AuditXYZ

Compliance Framework

Australian Government Information Security Manual

The ISM is the Australian government's comprehensive information security manual. This guide covers the Essential Eight, security classification, system accreditation, and compliance for government contractors.

$30,000–$300,0004–12 monthsAudit RequiredMarch 2025
Issuing BodyAustralian Signals Directorate (ASD)
First Published2010-01-01
Latest VersionMarch 2025
Typical Cost$30,000–$300,000
Typical Timeline4–12 months
Audit RequiredYes
Audit FrequencySystems must be assessed and authorized before operation. Continuous monitoring with periodic reassessment as determined by the system owner.
Geographyaustralia

ISM: Australian Government Information Security Manual

The Australian Government Information Security Manual (ISM) is the comprehensive information security reference published by the Australian Signals Directorate (ASD). It provides a cybersecurity framework for Australian government entities and their contractors, covering everything from governance and personnel security to technical controls and cryptographic standards. The ISM is updated regularly to address emerging threats and incorporates the Essential Eight — ASD's prioritized list of mitigation strategies.

What the ISM Covers

The ISM contains over 800 security controls organized into categories including cybersecurity governance, personnel security, physical security, communications security, information technology security, media security, software security, email security, network security, cryptographic security, gateway security, data transfer security, and enterprise mobility security.

At the heart of the ISM is the Essential Eight — eight prioritized mitigation strategies that address the majority of cyber incidents: application control, patching applications, Microsoft Office macro settings, user application hardening, restricting administrative privileges, patching operating systems, multi-factor authentication, and regular backups. The Essential Eight has a maturity model from Level Zero to Level Three.

Who Needs ISM Compliance

The ISM applies to all Australian government entities at the federal level and is increasingly adopted by state and territory governments. Defense contractors and companies handling Australian government information must align with ISM requirements as specified in their contracts. The Essential Eight is mandated for all non-corporate Commonwealth entities. Organizations seeking to sell to the Australian government benefit from demonstrating ISM alignment.

Implementation Approach

Start with the Essential Eight, targeting Maturity Level Two as a minimum for most organizations. Conduct a gap assessment against applicable ISM controls for your system's security classification. Implement controls proportionate to the classification level — OFFICIAL systems require a baseline set, while PROTECTED and above require progressively more stringent controls. Complete system security documentation including a System Security Plan and obtain authorization to operate.

Cost Considerations

ISM compliance costs range from $30,000 for focused Essential Eight implementation at Maturity Level Two to $300,000 or more for comprehensive ISM compliance at higher classification levels. Defense contractors and companies handling PROTECTED information face the highest costs due to cryptographic requirements, personnel clearances, and physical security controls. The Essential Eight Maturity Model provides a practical, prioritized starting point for reducing compliance costs while maximizing security effectiveness.

Get the ISM starter pack

By submitting, you agree to our privacy policy.

Framework Mappings

Get matched with a ISM auditor in 24 hours

Free, no-obligation — just tell us your email and we'll do the rest.

By submitting, you agree to our privacy policy.

Recommended Tools