screen lock that:

  • activates after a maximum of 15 minutes of user inactivity, or if manually activated by users
  • conceals all session content on the screen
  • ensures that the screen does not enter a power saving state before the session or screen lock is activated
  • requires users to authenticate to unlock the session
  • denies users the ability to disable the session or screen locking mechanism.
ism-0430

Access to systems, applications and data repositories is removed or suspended on the same day personnel no longer have a legitimate requirement for access.

ism-0432

Access requirements for a system and its resources are documented in its system security plan.

ism-0434

Personnel undergo appropriate employment screening and, where necessary, hold an appropriate security clearance before being granted access to a system and its resources.

ism-0435

Personnel receive any necessary briefings before being granted access to a system and its resources.

ism-0441

When personnel are granted temporary access to a system, effective controls are put in place to restrict their access to only data required for them to undertake their duties.

ism-0443

Temporary access is not granted to systems that process, store or communicate caveated or sensitive compartmented information.

ism-0445

Privileged users are assigned a dedicated privileged account to be used solely for tasks requiring privileged access.

ism-0446

Foreign nationals, including seconded foreign nationals, do not have privileged access to systems that process, store or communicate AUSTEO or REL data.

ism-0447

Foreign nationals, excluding seconded foreign nationals, do not have privileged access to systems that process, store or communicate AGAO data.

ism-0455

Where practical, cryptographic equipment and software provides a means of data recovery to allow for circumstances where the encryption key is unavailable due to loss, damage or failure.

ism-0457

Cryptographic equipment or software that has completed a Common Criteria evaluation against a Protection Profile is used when encrypting media that contains OFFICIAL: Sensitive or PROTECTED data.

ism-0459

Full disk encryption, or partial encryption where access controls will only allow writing to the encrypted partition, is implemented when encrypting data at rest.

ism-0460

ASD-approved HACE is used when encrypting media that contains SECRET or TOP SECRET data.

ism-0462

When a user authenticates to the encryption functionality of ICT equipment or media, it is treated in accordance with its original sensitivity or classification until the user deauthenticates from the encryption functionality.

ism-0465

Cryptographic equipment or software that has completed a Common Criteria evaluation against a Protection Profile is used to protect OFFICIAL: Sensitive or PROTECTED data when communicated over insufficiently secure networks, outside of appropriately secure areas or via public network infrastructure.

ism-0467

ASD-approved HACE is used to protect SECRET and TOP SECRET data when communicated over insufficiently secure networks, outside of appropriately secure areas or via public network infrastructure.

ism-0469

An ASD-Approved Cryptographic Protocol (AACP) or high assurance cryptographic protocol is used to protect data when communicated over network infrastructure.

ism-0471

Only AACAs or high assurance cryptographic algorithms are used by cryptographic equipment and software.

ism-0472

When using DH for agreeing on encryption session keys, a modulus of at least 2048 bits is used, preferably 3072 bits.

ism-0473

When using DSA for digital signatures, a modulus of at least 2048 bits is used.

ism-0474

When using ECDH for agreeing on encryption session keys, a base point order and key size of at least 224 bits is used, preferably the NIST P-384 curve.

ism-0475

When using ECDSA for digital signatures, a base point order and key size of at least 224 bits is used, preferably the P-384 curve.

ism-0476

When using RSA for digital signatures, and passing encryption session keys or similar keys, a modulus of at least 2048 bits is used, preferably 3072 bits.

ism-0477

When using RSA for digital signatures, and for passing encryption session keys or similar keys, a different key pair is used for digital signatures and passing encrypted session keys.

ism-0479

Symmetric cryptographic algorithms are not used in Electronic Codebook Mode.

ism-0481

Only AACPs or high assurance cryptographic protocols are used by cryptographic equipment and software.

ism-0484

The SSH daemon is configured to:

  • only listen on the required interfaces (ListenAddress xxx.xxx.xxx.xxx)
  • have a suitable login banner (Banner x)
  • have a login authentication timeout of no more than 60 seconds (LoginGraceTime 60)
  • disable host-based authentication (HostbasedAuthentication no)
  • disable rhosts-based authentication (IgnoreRhosts yes)
  • disable the ability to login directly as root (PermitRootLogin no)
  • disable empty passwords (PermitEmptyPasswords no)
  • disable connection forwarding (AllowTCPForwarding no)
  • disable gateway ports (GatewayPorts no)
  • disable X11 forwarding (X11Forwarding no).
ism-0485

Public key-based authentication is used for SSH connections.

ism-0487

When using logins without a passphrase for SSH connections, the following are disabled:

  • access from IP addresses that do not require access
  • port forwarding
  • agent credential forwarding
  • X11 display remoting
  • console access.
ism-0488

If using remote access without the use of a passphrase for SSH connections, the ‘forced command’ option is used to specify what command is executed and parameter checking is enabled.

ism-0489

When SSH-agent or similar key caching programs are used, it is limited to workstations and servers with screen locks and key caches that are set to expire within four hours of inactivity.

ism-0490

Versions of S/MIME earlier than S/MIME version 3.0 are not used for S/MIME connections.

ism-0494

Tunnel mode is used for IPsec connections; however, if using transport mode, an IP tunnel is used.

ism-0496

The ESP protocol is used for authentication and encryption of IPsec connections.

ism-0498

A security association lifetime of less than four hours (14400 seconds) is used for IPsec connections.

ism-0499

All communications security and equipment-specific doctrine produced by the ACSC for the management and use of ASD-approved HACE is complied with.

ism-0501

Keyed cryptographic equipment is transported based on the sensitivity or classification of its keying material.

ism-0507

Cryptographic key management processes, and supporting cryptographic key management procedures, are developed, implemented and maintained.

ism-0516

Network documentation includes high-level network diagrams showing all connections into networks and logical network diagrams showing all critical servers, high-value servers, network devices and network security appliances.

ism-0518

Network documentation is developed, implemented, maintained.

ism-0520

Network access controls are implemented on networks to prevent the connection of unauthorised network devices.

ism-0521

IPv6 functionality is disabled in dual-stack network devices unless it is being used.

ism-0529

VLANs are not used to separate network traffic between networks belonging to different security domains.

ism-0530

Network devices managing VLANs are administered from the most trusted security domain.

ism-0534

Unused physical ports on network devices are disabled.

ism-0535

Network devices managing VLANs belonging to different security domains do not share VLAN trunks.

ism-0536

Public wireless networks provided for general public use are segregated from all other organisation networks.

ism-0546

When video conferencing or IP telephony traffic passes through a gateway containing a firewall or proxy, a video-aware or voice-aware firewall or proxy is used.

ism-0547

Video conferencing and IP telephony calls are conducted using a secure real-time transport protocol.

ism-0548

Video conferencing and IP telephony calls are established using a secure session initiation protocol.

ism-0549

Video conferencing and IP telephony traffic is separated physically or logically from other data traffic.

ism-0551

IP telephony is configured such that:

  • IP phones authenticate themselves to the call controller upon registration
  • auto-registration is disabled and only authorised devices are allowed to access the network
  • unauthorised devices are blocked by default
  • all unused and prohibited functionality is disabled.
ism-0553

Authentication and authorisation is used for all actions on a video conferencing network, including call setup and changing settings.

ism-0554

An encrypted and non-replayable two-way authentication scheme is used for call authentication and authorisation.

ism-0555

Authentication and authorisation is used for all actions on an IP telephony network, including registering a new IP phone, changing phone users, changing settings and accessing voicemail.

ism-0556

Workstations are not connected to video conferencing units or IP phones unless the workstation or the device uses Virtual Local Area Networks or similar mechanisms to maintain separation between video conferencing, IP telephony and other data traffic.

ism-0558

IP phones used in public areas do not have the ability to access data networks, voicemail and directory services.

ism-0559

Microphones (including headsets and USB handsets) and webcams are not used with non-SECRET workstations in SECRET areas.

ism-0565

Email servers are configured to block, log and report emails with inappropriate protective markings.

ism-0567

Email servers only relay emails destined for or originating from their domains (including subdomains).

ism-0569

Emails are routed via centralised email gateways.

ism-0570

Where backup or alternative email gateways are in place, they are maintained at the same standard as the primary email gateway.

ism-0571

When users send or receive emails, an authenticated and encrypted channel is used to route emails via their organisation’s centralised email gateways.

ism-0572

Opportunistic TLS encryption is enabled on email servers that make incoming or outgoing email connections over public network infrastructure.

ism-0574

SPF is used to specify authorised email servers (or lack thereof) for an organisation’s domains (including subdomains).

ism-0576

An incident management policy, and associated incident response plan, is developed, implemented and maintained.

ism-0580

An event logging policy is developed, implemented and maintained.

ism-0582

The following events are logged for operating systems:

  • application and operating system crashes and error messages
  • changes to security policies and system configurations
  • successful user logons and logoffs, failed user logons and account lockouts
  • failures, restarts and changes to important processes and services
  • requests to access internet resources
  • security product-related events
  • system startups and shutdowns.
ism-0585

For each event logged, the date and time of the event, the relevant user or process, the relevant filename, the event description, and the ICT equipment involved are recorded.

ism-0588

A fax machine and MFD usage policy is developed, implemented and maintained.

ism-0589

MFDs are not used to scan or copy documents above the sensitivity or classification of networks they are connected to.

ism-0590

Authentication measures for MFDs are the same strength as those used for workstations on networks they are connected to.

ism-0591

Evaluated peripheral switches are used when sharing peripherals between systems.

ism-0597

When planning, designing, implementing or introducing additional connectivity to CDSs, the ACSC is consulted and any directions provided by the ACSC are complied with.

ism-0610

Users are trained on the secure use of CDSs before access is granted.

ism-0611

System administrators for gateways are assigned the minimum privileges required to perform their duties.

ism-0612

System administrators for gateways are formally trained on the operation and management of gateways.

ism-0613

System administrators for gateways that connect to Australian Eyes Only or Releasable To networks are Australian nationals.

ism-0616

Separation of duties is implemented in performing administrative activities for gateways.

ism-0619

Users authenticate to other networks accessed via gateways.

ism-0622

ICT equipment authenticates to other networks accessed via gateways.

ism-0626

CDSs are implemented between SECRET or TOP SECRET networks and any other networks belonging to different security domains.

ism-0628

Gateways are implemented between networks belonging to different security domains.

ism-0629

For gateways between networks belonging to different security domains, any shared components are managed by system administrators for the higher security domain or by system administrators from a mutually-agreed third party.

ism-0631

Gateways only allow explicitly authorised data flows.

ism-0634

The following events are logged for gateways:

  • data packets and data flows permitted through gateways
  • data packets and data flows attempting to leave gateways
  • real-time alerts for attempted intrusions.
ism-0635

CDSs implement isolated upward and downward network paths.

ism-0637

Gateways implement a demilitarised zone if external parties require access to an organisation’s services.

ism-0639

Evaluated firewalls are used between networks belonging to different security domains.

ism-0643

Evaluated diodes are used for controlling the data flow of unidirectional gateways between an organisation’s networks and public network infrastructure.

ism-0645

Evaluated diodes used for controlling the data flow of unidirectional gateways between SECRET or TOP SECRET networks and public network infrastructure complete a high assurance evaluation.

ism-0649

Files imported or exported via gateways or CDSs are filtered for allowed file types.

ism-0651

Files identified by content filtering checks as malicious, or that cannot be inspected, are blocked.

ism-0652

Files identified by content filtering checks as suspicious are quarantined until reviewed and subsequently approved or not approved for release.

ism-0657

When manually importing data to systems, the data is scanned for malicious and active content.

ism-0659

Files imported or exported via gateways or CDSs undergo content filtering checks.

ism-0660

Data transfer logs for SECRET and TOP SECRET systems are fully verified at least monthly.

ism-0661

Users transferring data to and from systems are held accountable for data transfers they perform.

ism-0663

Data transfer processes, and supporting data transfer procedures, are developed, implemented and maintained.

ism-0664

Data exported from SECRET and TOP SECRET systems is reviewed and authorised by a trusted source beforehand.

ism-0665

Trusted sources for SECRET and TOP SECRET systems are limited to people and services that have been authorised as such by the Chief Information Security Officer.

ism-0669

When manually exporting data from SECRET and TOP SECRET systems, digital signatures are validated and keyword checks are performed within all textual data.

ism-0670

All security-relevant events generated by CDSs are logged.

ism-0675

Data authorised for export from SECRET and TOP SECRET systems is digitally signed by a trusted source.

ism-0677

Files imported or exported via gateways or CDSs that have a digital signature or cryptographic checksum are validated.

ism-0682

Bluetooth functionality is not enabled on SECRET and TOP SECRET mobile devices.

ism-0687

Mobile devices do not process, store or communicate SECRET or TOP SECRET data until approved for use by ASD.

ism-0694

Privately-owned mobile devices do not access SECRET and TOP SECRET systems or data.

ism-0701

Mobile device emergency sanitisation processes, and supporting mobile device emergency sanitisation procedures, are developed, implemented and maintained.

ism-0702

If a cryptographic zeroise or sanitise function is provided for cryptographic keys on a SECRET or TOP SECRET mobile device, the function is used as part of mobile device emergency sanitisation processes and procedures.

ism-0705

When accessing an organisation’s network via a VPN connection, split tunnelling is disabled.

ism-0714

A CISO is appointed to provide cyber security leadership and guidance for their organisation.

ism-0717

The CISO oversees the management of cyber security personnel within their organisation.

ism-0718

The CISO reports directly to their organisation’s senior executive or Board on cyber security matters.

ism-0720

The CISO develops, implements and maintains a cyber security communications strategy for their organisation.

ism-0724

The CISO implements cyber security measurement metrics and key performance indicators for their organisation.

ism-0725

The CISO coordinates cyber security and business alignment through a cyber security steering committee or advisory board, comprising of key cyber security and business executives, which meets formally and on a regular basis.

ism-0726

The CISO coordinates security risk management activities between cyber security and business teams.

ism-0731

The CISO oversees cyber supply chain risk management activities for their organisation.

ism-0732

The CISO receives and manages a dedicated cyber security budget for their organisation.

ism-0733

The CISO is fully aware of all cyber security incidents within their organisation.

ism-0734

The CISO contributes to the development and maintenance of business continuity and disaster recovery plans for their organisation to ensure that business-critical services are supported appropriately in the event of a disaster.

ism-0735

The CISO oversees the development, implementation and maintenance of their organisation’s cyber security awareness training program.

ism-0810

Systems are secured in facilities that meet the requirements for a security zone suitable for their sensitivity or classification.

ism-0813

Server rooms, communications rooms, security containers and secure rooms are not left in unsecured states.

ism-0817

Personnel are advised of what suspicious contact via online services is and how to report it.

ism-0820

Personnel are advised to not post work information to unauthorised online services and to report cases where such information is posted.

ism-0821

Personnel are advised of security risks associated with posting personal information to online services and are encouraged to use any available privacy settings to restrict who can view such information.

ism-0824

Personnel are advised not to send or receive files via unauthorised online services.

ism-0829

Security measures are used to detect and respond to unauthorised RF devices in SECRET and TOP SECRET areas.

ism-0831

Media is handled in a manner suitable for its sensitivity or classification.

ism-0835

Following sanitisation, TOP SECRET volatile media retains its classification if it stored static data for an extended period of time, or had data repeatedly stored on or written to the same memory location for an extended period of time.

ism-0836

Non-volatile EEPROM media is sanitised by overwriting it at least once in its entirety with a random pattern followed by a read back for verification.

ism-0839

The destruction of media storing accountable material is not outsourced.

ism-0840

When outsourcing the destruction of media storing non-accountable material, a National Association for Information Destruction AAA certified destruction service with endorsements, as specified in ASIO’s Protective Security Circular-167, is used.

ism-0843

Application control is implemented on workstations.

ism-0846

All users (with the exception of local administrator accounts and break glass accounts) cannot disable, bypass or be exempted from application control.

ism-0853

On a daily basis, outside of business hours and after an appropriate period of inactivity, user sessions are terminated and workstations are restarted.

ism-0854

AUSTEO and AGAO data can only be accessed from systems under the sole control of the Australian Government that are located within facilities authorised by the Australian Government.

ism-0859

Event logs, excluding those for Domain Name System services and web proxies, are retained for at least seven years.

ism-0861

DKIM signing is enabled on emails originating from an organisation’s domains (including subdomains).

ism-0863

Mobile devices prevent personnel from installing or uninstalling non-approved applications once provisioned.

ism-0864

Mobile devices prevent personnel from disabling or modifying security functionality once provisioned.

ism-0866

Sensitive or classified data is not viewed or communicated in public locations unless care is taken to reduce the chance of the screen of a mobile device being observed.

ism-0869

Mobile devices encrypt their internal storage and any removable media.

ism-0870

Mobile devices are carried or stored in a secured state when not being actively used.

ism-0871

Mobile devices are kept under continual direct supervision when being actively used.

ism-0874

Mobile devices access the internet via a VPN connection to an organisation’s internet gateway rather than via a direct connection to the internet.

ism-0888

Security documentation is reviewed at least annually and includes a ‘current as at [date]’ or equivalent statement.

ism-0917

When malicious code is detected, the following steps are taken to handle the infection:

  • the infected systems are isolated
  • all previously connected media used in the period leading up to the infection are scanned for signs of infection and isolated if necessary
  • antivirus software is used to remove the infection from infected systems and media
  • if the infection cannot be reliably removed, systems are restored from a known good backup or rebuilt.
ism-0926

OFFICIAL and PROTECTED cables are coloured neither salmon pink nor red.

ism-0931

In SECRET and TOP SECRET areas, push-to-talk handsets or push-to-talk headsets are used to meet any off-hook audio protection requirements.

ism-0938

User applications are chosen from vendors that have demonstrated a commitment to secure-by-design and secure-by-default principles, use of memory-safe programming languages where possible, secure programming practices, and maintaining the security of their products.

ism-0947

When transferring data manually between two systems belonging to different security domains, rewritable media is sanitised after each data transfer.

ism-0955

Application control is implemented using cryptographic hash rules, publisher certificate rules or path rules.

ism-0958

An organisation-approved list of domain names, or list of website categories, is implemented for all Hypertext Transfer Protocol and Hypertext Transfer Protocol Secure traffic communicated through gateways.

ism-0961

Client-side active content is restricted by web content filters to an organisation-approved list of domain names.

ism-0963

Web content filtering is implemented to filter potentially harmful web-based content.

ism-0971

The OWASP Application Security Verification Standard is used in the development of web applications.

ism-0974

Multi-factor authentication is used to authenticate unprivileged users of systems.

ism-0979

Legal advice is sought on the exact wording of logon banners.

ism-0988

An accurate time source is established and used consistently across systems to assist with identifying connections between events.

ism-0991

Event logs for Domain Name System services and web proxies are retained for at least 18 months.

ism-0994

ECDH and ECDSA are used in preference to DH and DSA.

ism-0998

AUTH_HMAC_SHA2_256_128, AUTH_HMAC_SHA2_384_192, AUTH_HMAC_SHA2_512_256 or NONE (only with AES-GCM) is used for authenticating IPsec connections, preferably NONE.

ism-0999

DH or ECDH is used for key establishment of IPsec connections, preferably 384-bit random ECP group, 3072-bit MODP Group or 4096-bit MODP Group.

ism-1000

PFS is used for IPsec connections.

ism-1006

Security measures are implemented to prevent unauthorised access to network management traffic.

ism-1013

The effective range of wireless communications outside an organisation’s area of control is limited by implementing RF shielding on facilities in which SECRET or TOP SECRET wireless networks are used.

ism-1014

Individual logins are implemented for IP phones used for SECRET or TOP SECRET conversations.

ism-1019

A denial of service response plan for video conferencing and IP telephony services is developed, implemented and maintained.

ism-1023

The intended recipients of blocked inbound emails, and the senders of blocked outbound emails, are notified.

ism-1024

Notifications of undeliverable emails are only sent to senders that can be verified via SPF or other trusted means.

ism-1026

DKIM signatures on incoming emails are verified.

ism-1027

Email distribution list software used by external senders is configured such that it does not break the validity of the sender’s DKIM signature.

ism-1028

A NIDS or NIPS is deployed in gateways between an organisation’s networks and other networks they do not manage.

ism-1030

A NIDS or NIPS is located immediately inside the outermost firewall for gateways and configured to generate event logs and alerts for network traffic that contravenes any rule in a firewall ruleset.

ism-1034

A HIPS is implemented on critical servers and high-value servers.

ism-1036

Fax machines and MFDs are located in areas where their use can be observed.

ism-1037

Gateways undergo testing following configuration changes, and at regular intervals no more than six months apart, to validate they conform to expected security configurations.

ism-1053

Servers, network devices and cryptographic equipment are secured in server rooms or communications rooms that meet the requirements for a security zone suitable for their sensitivity or classification.

ism-1055

LAN Manager and NT LAN Manager authentication methods are disabled.

ism-1059

All data stored on media is encrypted.

ism-1065

The host-protected area and device configuration overlay table are reset prior to the sanitisation of non-volatile magnetic hard drives.

ism-1067

The ATA secure erase command is used, in addition to block overwriting software, to ensure the growth defects table of non-volatile magnetic hard drives is overwritten.

ism-1071

Each system has a designated system owner.

ism-1073

An organisation’s systems and data are not accessed or administered by a service provider unless a contractual arrangement exists between the organisation and the service provider to do so.

ism-1074

Keys or equivalent access mechanisms to server rooms, communications rooms, security containers and secure rooms are appropriately controlled.

ism-1075

The sender of a fax message makes arrangements for the receiver to collect the fax message as soon as possible after it is sent and for the receiver to notify the sender if the fax message does not arrive in an agreed amount of time.

ism-1076

Televisions and computer monitors with minor burn-in or image persistence are sanitised by displaying a solid white image on the screen for an extended period of time.

ism-1078

A telephone system usage policy is developed, implemented and maintained.

ism-1079

The ACSC’s approval is sought before undertaking any maintenance or repairs to high assurance ICT equipment.

ism-1080

An ASD-Approved Cryptographic Algorithm (AACA) or high assurance cryptographic algorithm is used when encrypting media.

ism-1082

A mobile device usage policy is developed, implemented and maintained.

ism-1083

Personnel are advised of the sensitivity or classification permitted for voice and data communications when using mobile devices.

ism-1084

If unable to carry or store mobile devices in a secured state, they are physically transferred in a security briefcase or an approved multi-use satchel, pouch or transit bag.

ism-1085

Mobile devices encrypt all sensitive or classified data communicated over public network infrastructure.

ism-1088

Personnel report the potential compromise of mobile devices, removable media or credentials to their organisation as soon as possible, especially if they:

  • provide credentials to foreign government officials
  • decrypt mobile devices for foreign government officials
  • have mobile devices taken out of sight by foreign government officials
  • have mobile devices or removable media stolen that are later returned
  • lose mobile devices or removable media that are later found
  • observe unusual behaviour of mobile devices.
ism-1089

Protective marking tools do not allow users replying to or forwarding emails to select protective markings lower than previously used.

ism-1091

Keying material is changed when compromised or suspected of being compromised.

ism-1092

Separate fax machines or MFDs are used for sending sensitive or classified fax messages and all other fax messages.

ism-1095

Wall outlet boxes denote the systems, cable identifiers and wall outlet box identifier.

ism-1096

Cables are labelled at each end with sufficient source and destination details to enable the physical identification and inspection of the cable.

ism-1098

SECRET cables are terminated in an individual cabinet; or for small systems, a cabinet with a division plate between any SECRET cables and non-SECRET cables.

ism-1100

TOP SECRET cables are terminated in an individual TOP SECRET cabinet.

ism-1101

In TOP SECRET areas, cable reticulation systems leading into cabinets in server rooms or communications rooms are terminated as close as possible to the cabinet.

ism-1102

Cable reticulation systems leading into cabinets are terminated as close as possible to the cabinet.

ism-1103

In TOP SECRET areas, cable reticulation systems leading into cabinets not in server rooms or communications rooms are terminated at the boundary of the cabinet.

ism-1105

SECRET and TOP SECRET wall outlet boxes contain exclusively SECRET or TOP SECRET cables.

ism-1107

OFFICIAL and PROTECTED wall outlet boxes are coloured neither salmon pink nor red.

ism-1109

Wall outlet box covers are clear plastic.

ism-1111

Fibre-optic cables are used for cabling infrastructure instead of copper cables.

ism-1112

Cables are inspectable at a minimum of five-metre intervals.

ism-1114

Cable bundles or conduits sharing a common cable reticulation system have a dividing partition or visible gap between each cable bundle and conduit.

ism-1115

Cables from cable trays to wall outlet boxes are run in flexible or plastic conduit.

ism-1116

A visible gap exists between TOP SECRET cabinets and non-TOP SECRET cabinets.

ism-1119

Cables in TOP SECRET areas are fully inspectable for their entire length.

ism-1122

Where wall penetrations exit a TOP SECRET area into a lower classified area, TOP SECRET cables are encased in conduit with all gaps between the TOP SECRET conduit and the wall filled with an appropriate sealing compound.

ism-1123

A power distribution board with a feed from an Uninterruptible Power Supply is used to power all TOP SECRET ICT equipment.

ism-1130

In shared facilities, cables are run in an enclosed cable reticulation system.

ism-1133

In shared facilities, TOP SECRET cables are not run in party walls.

ism-1137

System owners deploying SECRET or TOP SECRET systems in shared facilities contact the ACSC for an emanation security threat assessment and implement any additional installation criteria derived from the threat assessment.

ism-1139

Only the latest version of TLS is used for TLS connections.

ism-1143

Patch management processes, and supporting patch management procedures, are developed, implemented and maintained.

ism-1145

Privacy filters are applied to the screens of SECRET and TOP SECRET mobile devices.

ism-1146

Personnel are advised to maintain separate work and personal accounts for online services.

ism-1151

SPF is used to verify the authenticity of incoming emails.

ism-1157

Evaluated diodes are used for controlling the data flow of unidirectional gateways between networks.

ism-1158

Evaluated diodes used for controlling the data flow of unidirectional gateways between SECRET or TOP SECRET networks and any other networks complete a high assurance evaluation.

ism-1160

If using degaussers to destroy media, degaussers evaluated by the United States’ National Security Agency are used.

ism-1163

Systems have a continuous monitoring plan that includes:

  • conducting vulnerability scans for systems at least fortnightly
  • conducting vulnerability assessments and penetration tests for systems prior to deployment, including prior to deployment of significant changes, and at least annually thereafter
  • analysing identified security vulnerabilities to determine their potential impact
  • implementing mitigations based on risk, effectiveness and cost.
ism-1164

In shared facilities, conduits or the front covers of ducts, cable trays in floors and ceilings, and associated fittings are clear plastic.

ism-1171

Attempts to access websites through their IP addresses instead of their domain names are blocked by web content filters.

ism-1173

Multi-factor authentication is used to authenticate privileged users of systems.

ism-1175

Privileged user accounts are prevented from accessing the internet, email and web services.

ism-1178

Network documentation provided to a third party, or published in public tender documentation, only contains details necessary for other parties to undertake contractual services.

ism-1181

Networks are segregated into multiple network zones according to the criticality of servers, services and data.

ism-1182

Network access controls are implemented to limit network traffic within and between network segments to only those required for business purposes.

ism-1183

A hard fail SPF record is used when specifying authorised email servers (or lack thereof) for an organisation’s domains (including subdomains).

ism-1186

IPv6 capable network security appliances are used on IPv6 and dual-stack networks.

ism-1187

When manually exporting data from systems, the data is checked for unsuitable protective markings.

ism-1192

Gateways inspect and filter data flows at the transport and above network layers.

ism-1195

A Mobile Device Management solution is used to ensure mobile device management policy is applied to all mobile devices.

ism-1196

OFFICIAL and PROTECTED mobile devices are configured to remain undiscoverable to other Bluetooth devices except during Bluetooth pairing.

ism-1198

Bluetooth pairing for OFFICIAL and PROTECTED mobile devices is performed in a manner such that connections are only made between intended Bluetooth devices.

ism-1199

Bluetooth pairings for OFFICIAL and PROTECTED mobile devices are removed when there is no longer a requirement for their use.

ism-1200

Bluetooth pairing for OFFICIAL and PROTECTED mobile devices is performed using Secure Connections, preferably with Numeric Comparison if supported.

ism-1211

System administrators document requirements for administrative activities, consider potential security impacts, obtain any necessary approvals, notify users of any disruptions or outages, and maintain system and security documentation.

ism-1213

Following intrusion remediation activities, full network traffic is captured for at least seven days and analysed to determine whether the adversary has been successfully removed from the system.

ism-1216

SECRET and TOP SECRET cables with non-conformant cable colouring are both banded with the appropriate colour and labelled at inspection points.

ism-1217

Labels and markings indicating the owner, sensitivity, classification or any other marking that can associate ICT equipment with its prior use are removed prior to its disposal.

ism-1218

ICT equipment, including associated media, that is located overseas and has processed, stored or communicated AUSTEO or AGAO data, is sanitised in situ.

ism-1219

MFD print drums and image transfer rollers are inspected and destroyed if there is remnant toner which cannot be removed or a print is visible on the image transfer roller.

ism-1220

Printer and MFD platens are inspected and destroyed if any text or images are retained on the platen.

ism-1221

Printers and MFDs are checked to ensure no pages are trapped in the paper path due to a paper jam.

ism-1222

Televisions and computer monitors that cannot be sanitised are destroyed.

ism-1223

Memory in network devices is sanitised using the following processes, in order of preference:

  • following device-specific guidance provided in evaluation documentation
  • following vendor sanitisation guidance
  • loading a dummy configuration file, performing a factory reset and then reinstalling firmware.
ism-1225

The paper tray of the fax machine is removed, and a fax message with a minimum length of four pages is transmitted, before the paper tray is re-installed to allow a fax summary page to be printed.

ism-1226

Fax machines are checked to ensure no pages are trapped in the paper path due to a paper jam.

ism-1227

Credentials set for user accounts are randomly generated.

ism-1228

Cyber security events are analysed in a timely manner to identify cyber security incidents.

ism-1233

IKE version 2 is used for key exchange when establishing IPsec connections.

ism-1234

Email content filtering is implemented to filter potentially harmful content in email bodies and attachments.

ism-1235

Add-ons, extensions and plug-ins for office productivity suites, web browsers, email clients, PDF software and security products are restricted to an organisation-approved set.

ism-1236

Malicious domain names, dynamic domain names and domain names that can be registered anonymously for free are blocked by web content filters.

ism-1237

Web content filtering is applied to outbound web traffic where appropriate.

ism-1238

Threat modelling is used in support of application development.

ism-1239

Robust web application frameworks are used in the development of web applications.

ism-1240

Validation or sanitisation is performed on all input handled by web applications.

ism-1241

Output encoding is performed on all output produced by web applications.

ism-1243

A database register is developed, implemented, maintained and verified on a regular basis.

ism-1245

All temporary installation files and logs created during server application installation processes are removed after server applications have been installed.

ism-1246

ACSC and vendor hardening guidance for server applications is implemented.

ism-1247

Unneeded accounts, components, services and functionality of server applications are disabled or removed.

ism-1249

Server applications are configured to run as a separate account with the minimum privileges needed to perform their functions.

ism-1250

The accounts under which server applications run have limited access to their underlying server’s file system.

ism-1255

Database users’ ability to access, insert, modify and remove database contents is restricted based on their work duties.

ism-1256

File-based access controls are applied to database files.

ism-1260

Default accounts or credentials for server applications, including for any pre-configured accounts, are changed.

ism-1263

Unique privileged accounts are used for administering individual server applications.

ism-1268

The need-to-know principle is enforced for database contents through the application of minimum privileges, database views and database roles.

ism-1269

Database servers and web servers are functionally separated.

ism-1270

Database servers are placed on a different network segment to user workstations.

ism-1271

Network access controls are implemented to restrict database server communications to strictly defined network resources, such as web servers, application servers and storage area networks.

ism-1272

If only local access to a database is required, networking functionality of database management system software is disabled or directed to listen solely to the localhost interface.

ism-1273

Development and testing environments do not use the same database servers as production environments.

ism-1274

Database contents from production environments are not used in development or testing environments unless the environment is secured to the same level as the production environment.

ism-1275

All queries to databases from web applications are filtered for legitimate content and correct syntax.

ism-1276

Parameterised queries or stored procedures, instead of dynamically generated queries, are used for database interactions.

ism-1277

Data communicated between database servers and web servers is encrypted.

ism-1278

Web applications are designed or configured to provide as little error information as possible about the structure of databases.

ism-1284

Files imported or exported via gateways or CDSs undergo content validation.

ism-1286

Files imported or exported via gateways or CDSs undergo content conversion.

ism-1287

Files imported or exported via gateways or CDSs undergo content sanitisation.

ism-1288

Files imported or exported via gateways or CDSs undergo antivirus scanning using multiple different scanning engines.

ism-1289

Archive files imported or exported via gateways or CDSs are unpacked in order to undergo content filtering checks.

ism-1290

Archive files are unpacked in a controlled manner to ensure content filter performance or availability is not adversely affected.

ism-1293

Encrypted files imported or exported via gateways or CDSs are decrypted in order to undergo content filtering checks.

ism-1294

Data transfer logs for systems are partially verified at least monthly.

ism-1296

Physical security is implemented to protect network devices in public areas from physical damage or unauthorised access.

ism-1297

Legal advice is sought prior to allowing privately-owned mobile devices to access systems or data.

ism-1298

Personnel are advised of privacy and security risks when travelling overseas with mobile devices.

ism-1299

Personnel take the following precautions when travelling overseas with mobile devices:

  • never leaving mobile devices or removable media unattended for any period of time, including by placing them in checked-in luggage or leaving them in hotel safes
  • never storing credentials with mobile devices that they grant access to, such as in laptop bags
  • never lending mobile devices or removable media to untrusted people, even if briefly
  • never allowing untrusted people to connect their mobile devices or removable media, including for charging
  • never using designated charging stations, wall outlet charging ports or chargers supplied by untrusted people
  • avoiding connecting mobile devices to open or untrusted Wi-Fi networks
  • using a VPN connection to encrypt all mobile device communications
  • using encrypted messaging apps for communications instead of using foreign telecommunication networks
  • disabling any communications capabilities of mobile devices when not in use, such as cellular data, wireless, Bluetooth and Near Field Communication
  • avoiding reuse of removable media once used with other parties’ systems or mobile devices
  • ensuring any removable media used for data transfers are thoroughly checked for malicious code beforehand
  • never using any gifted mobile devices, especially removable media, when travelling or upon returning from travelling.
ism-1300

Upon returning from travelling overseas with mobile devices, personnel take the following actions:

  • sanitise and reset mobile devices, including all removable media
  • decommission any credentials that left their possession during their travel
  • report if significant doubt exists as to the integrity of any mobile devices or removable media.
ism-1304

Default accounts or credentials for network devices including for any pre-configured accounts, are changed.

ism-1311

SNMP version 1 and SNMP version 2 are not used on networks.

ism-1312

All default SNMP community strings on network devices are changed and write access is disabled.

ism-1314

All wireless devices are Wi-Fi Alliance certified.

ism-1315

The administrative interface on wireless access points is disabled for wireless network connections.

ism-1316

Default SSIDs of wireless access points are changed.

ism-1317

SSIDs of non-public wireless networks are not readily associated with an organisation, the location of their premises or the functionality of wireless networks.

ism-1318

SSID broadcasting is not disabled on wireless access points.

ism-1319

Static addressing is not used for assigning IP addresses on wireless networks.

ism-1320

MAC address filtering is not used to restrict which devices can connect to wireless networks.

ism-1321

802.1X authentication with EAP-TLS, using X.509 certificates, is used for mutual authentication; with all other EAP methods disabled on supplications and authentication servers.

ism-1322

Evaluated supplicants, authenticators, wireless access points and authentication servers are used in wireless networks.

ism-1323

Certificates are required for both devices and users accessing wireless networks.

ism-1324

Certificates are generated using an evaluated certificate authority or hardware security module.

ism-1327

Certificates are protected by encryption, user authentication, and both logical and physical access controls.

ism-1330

The PMK caching period is not set to greater than 1440 minutes (24 hours).

ism-1332

WPA3-Enterprise 192-bit mode is used to protect the confidentiality and integrity of all wireless network traffic.

ism-1334

Wireless networks implement sufficient frequency separation from other wireless networks.

ism-1335

Wireless access points enable the use of the 802.11w amendment to protect management frames.

ism-1338

Instead of deploying a small number of wireless access points that broadcast on high power, a greater number of wireless access points that use less broadcast power are deployed to achieve the desired footprint for wireless networks.

ism-1341

A HIPS is implemented on workstations.

ism-1359

A removable media usage policy is developed, implemented and maintained.

ism-1361

Security Construction and Equipment Committee-approved equipment or ASIO-approved equipment is used when destroying media.

ism-1364

Network devices managing VLANs terminate VLANs belonging to different security domains on separate physical network interfaces.

ism-1366

Security updates are applied to mobile devices as soon as they become available.

ism-1369

AES-GCM is used for encryption of TLS connections.

ism-1370

Only server-initiated secure renegotiation is used for TLS connections.

ism-1372

DH or ECDH is used for key establishment of TLS connections.

ism-1373

Anonymous DH is not used for TLS connections.

ism-1374

SHA-2-based certificates are used for TLS connections.

ism-1375

SHA-2 is used for the Hash-based Message Authentication Code (HMAC) and pseudorandom function (PRF) for TLS connections.

ism-1380

Privileged users use separate privileged and unprivileged operating environments.

ism-1381

Only privileged operating environments can communicate with jump servers.

ism-1385

Administrative infrastructure is segregated from the wider network and the internet.

ism-1386

Network management traffic can only originate from administrative infrastructure.

ism-1387

Administrative activities are conducted through jump servers.

ism-1388

Only jump servers can communicate with assets requiring administrative activities to be performed.

ism-1389

Executable files imported via gateways or CDSs are automatically executed in a sandbox to detect any suspicious behaviour.

ism-1392

When implementing application control using path rules, only approved users can modify approved files and write to approved folders.

ism-1395

Service providers, including any subcontractors, provide an appropriate level of protection for any data entrusted to them or their services.

ism-1400

Personnel accessing OFFICIAL and PROTECTED systems or data using a privately-owned mobile device use an ASD-approved platform, a security configuration in accordance with ACSC guidance, and have enforced separation of work and personal data.

ism-1401

Multi-factor authentication uses either: something users have and something users know, or something users have that is unlocked by something users know or are.

ism-1402

Credentials stored on systems are protected by a password manager; a hardware security module; or by salting, hashing and stretching them before storage within a database.

ism-1403

Accounts, except for break glass accounts, are locked out after a maximum of five failed logon attempts.

ism-1404

Unprivileged access to systems and applications is automatically disabled after 45 days of inactivity.

ism-1405

A centralised event logging facility is implemented and event logs are sent to the facility as soon as possible after they occur.

ism-1406

SOEs are used for workstations and servers.

ism-1407

The latest release, or the previous release, of operating systems are used.

ism-1408

Where supported, 64-bit versions of operating systems are used.

ism-1409

ACSC and vendor hardening guidance for operating systems is implemented.

ism-1412

ACSC or vendor hardening guidance for web browsers is implemented.

ism-1416

A software firewall is implemented on workstations and servers to restrict inbound and outbound network connections to an organisation-approved set of applications and services.

ism-1417

Antivirus software is implemented on workstations and servers with:

  • signature-based detection functionality enabled and set to a high level
  • heuristic-based detection functionality enabled and set to a high level
  • reputation rating functionality enabled
  • ransomware protection functionality enabled
  • detection signatures configured to update on at least a daily basis
  • regular scanning configured for all fixed disks and removable media.
ism-1418

If there is no business requirement for reading from removable media and devices, such functionality is disabled via the use of device access control software or by disabling external communication interfaces.

ism-1419

Development and modification of software only takes place in development environments.

ism-1420

Data from production environments is not used in a development or testing environment unless the environment is secured to the same level as the production environment.

ism-1422

Unauthorised access to the authoritative source for software is prevented.

ism-1424

Web applications implement Content-Security-Policy, HSTS and X-Frame-Options via security policy in response headers.

ism-1427

Gateways perform ingress traffic filtering to detect and prevent IP source address spoofing.

ism-1428

Unless explicitly required, IPv6 tunnelling is disabled on all network devices.

ism-1429

IPv6 tunnelling is blocked by network security appliances at externally-connected network boundaries.

ism-1430

Dynamically assigned IPv6 addresses are configured with Dynamic Host Configuration Protocol version 6 in a stateful manner with lease data stored in a centralised event logging facility.

ism-1431

Denial-of-service attack mitigation strategies are discussed with cloud service providers, specifically:

  • their capacity to withstand denial-of-service attacks
  • costs likely to be incurred as a result of denial-of-service attacks
  • availability monitoring and thresholds for notification of denial-of-service attacks
  • thresholds for turning off any online services or functionality during denial-of-service attacks
  • pre-approved actions that can be undertaken during denial-of-service attacks
  • any arrangements with upstream service providers to block malicious network traffic as far upstream as possible.
ism-1432

Domain names for online services are protected via registrar locking and confirming that domain registration details are correct.

ism-1436

Critical online services are segregated from other online services that are more likely to be targeted as part of denial-of-service attacks.

ism-1437

Cloud service providers are used for hosting online services.

ism-1438

Where a high availability requirement exists for website hosting, CDNs that cache websites are used.

ism-1439

If using CDNs, disclosing the IP addresses of web servers under an organisation’s control (referred to as origin servers) is avoided and access to the origin servers is restricted to the CDNs and authorised management networks.

ism-1446

When using elliptic curve cryptography, a curve from FIPS 186-4 is used.

ism-1448

When using DH or ECDH for key establishment of TLS connections, the ephemeral variant is used.

ism-1449

SSH private keys are protected with a passphrase or a key encryption key.

ism-1450

Microphones (including headsets and USB handsets) and webcams are not used with non-TOP SECRET workstations in TOP SECRET areas.

ism-1451

Types of data and its ownership is documented in contractual arrangements with service providers.

ism-1452

A supply chain risk assessment is performed for suppliers of applications, ICT equipment and services in order to assess the impact to a system’s security risk profile.

ism-1453

Perfect Forward Secrecy (PFS) is used for TLS connections.

ism-1454

Communications between authenticators and a RADIUS server are encapsulated with an additional layer of encryption using RADIUS over Internet Protocol Security or RADIUS over Transport Layer Security.

ism-1457

Evaluated peripheral switches used for sharing peripherals between SECRET and TOP SECRET systems, or between SECRET or TOP SECRET systems belonging to different security domains, preferably complete a high assurance evaluation.

ism-1460

When using a software-based isolation mechanism to share a physical server’s hardware, the isolation mechanism is from a vendor that has demonstrated a commitment to secure-by-design and secure-by-default principles, use of memory-safe programming languages where possible, secure programming practices, and maintaining the security of their products.

ism-1461

When using a software-based isolation mechanism to share a physical server’s hardware for SECRET or TOP SECRET computing environments, the physical server and all computing environments are of the same classification and belong to the same security domain.

ism-1467

The latest release of office productivity suites, web browsers and their extensions, email clients, PDF software, and security products are used.

ism-1470

Unneeded components, services and functionality of office productivity suites, web browsers, email clients, PDF software and security products are disabled or removed.

ism-1471

When implementing application control using publisher certificate rules, both publisher names and product names are used.

ism-1478

The CISO oversees their organisation’s cyber security program and ensures their organisation’s compliance with cyber security policy, standards, regulations and legislation.

ism-1479

Servers minimise communications with other servers at both the network and file system level.

ism-1480

Evaluated peripheral switches used for sharing peripherals between SECRET or TOP SECRET systems and any non-SECRET or TOP SECRET systems complete a high assurance evaluation.

ism-1482

Personnel accessing systems or data using an organisation-owned mobile device use an ASD-approved platform, a security configuration in accordance with ACSC guidance, and have enforced separation of work and personal data.

ism-1483

The latest release of internet-facing server applications are used.

ism-1485

Web browsers do not process web advertisements from the internet.

ism-1486

Web browsers do not process Java from the internet.

ism-1487

Only privileged users responsible for validating that Microsoft Office macros are free of malicious code can write to and modify content within Trusted Locations.

ism-1488

Microsoft Office macros in files originating from the internet are blocked.

ism-1489

Microsoft Office macro security settings cannot be changed by users.

ism-1490

Application control is implemented on internet-facing servers.

ism-1491

Unprivileged users are prevented from running script execution engines, including:

  • Windows Script Host (cscript.exe and wscript.exe)
  • PowerShell (powershell.exe, powershell_ise.exe and pwsh.exe)
  • Command Prompt (cmd.exe)
  • Windows Management Instrumentation (wmic.exe)
  • Microsoft Hypertext Markup Language (HTML) Application Host (mshta.exe).
ism-1492

Operating system exploit protection functionality is enabled.

ism-1493

Software registers for workstations, servers, network devices and other ICT equipment are developed, implemented, maintained and verified on a regular basis.

ism-1501

Operating systems that are no longer supported by vendors are replaced.

ism-1502

Emails arriving via an external connection where the email source address uses an internal domain, or internal subdomain, are blocked at the email gateway.

ism-1504

Multi-factor authentication is used by an organisation’s users if they authenticate to their organisation’s internet-facing services.

ism-1505

Multi-factor authentication is used to authenticate users accessing important data repositories.

ism-1506

The use of SSH version 1 is disabled for SSH connections.

ism-1507

Requests for privileged access to systems and applications are validated when first requested.

ism-1508

Privileged access to systems and applications is limited to only what is required for users and services to undertake their duties.

ism-1509

Privileged access events are logged.

ism-1510

A digital preservation policy is developed, implemented and maintained.

ism-1511

Backups of important data, software and configuration settings are performed and retained with a frequency and retention timeframe in accordance with business continuity requirements.

ism-1515

Restoration of important data, software and configuration settings from backups to a common point of time is tested as part of disaster recovery exercises.

ism-1517

Equipment that is capable of reducing microform to a fine powder, with resultant particles not showing more than five consecutive characters per particle upon microscopic inspection, is used to destroy microfiche and microfilm.

ism-1520

System administrators for gateways undergo appropriate employment screening and, where necessary, hold an appropriate security clearance based on the sensitivity or classification of gateways.

ism-1521

CDSs implement protocol breaks at each network layer.

ism-1522

CDSs implement independent security-enforcing functions for upward and downward network paths.

ism-1523

A sample of security-relevant events relating to data transfer policies are taken at least every three months and assessed against security policies for CDSs to identify any operational failures.

ism-1524

Content filters used by CDSs undergo rigorous security testing to ensure they perform as expected and cannot be bypassed.

ism-1525

System owners register each system with its authorising officer.

ism-1526

System owners monitor each system, and associated cyber threats, security risks and controls, on an ongoing basis.

ism-1528

Evaluated firewalls are used between an organisation’s networks and public network infrastructure.

ism-1529

Only community or private clouds are used for outsourced SECRET and TOP SECRET cloud services.

ism-1530

Servers, network devices and cryptographic equipment are secured in security containers or secure rooms suitable for their sensitivity or classification taking into account the combination of security zones they reside in.

ism-1532

VLANs are not used to separate network traffic between an organisation’s networks and public network infrastructure.

ism-1533

A mobile device management policy is developed, implemented and maintained.

ism-1534

Printer ribbons in printers and MFDs are removed and destroyed.

ism-1535

Processes, and supporting procedures, are developed, implemented and maintained to prevent AUSTEO, AGAO and REL data in both textual and non-textual formats from being exported to unsuitable foreign systems.

ism-1536

The following events are logged for web applications: attempted access that is denied, crashes and error messages, and search queries initiated by users.

ism-1537

The following events are logged for databases:

  • access or modification of particularly important content
  • addition of new users, especially privileged users
  • changes to user roles or privileges
  • attempts to elevate user privileges
  • queries containing comments
  • queries containing multiple embedded queries
  • database and query alerts or failures
  • database structure changes
  • database administrator actions
  • use of executable commands
  • database logons and logoffs.
ism-1540

DMARC records are configured for an organisation’s domains (including subdomains) such that emails are rejected if they do not pass DMARC checks.

ism-1542

Microsoft Office is configured to prevent activation of Object Linking and Embedding packages.

ism-1543

An authorised RF and IR device register for SECRET and TOP SECRET areas is developed, implemented, maintained and verified on a regular basis.

ism-1544

Microsoft’s ‘recommended block rules’ are implemented.

ism-1546

Users are authenticated before they are granted access to a system and its resources.

ism-1547

Data backup processes, and supporting data backup procedures, are developed, implemented and maintained.

ism-1548

Data restoration processes, and supporting data restoration procedures, are developed, implemented and maintained.

ism-1549

A media management policy is developed, implemented and maintained.

ism-1550

ICT equipment disposal processes, and supporting ICT equipment disposal procedures, are developed, implemented and maintained.

ism-1551

An ICT equipment management policy is developed, implemented and maintained.

ism-1552

All web application content is offered exclusively using HTTPS.

ism-1553

TLS compression is disabled for TLS connections.

ism-1554

If travelling overseas with mobile devices to high or extreme risk countries, personnel are:

  • issued with newly provisioned accounts, mobile devices and removable media from a pool of dedicated travel devices which are used solely for work-related activities
  • advised on how to apply and inspect tamper seals to key areas of mobile devices
  • advised to avoid taking any personal mobile devices, especially if rooted or jailbroken.
ism-1555

Before travelling overseas with mobile devices, personnel take the following actions:

  • record all details of the mobile devices being taken, such as product types, serial numbers and International Mobile Equipment Identity numbers
  • update all operating systems and applications
  • remove all non-essential accounts, applications and data
  • apply security configuration settings, such as lock screens
  • configure remote locate and wipe functionality
  • enable encryption, including for any removable media
  • backup all important data and configuration settings.
ism-1556

If returning from travelling overseas with mobile devices to high or extreme risk countries, personnel take the following additional actions:

  • reset credentials used with mobile devices, including those used for remote access to their organisation’s systems
  • monitor accounts for any indicators of compromise, such as failed logon attempts.
ism-1557

Passphrases used for single-factor authentication on SECRET systems are at least 5 random words with a total minimum length of 17 characters.

ism-1558

Passphrases used for single-factor authentication are not a list of categorised words; do not form a real sentence in a natural language; and are not constructed from song lyrics, movies, literature or any other publicly available material.

ism-1559

Memorised secrets used for multi-factor authentication are a minimum of 6 characters, unless more stringent requirements apply.

ism-1560

Memorised secrets used for multi-factor authentication on SECRET systems are a minimum of 8 characters.

ism-1561

Memorised secrets used for multi-factor authentication on TOP SECRET systems are a minimum of 10 characters.

ism-1562

Video conferencing and IP telephony infrastructure is hardened.

ism-1563

At the conclusion of a security assessment for a system, a security assessment report is produced by the assessor and covers:

  • the scope of the security assessment
  • the system’s strengths and weaknesses
  • security risks associated with the operation of the system
  • the effectiveness of the implementation of controls
  • any recommended remediation actions.
ism-1564

At the conclusion of a security assessment for a system, a plan of action and milestones is produced by the system owner.

ism-1565

Tailored privileged user training is undertaken annually by all privileged users.

ism-1566

Use of unprivileged access is logged.

ism-1567

Suppliers identified as high risk by a cyber supply chain risk assessment are not used.

ism-1568

Applications, ICT equipment and services are chosen from suppliers that have demonstrated a commitment to the security of their products and services.

ism-1569

A shared responsibility model is created, documented and shared between suppliers and their customers in order to articulate the security responsibilities of each party.

ism-1570

Outsourced cloud service providers and their cloud services undergo a security assessment by an IRAP assessor at least every 24 months.

ism-1571

The right to verify compliance with security requirements is documented in contractual arrangements with service providers.

ism-1572

The regions or availability zones where data will be processed, stored and communicated, as well as a minimum notification period for any configuration changes, is documented in contractual arrangements with service providers.

ism-1573

Access to all logs relating to an organisation’s data and services is documented in contractual arrangements with service providers.

ism-1574

The storage of data in a portable manner that allows for backups, service migration and service decommissioning without any loss of data is documented in contractual arrangements with service providers.

ism-1575

A minimum notification period of one month for the cessation of any services by a service provider is documented in contractual arrangements with service providers.

ism-1576

If an organisation’s systems or data are accessed or administered by a service provider in an unauthorised manner, the organisation is immediately notified.

ism-1577

An organisation’s networks are segregated from their service providers’ networks.

ism-1579

Cloud service providers’ ability to dynamically scale resources in response to a genuine spike in demand is discussed and verified as part of capacity and availability planning for online services.

ism-1580

Where a high availability requirement exists for online services, the services are architected to automatically transition between availability zones.

ism-1581

Continuous real-time monitoring of the capacity and availability of online services is performed.

ism-1582

Application control rulesets are validated on an annual or more frequent basis.

ism-1583

Personnel who are contractors are identified as such.

ism-1584

Unprivileged users are prevented from bypassing, disabling or modifying security functionality of operating systems.

ism-1585

Web browser security settings cannot be changed by users.

ism-1586

Data transfer logs are used to record all data imports and exports from systems.

ism-1587

System owners report the security status of each system to its authorising officer at least annually.

ism-1588

SOEs are reviewed and updated at least annually.

ism-1589

MTA-STS is enabled to prevent the unencrypted transfer of emails between complying servers.

ism-1590

Credentials are changed if:

  • they are compromised
  • they are suspected of being compromised
  • they are discovered stored on networks in the clear
  • they are discovered being transferred across networks in the clear
  • membership of a shared account changes
  • they have not been changed in the past 12 months.
ism-1591

Access to systems, applications and data repositories is removed or suspended as soon as practicable when personnel are detected undertaking malicious activities.

ism-1592

Unprivileged users do not have the ability to install unapproved software.

ism-1593

Users provide sufficient evidence to verify their identity when requesting new credentials.

ism-1594

Credentials are provided to users via a secure communications channel or, if not possible, split into two parts with one part provided to users and the other part provided to supervisors.

ism-1595

Credentials provided to users are changed on first use.

ism-1596

Credentials, in the form of memorised secrets, are not reused by users across different systems.

ism-1597

Credentials are obscured as they are entered into systems.

ism-1598

Following maintenance or repair activities for ICT equipment, the ICT equipment is inspected to confirm it retains its approved software configuration and that no unauthorised modifications have taken place.

ism-1599

ICT equipment is handled in a manner suitable for its sensitivity or classification.

ism-1600

Media is sanitised before it is used for the first time.

ism-1601

Microsoft’s Attack Surface Reduction rules are implemented.

ism-1602

Security documentation, including notification of subsequent changes, is communicated to all stakeholders.

ism-1603

Authentication methods susceptible to replay attacks are disabled.

ism-1604

When using a software-based isolation mechanism to share a physical server’s hardware, the configuration of the isolation mechanism is hardened by removing unneeded functionality and restricting access to the administrative interface used to manage the isolation mechanism.

ism-1605

When using a software-based isolation mechanism to share a physical server’s hardware, the underlying operating system is hardened.

ism-1606

When using a software-based isolation mechanism to share a physical server’s hardware, patches, updates or vendor mitigations for security vulnerabilities are applied to the isolation mechanism and underlying operating system in a timely manner.

ism-1607

When using a software-based isolation mechanism to share a physical server’s hardware, integrity and log monitoring are performed for the isolation mechanism and underlying operating system in a timely manner.

ism-1608

SOEs provided by third parties are scanned for malicious code and configurations.

ism-1609

System owners are consulted before allowing intrusion activity to continue on a system for the purpose of collecting further data or evidence.

ism-1610

A method of emergency access to systems is documented and tested at least once when initially implemented and each time fundamental information technology infrastructure changes occur.

ism-1611

Break glass accounts are only used when normal authentication processes cannot be used.

ism-1612

Break glass accounts are only used for specific authorised activities.

ism-1613

Use of break glass accounts is logged.

ism-1614

Break glass account credentials are changed by the account custodian after they are accessed by any other party.

ism-1615

Break glass accounts are tested after credentials are changed.

ism-1616

A vulnerability disclosure program is implemented to assist with the secure development and maintenance of products and services.

ism-1617

The CISO regularly reviews and updates their organisation’s cyber security program to ensure its relevance in addressing cyber threats and harnessing business and cyber security opportunities.

ism-1618

The CISO oversees their organisation’s response to cyber security incidents.

ism-1619

Service accounts are created as group Managed Service Accounts.

ism-1620

Privileged user accounts are members of the Protected Users security group.

ism-1621

Windows PowerShell 2.0 is disabled or removed.

ism-1622

PowerShell is configured to use Constrained Language Mode.

ism-1623

PowerShell is configured to use module logging, script block logging and transcription functionality.

ism-1624

PowerShell script block logs are protected by Protected Event Logging functionality.

ism-1625

A trusted insider program is developed, implemented and maintained.

ism-1626

Legal advice is sought regarding the development and implementation of a trusted insider program.

ism-1627

Inbound network connections from anonymity networks to internet-facing services are blocked.

ism-1628

Outbound network connections to anonymity networks are blocked.

ism-1629

When using DH for agreeing on encryption session keys, a modulus and associated parameters are selected according to NIST SP 800-56A Rev. 3.

ism-1630

When using DSA for digital signatures, a modulus and associated parameters are generated according to FIPS 186-4.

ism-1631

Suppliers of applications, ICT equipment and services associated with systems are identified.

ism-1632

Applications, ICT equipment and services are chosen from suppliers that have a strong track record of transparency and maintaining the security of their own systems and cyber supply chains.

ism-1633

System owners determine the type, value and security objectives for each system based on an assessment of the impact if it were to be compromised.

ism-1634

System owners select controls for each system and tailor them to achieve desired security objectives.

ism-1635

System owners implement controls for each system and its operating environment.

ism-1636

System owners ensure controls for each system and its operating environment are assessed to determine if they have been implemented correctly and are operating as intended.

ism-1637

An outsourced cloud service register is developed, implemented, maintained and verified on a regular basis.

ism-1638

An outsourced cloud service register contains the following for each outsourced cloud service:

  • cloud service provider’s name
  • cloud service’s name
  • purpose for using the cloud service
  • sensitivity or classification of data involved
  • due date for the next security assessment of the cloud service
  • contractual arrangements for the cloud service
  • point of contact for users of the cloud service
  • 24/7 contact details for the cloud service provider.
ism-1639

Building management cables are labelled with their purpose in black writing on a yellow background, with a minimum size of 2.5 cm x 1 cm, and attached at five-metre intervals.

ism-1640

Cables for foreign systems installed in Australian facilities are labelled at inspection points.

ism-1641

Following the use of a degausser, magnetic media is physically damaged by deforming any internal platters.

ism-1642

Media is sanitised before it is reused in a different security domain.

ism-1643

Software registers contain versions and patch histories of applications, drivers, operating systems and firmware.

ism-1644

Sensitive or classified phone calls are not conducted in public locations unless care is taken to reduce the chance of conversations being overheard.

ism-1645

Floor plan diagrams are developed, implemented, maintained and verified on a regular basis.

ism-1646

Floor plan diagrams contain the following:

  • cable paths (including ingress and egress points between floors)
  • cable reticulation system and conduit paths
  • floor concentration boxes
  • wall outlet boxes
  • network cabinets.
ism-1647

Privileged access to systems and applications is automatically disabled after 12 months unless revalidated.

ism-1648

Privileged access to systems and applications is automatically disabled after 45 days of inactivity.

ism-1649

Just-in-time administration is used for administering systems and applications.

ism-1650

Privileged account and group management events are logged.

ism-1651

Privileged access event logs are stored centrally.

ism-1652

Privileged account and group management event logs are stored centrally.

ism-1653

Privileged service accounts are prevented from accessing the internet, email and web services.

ism-1654

Internet Explorer 11 is disabled or removed.

ism-1655

.NET Framework 3.5 (includes .NET 2.0 and 3.0) is disabled or removed.

ism-1656

Application control is implemented on non-internet-facing servers.

ism-1657

Application control restricts the execution of executables, software libraries, scripts, installers, compiled HTML, HTML applications and control panel applets to an organisation-approved set.

ism-1658

Application control restricts the execution of drivers to an organisation-approved set.

ism-1659

Microsoft’s ‘recommended driver block rules’ are implemented.

ism-1660

Allowed and blocked execution events on workstations are logged.

ism-1661

Allowed and blocked execution events on internet-facing servers are logged.

ism-1662

Allowed and blocked execution events on non-internet-facing servers are logged.

ism-1663

Application control event logs are stored centrally.

ism-1664

Blocked PowerShell script execution events are logged.

ism-1665

PowerShell event logs are stored centrally.

ism-1666

Internet Explorer 11 does not process content from the internet.

ism-1667

Microsoft Office is blocked from creating child processes.

ism-1668

Microsoft Office is blocked from creating executable content.

ism-1669

Microsoft Office is blocked from injecting code into other processes.

ism-1670

PDF software is blocked from creating child processes.

ism-1671

Microsoft Office macros are disabled for users that do not have a demonstrated business requirement.

ism-1672

Microsoft Office macro antivirus scanning is enabled.

ism-1673

Microsoft Office macros are blocked from making Win32 API calls.

ism-1674

Only Microsoft Office macros running from within a sandboxed environment, a Trusted Location or that are digitally signed by a trusted publisher are allowed to execute.

ism-1675

Microsoft Office macros digitally signed by an untrusted publisher cannot be enabled via the Message Bar or Backstage View.

ism-1676

Microsoft Office’s list of trusted publishers is validated on an annual or more frequent basis.

ism-1677

Allowed and blocked Microsoft Office macro execution events are logged.

ism-1678

Microsoft Office macro event logs are stored centrally.

ism-1679

Multi-factor authentication is used by an organisation’s users if they authenticate to third-party internet-facing services that process, store or communicate their organisation’s sensitive data.

ism-1680

Multi-factor authentication (where available) is used by an organisation’s users if they authenticate to third-party internet-facing services that process, store or communicate their organisation’s non-sensitive data.

ism-1681

Multi-factor authentication is enabled by default for an organisation’s non-organisational users (but users can choose to opt out) if they authenticate to the organisation’s internet-facing services.

ism-1682

Multi-factor authentication is phishing-resistant.

ism-1683

Successful and unsuccessful multi-factor authentication events are logged.

ism-1684

Multi-factor authentication event logs are stored centrally.

ism-1685

Credentials for break glass accounts, local administrator accounts and service accounts are long, unique, unpredictable and managed.

ism-1686

Windows Defender Credential Guard and Windows Defender Remote Credential Guard are enabled.

ism-1687

Privileged operating environments are not virtualised within unprivileged operating environments.

ism-1688

Unprivileged accounts cannot logon to privileged operating environments.

ism-1689

Privileged accounts (excluding local administrator accounts) cannot logon to unprivileged operating environments.

ism-1690

Patches, updates or vendor mitigations for security vulnerabilities in internet-facing services are applied within two weeks of release, or within 48 hours if an exploit exists.

ism-1691

Patches, updates or vendor mitigations for security vulnerabilities in office productivity suites, web browsers and their extensions, email clients, PDF software, and security products are applied within two weeks of release.

ism-1692

Patches, updates or vendor mitigations for security vulnerabilities in office productivity suites, web browsers and their extensions, email clients, PDF software, and security products are applied within 48 hours if an exploit exists.

ism-1693

Patches, updates or vendor mitigations for security vulnerabilities in applications other than office productivity suites, web browsers and their extensions, email clients, PDF software, and security products are applied within one month of release.

ism-1694

Patches, updates or vendor mitigations for security vulnerabilities in operating systems of internet-facing services are applied within two weeks of release, or within 48 hours if an exploit exists.

ism-1695

Patches, updates or vendor mitigations for security vulnerabilities in operating systems of workstations, servers and network devices are applied within two weeks of release.

ism-1696

Patches, updates or vendor mitigations for security vulnerabilities in operating systems of workstations, servers and network devices are applied within 48 hours if an exploit exists.

ism-1697

Patches, updates or vendor mitigations for security vulnerabilities in drivers and firmware are applied within two weeks of release, or within 48 hours if an exploit exists.

ism-1698

A vulnerability scanner is used at least daily to identify missing patches or updates for security vulnerabilities in internet-facing services.

ism-1699

A vulnerability scanner is used at least weekly to identify missing patches or updates for security vulnerabilities in office productivity suites, web browsers and their extensions, email clients, PDF software, and security products.

ism-1700

A vulnerability scanner is used at least fortnightly to identify missing patches or updates for security vulnerabilities in applications other than office productivity suites, web browsers and their extensions, email clients, PDF software, and security products.

ism-1701

A vulnerability scanner is used at least daily to identify missing patches or updates for security vulnerabilities in operating systems of internet-facing services.

ism-1702

A vulnerability scanner is used at least weekly to identify missing patches or updates for security vulnerabilities in operating systems of workstations, servers and network devices.

ism-1703

A vulnerability scanner is used at least weekly to identify missing patches or updates for security vulnerabilities in drivers and firmware.

ism-1704

Internet-facing services, office productivity suites, web browsers and their extensions, email clients, PDF software, Adobe Flash Player, and security products that are no longer supported by vendors are removed.

ism-1705

Privileged accounts (excluding backup administrator accounts) cannot access backups belonging to other accounts.

ism-1706

Privileged accounts (excluding backup administrator accounts) cannot access their own backups.

ism-1707

Privileged accounts (excluding backup administrator accounts) are prevented from modifying and deleting backups.

ism-1708

Privileged accounts (including backup administrator accounts) are prevented from modifying and deleting backups during their retention period.

ism-1710

Configuration settings for wireless access points are hardened.

ism-1711

User identity confidentiality is used if available with EAP-TLS implementations.

ism-1712

The use of FT (802.11r) is disabled unless authenticator-to-authenticator communications are secured by an ASD-Approved Cryptographic Protocol.

ism-1713

A removable media register is developed, implemented, maintained and verified on a regular basis.

ism-1714

Unprivileged access event logs are stored centrally.

ism-1715

Break glass event logs are stored centrally.

ism-1716

Access to data repositories is automatically disabled after 45 days of inactivity.

ism-1717

A ‘security.txt’ file is hosted for all internet-facing organisational domains to assist in the responsible disclosure of security vulnerabilities in an organisation’s products and services.

ism-1718

SECRET cables are coloured salmon pink.

ism-1719

TOP SECRET cables are coloured red.

ism-1720

SECRET wall outlet boxes are coloured salmon pink.

ism-1721

TOP SECRET wall outlet boxes are coloured red.

ism-1722

Electrostatic memory devices are destroyed using a furnace/incinerator, hammer mill, disintegrator or grinder/sander.

ism-1723

Magnetic floppy disks are destroyed using a furnace/incinerator, hammer mill, disintegrator, degausser or by cutting.

ism-1724

Magnetic hard disks are destroyed using a furnace/incinerator, hammer mill, disintegrator, grinder/sander or degausser.

ism-1725

Magnetic tapes are destroyed using a furnace/incinerator, hammer mill, disintegrator, degausser or by cutting.

ism-1726

Optical disks are destroyed using a furnace/incinerator, hammer mill, disintegrator, grinder/sander or by cutting.

ism-1727

Semiconductor memory is destroyed using a furnace/incinerator, hammer mill or disintegrator.

ism-1728

The resulting media waste particles from the destruction of SECRET media is stored and handled as OFFICIAL if less than or equal to 3 mm, PROTECTED if greater than 3 mm and less than or equal to 6 mm, or SECRET if greater than 6 mm and less than or equal to 9 mm.

ism-1729

The resulting media waste particles from the destruction of TOP SECRET media is stored and handled as OFFICIAL if less than or equal to 3 mm, or SECRET if greater than 3 mm and less than or equal to 9 mm.

ism-1730

A software bill of materials is produced and made available to consumers of software.

ism-1731

Planning and coordination of intrusion remediation activities are conducted on a separate system to that which has been compromised.

ism-1732

To the extent possible, all intrusion remediation activities are conducted in a coordinated manner during the same planned outage.

ism-1733

Requests for privileged access to data repositories are validated when first requested.

ism-1734

Privileged access to data repositories is automatically disabled after 12 months unless revalidated.

ism-1735

Faulty or damaged media that cannot be successfully sanitised is destroyed prior to its disposal.

ism-1736

A managed service register is developed, implemented, maintained and verified on a regular basis.

ism-1737

A managed service register contains the following for each managed service:

  • managed service provider’s name
  • managed service’s name
  • purpose for using the managed service
  • sensitivity or classification of data involved
  • due date for the next security assessment of the managed service
  • contractual arrangements for the managed service
  • point of contact for users of the managed service
  • 24/7 contact details for the managed service provider.
ism-1738

The right to verify compliance with security requirements documented in contractual arrangements with service providers is exercised on a regular and ongoing basis.

ism-1739

A system’s security architecture is approved prior to the development of the system.

ism-1740

Personnel dealing with banking details and payment requests are advised of what business email compromise is, how to manage such situations and how to report it.

ism-1741

ICT equipment destruction processes, and supporting ICT equipment destruction procedures, are developed, implemented and maintained.

ism-1742

ICT equipment that cannot be sanitised is destroyed.

ism-1743

Operating systems are chosen from vendors that have demonstrated a commitment to secure-by-design and secure-by-default principles, use of memory-safe programming languages where possible, secure programming practices, and maintaining the security of their products.

ism-1745

Early Launch Antimalware, Secure Boot, Trusted Boot and Measured Boot functionality is enabled.

ism-1746

When implementing application control using path rules, only approved users can change file system permissions for approved files and folders.

ism-1747

Operating system event logs are stored centrally.

ism-1748

Email client security settings cannot be changed by users.

ism-1749

Cached credentials are limited to one previous logon.

ism-1750

Administrative infrastructure for critical servers, high-value servers and regular servers is segregated from each other.

ism-1751

Patches, updates or vendor mitigations for security vulnerabilities in operating systems of ICT equipment other than workstations, servers and network devices are applied within two weeks of release, or within 48 hours if an exploit exists.

ism-1752

A vulnerability scanner is used at least weekly to identify missing patches or updates for security vulnerabilities in operating systems of ICT equipment other than workstations, servers and network devices.

ism-1753

Network devices and other ICT equipment that are no longer supported by vendors are replaced.

ism-1754

Security vulnerabilities identified in applications are resolved by software developers in a timely manner.

ism-1755

A vulnerability disclosure policy is developed, implemented and maintained.

ism-1756

Vulnerability disclosure processes, and supporting vulnerability disclosure procedures, are developed, implemented and maintained.

ism-1757

Web application event logs are stored centrally.

ism-1758

Database event logs are stored centrally.

ism-1759

When using DH for agreeing on encryption session keys, a modulus of at least 3072 bits is used, preferably 3072 bits.

ism-1760

DSA is not used for digital signatures.

ism-1761

When using ECDH for agreeing on encryption session keys, NIST P-256, P-384 or P-521 curves are used, preferably the NIST P-384 curve.

ism-1762

When using ECDH for agreeing on encryption session keys, NIST P-384 or P-521 curves are used, preferably the NIST P-384 curve.

ism-1763

When using ECDSA for digital signatures, NIST P-256, P-384 or P-521 curves are used, preferably the NIST P-384 curve.

ism-1764

When using ECDSA for digital signatures, NIST P-384 or P-521 curves are used, preferably the NIST P-384 curve.

ism-1765

When using RSA for digital signatures, and passing encryption session keys or similar keys, a modulus of at least 3072 bits is used, preferably 3072 bits.

ism-1766

When using SHA-2 for hashing, an output size of at least 224 bits is used, preferably SHA-384.

ism-1767

When using SHA-2 for hashing, an output size of at least 256 bits is used, preferably SHA-384.

ism-1768

When using SHA-2 for hashing, an output size of at least 384 bits is used, preferably SHA-384.

ism-1769

When using AES for encryption, AES-128, AES-192 or AES-256 is used, preferably AES-256.

ism-1770

When using AES for encryption, AES-192 or AES-256 is used, preferably AES-256.

ism-1771

AES is used for encrypting IPsec connections, preferably ENCR_AES_GCM_16.

ism-1772

PRF_HMAC_SHA2_256, PRF_HMAC_SHA2_384 or PRF_HMAC_SHA2_512 is used for IPsec connections, preferably PRF_HMAC_SHA2_512.

ism-1773

System administrators for gateways that connect to Australian Government Access Only networks are Australian nationals or seconded foreign nationals.

ism-1774

Gateways are managed via a secure path isolated from all connected networks.

ism-1775

Gateway event logs are stored centrally.

ism-1776

CDS event logs are stored centrally.

ism-1777

Web proxy event logs are stored centrally.

ism-1778

When manually importing data to systems, all data that fails security checks is quarantined until reviewed and subsequently approved or not approved for release.

ism-1779

When manually exporting data from systems, all data that fails security checks is quarantined until reviewed and subsequently approved or not approved for release.

ism-1780

SecDevOps practices are used for application development.

ism-1781

All data communicated over network infrastructure is encrypted.

ism-1782

A protective DNS service is used to block access to known malicious domain names.

ism-1783

Public IP addresses controlled by, or used by, an organisation are signed by valid ROA records.

ism-1784

The incident management policy, including the associated incident response plan, is exercised at least annually.

ism-1785

A supplier relationship management policy is developed, implemented and maintained.

ism-1786

An approved supplier list is developed, implemented and maintained.

ism-1787

Applications, ICT equipment and services are sourced from approved suppliers.

ism-1788

Multiple potential suppliers are identified for sourcing critical applications, ICT equipment and services.

ism-1789

Sufficient spares of critical ICT equipment are sourced and kept in reserve.

ism-1790

Applications, ICT equipment and services are delivered in a manner that maintains their integrity.

ism-1791

The integrity of applications, ICT equipment and services are assessed as part of acceptance of products and services.

ism-1792

The authenticity of applications, ICT equipment and services are assessed as part of acceptance of products and services.

ism-1793

Managed service providers and their managed services undergo a security assessment by an IRAP assessor at least every 24 months.

ism-1794

A minimum notification period of one month by service providers for significant changes to their own service provider arrangements is documented in contractual arrangements with service providers.

ism-1795

Credentials for break glass accounts, local administrator accounts and service accounts are a minimum of 30 characters.

ism-1796

Files containing executable content are digitally signed as part of application development.

ism-1797

Installers, patches and updates are digitally signed or provided with cryptographic checksums as part of application development.

ism-1798

Secure configuration guidance is produced as part of application development.

ism-1799

Incoming emails are rejected if they do not pass DMARC checks.

ism-1800

Network devices are flashed with trusted firmware before they are used for the first time.

ism-1801

Network devices are restarted on at least a monthly basis.

ism-1802

HACE does not process, store or communicate SECRET or TOP SECRET data until approved for use by ASD.

ism-1803

A cyber security incident register contains the following for each cyber security incident:

  • the date the cyber security incident occurred
  • the date the cyber security incident was discovered
  • a description of the cyber security incident
  • any actions taken in response to the cyber security incident
  • to whom the cyber security incident was reported.
ism-1804

Break clauses associated with failure to meet security requirements are documented in contractual arrangements with service providers.

ism-1805

A denial of service response plan for video conferencing and IP telephony services contains the following:

  • how to identify signs of a denial-of-service attack
  • how to identify the source of a denial-of-service attack
  • how capabilities can be maintained during a denial-of-service attack
  • what actions can be taken to respond to a denial-of-service attack.
ism-1806

Default accounts or credentials for user applications, including for any pre-configured accounts, are changed.

ism-1807

An automated method of asset discovery is used at least fortnightly to support the detection of assets for subsequent vulnerability scanning activities.

ism-1808

A vulnerability scanner with an up-to-date vulnerability database is used for vulnerability scanning activities.

ism-1809

When applications, operating systems, network devices or other ICT equipment that are no longer supported by vendors cannot be immediately removed or replaced, compensating controls are implemented until such time that they can be removed or replaced.

ism-1810

Backups of important data, software and configuration settings are synchronised to enable restoration to a common point in time.

ism-1811

Backups of important data, software and configuration settings are retained in a secure and resilient manner.

ism-1812

Unprivileged accounts cannot access backups belonging to other accounts.

ism-1813

Unprivileged accounts cannot access their own backups.

ism-1814

Unprivileged accounts are prevented from modifying and deleting backups.

ism-1815

Event logs stored within a centralised event logging facility are protected from unauthorised modification and deletion.

ism-1816

Unauthorised modification of the authoritative source for software is prevented.

ism-1817

Authentication and authorisation of clients is performed when clients call web APIs that facilitate access to data not authorised for release into the public domain.

ism-1818

Authentication and authorisation of clients is performed when clients call web APIs that facilitate modification of data.

ism-1819

Following the identification of a cyber security incident, an organisation’s incident response plan is enacted.

ism-1820

Cables for individual systems use a consistent colour.

ism-1821

TOP SECRET cables, when bundled together or run in conduit, are run exclusively in their own individual cable bundle or conduit.

ism-1822

Wall outlet boxes for individual systems use a consistent colour.

ism-1823

Office productivity suite security settings cannot be changed by users.

ism-1824

PDF software security settings cannot be changed by users.

ism-1825

Security product security settings cannot be changed by users.

ism-1826

Server applications are chosen from vendors that have demonstrated a commitment to secure-by-design and secure-by-default principles, use of memory-safe programming languages where possible, secure programming practices, and maintaining the security of their products.

ism-1827

Microsoft AD DS domain controllers are administered using dedicated domain administrator user accounts that are not used to administer other systems.

ism-1828

The Print Spooler service is disabled on Microsoft AD DS domain controllers.

ism-1829

Passwords and cpasswords are not used in Group Policy Preferences.

ism-1830

Security-related events for Microsoft AD DS are logged.

ism-1831

Microsoft AD DS event logs are stored centrally.

ism-1832

Only service accounts and computer accounts are configured with Service Principal Names (SPNs).

ism-1833

Service accounts are provisioned with the minimum privileges required and are not members of the domain administrators group or similar highly privileged groups.

ism-1834

Duplicate SPNs do not exist within the domain.

ism-1835

Privileged user accounts are configured as sensitive and cannot be delegated.

ism-1836

User accounts require Kerberos pre-authentication.

ism-1837

User accounts are not configured with password never expires or password not required.

ism-1838

The UserPassword attribute for user accounts is not used.

ism-1839

Account properties accessible by unprivileged users are not used to store passwords.

ism-1840

User account passwords do not use reversible encryption.

ism-1841

Unprivileged user accounts cannot add machines to the domain.

ism-1842

Dedicated service accounts are used to add machines to the domain.

ism-1843

User accounts with unconstrained delegation are reviewed at least annually, and those without an associated Kerberos SPN or demonstrated business requirement are removed.

ism-1844

Computer accounts that are not Microsoft AD DS domain controllers are not trusted for delegation to services.

ism-1845

When a user account is disabled, it is removed from all security group memberships.

ism-1846

The Pre-Windows 2000 Compatible Access security group does not contain user accounts.

ism-1847

Credentials for the Kerberos Key Distribution Center’s service account (KRBTGT) are changed twice, allowing for replication to all Microsoft Active Directory Domain Services domain controllers in-between each change, if:

  • the domain has been directly compromised
  • the domain is suspected of being compromised
  • they have not been changed in the past 12 months.
ism-1848

When using a software-based isolation mechanism to share a physical server’s hardware, the isolation mechanism or underlying operating system is replaced when it is no longer supported by a vendor.

ism-1849

The OWASP Top Ten Proactive Controls are used in the development of web applications.

ism-1850

The OWASP Top 10 are mitigated in the development of web applications.

ism-1851

The OWASP API Security Top 10 are mitigated in the development of web APIs.

ism-1852

Unprivileged access to systems, applications and data repositories is limited to only what is required for users and services to undertake their duties.

ism-1853

Privileged access to data repositories is limited to only what is required for users and services to undertake their duties.

ism-1854

Users authenticate to MFDs before they can print, scan or copy documents.

ism-1855

Use of MFDs for printing, scanning and copying purposes, including the capture of shadow copies of documents, are logged.

ism-1856

MFD event logs are stored centrally.

ism-1857

ICT equipment is chosen from vendors that have demonstrated a commitment to secure-by-design and secure-by-default principles, use of memory-safe programming languages where possible, secure programming practices, and maintaining the security of their products.

ism-1858

ACSC and vendor hardening guidance for ICT equipment is implemented.

ism-1859

ACSC or vendor hardening guidance for office productivity suites is implemented.

ism-1860

ACSC or vendor hardening guidance for PDF software is implemented.

ism-1861

Protective Process Light for LSASS is enabled with a UEFI lock.

ism-1862

If using a WAF, disclosing the IP addresses of web servers under an organisation’s control (referred to as origin servers) is avoided and access to the origin servers is restricted to the WAF and authorised management networks.

ism-1863

Networked management interfaces for ICT equipment are not directly exposed to the internet.

ism-principle-d1

Event logs are collected and analysed in a timely manner to detect cyber security events.

ism-principle-d2

Cyber security events are analysed in a timely manner to identify cyber security incidents.

ism-principle-g1

A Chief Information Security Officer provides leadership and oversight of cyber security.

ism-principle-g2

The identity and value of systems, applications and data is determined and documented.

ism-principle-g3

The confidentiality, integrity and availability requirements for systems, applications and data are determined and documented.

ism-principle-g4

Security risk management processes are embedded into organisational risk management frameworks.

ism-principle-g5

Security risks are identified, documented, managed and accepted both before systems and applications are authorised for use, and continuously throughout their operational life.

ism-principle-p10

Only trusted and vetted personnel are granted access to systems, applications and data repositories.

ism-principle-p11

Personnel are granted the minimum access to systems, applications and data repositories required for their duties.

ism-principle-p12

Multiple methods are used to identify and authenticate personnel to systems, applications and data repositories.

ism-principle-p13

Personnel are provided with ongoing cyber security awareness training.

ism-principle-p14

Physical access to systems, supporting infrastructure and facilities is restricted to authorised personnel.

ism-principle-p1

Systems and applications are designed, deployed, maintained and decommissioned according to their value and their confidentiality, integrity and availability requirements.

ism-principle-p2

Systems and applications are delivered and supported by trusted suppliers.

ism-principle-p3

Systems and applications are designed and configured to reduce their attack surface.

ism-principle-p4

Systems and applications are administered in a secure and accountable manner.

ism-principle-p5

Security vulnerabilities in systems and applications are identified and mitigated in a timely manner.

ism-principle-p6

Only trusted and supported operating systems, applications and computer code can execute on systems.

ism-principle-p7

Data is encrypted at rest and in transit between different systems.

ism-principle-p8

Data communicated between different systems is controlled and inspectable.

ism-principle-p9

Data, applications and configuration settings are backed up in a secure and proven manner on a regular basis.

ism-principle-r1

Cyber security incidents are reported both internally and externally to relevant bodies in a timely manner.

ism-principle-r2

Cyber security incidents are contained, eradicated and recovered from in a timely manner.

ism-principle-r3

Business continuity and disaster recovery plans are enacted when required.