The Australian Signals Directorate (ASD), a crucial member of Australia’s national security community, created the Australian Government Information Security Manual (ISM) to aid organisations by providing strategic guidance in safeguarding their systems and data from cyberattacks.
According to Business Information Security Officer Muralee Krishnan, “The ISM was created to be used by organisations’ Chief Information Security Officers (CISOs), Chief Information Officers (CIOs), as well as cyber security professionals and information technology managers.”
Krishnan also notes that the ISM consists of cybersecurity principles and cybersecurity guidelines. He describes cybersecurity principles as “principles that provide strategic guidance on how organisations can protect their systems and data from cyber-attacks and threats. These principles are divided into four key actions; govern, protect, detect and respond. To comply with the ISM, organisations must provide proof or demonstrate that they adhere to these principles.”
Cybersecurity guidelines are guidelines organisations can apply to help them protect their systems and data from cyber threats and even attacks. The guidelines often cover governance, physical security, personnel security, and information and communications technology security.
ISM allows professionals to apply a risk-based approach to managing their cyber security. The framework within ISM consists of six steps: Define the System, Select Controls, Implement Controls, Assess Controls, Authorise the system, and Monitor the System.
The framework was adapted from the National Institute of Standards and Technology’s Risk Management Framework for Information Systems and Organisations publication.
The Define the system step describes that the user must understand the type, value and security objectives the system will address based on assessing the impact if it was compromised.
The next step for a successful framework is to select the appropriate controls to achieve the desired security objectives. Once these controls are created, they should be translated into the system and its operating environment.
Once implemented, security professionals are recommended to continuously assess these controls and identify if they have been correctly implemented and are working as designed. After this, the system has to be authorised to work based on the perceived risk and associated controls. Continuous monitoring of the system, associated cyber threats and risks involved is the last step.
Understanding the ISM allows security professionals to continuously review and comply with the ACSC standards, effectively safeguarding their organisations against cyber criminals.
More Stories
Killnet and AnonymousSudan Collaborate to Launch Cyber Attacks on Western Organisations
In recent news, it has been reported that two Russia-sympathetic hacktivist groups, Killnet and AnonymousSudan, have allegedly launched a series...
$4000 Gone In An Instant: Mother Defrauded in Facebook Marketplace Car Deal
A mother of four is warning others to be cautious after believing she had purchased a safe and dependable car...
Shocking Scam: Sydney Family Loses $200K Life-Savings in Suncorp Spoofing Fraud
A family from Sydney has lost their life savings worth $200,000 due to a fraudulent scam. Peter and Madison, who...
Mysterious Money Transfer Leaves Couple Speechless: How They Got an Unsolicited $4000
A young couple in Melbourne claims their bank is making up a personal loan they do not understand. Ashley and...
Phishing + AI + Voice Cloning= Big Trouble: The New Way Criminals are Stealing Your Money
New Alert: Criminals use AI and voice cloning to trick you out of your money. Earlier this year, Microsoft unveiled...
‘Impossible to Spot’ Delivery Scam Email Targets Australia Post Customers – Don’t Fall Victim!
Unsuspecting shoppers should be cautious as a parcel delivery scam that is hard to distinguish targets Australia Post customers. Email...