Achieve ASD ISM Compliance

The Australian Government Information Security Manual (ISM) outlines a cyber security framework formulated by the Australian Cyber Security Centre (ACSC) within the Australian Signals Directorate (ASD). The framework is designed to be applied by organisations, using their risk management framework, to protect their information and systems from cyber threats.

Achieve ISM compliance with the help of Huntsman Security’s solutions.

A summary of the ISM Risk Framework

The risk management framework used by the ISM draws from National Institute of Standards and Technology (NIST) Special Publication (SP) 800-37 Rev. 2. The ISM risk management framework includes six steps that organisations should follow and maintain to protect their assets:

Step 1 – Define the system

Determine the type, value and security objectives for the system based on an assessment of the impact if it were to be compromised.

Step 2 – Select security controls

Select security controls for the system and tailor them to achieve desired security objectives.

Step 3 – Implement security controls

Implement security controls for the system and its operating environment.

Step 4 – Assess security controls

Assess security controls for the system and its operating environment to determine if they have been implemented correctly and are operating as intended.

Step 5 – Authorise the system

Authorise the system to operate based on the acceptance of the security risks associated with its operation.

Step 6 – Monitor the system

Monitor the system, and associated cyber threats, security risks and security controls, on an ongoing basis.

How Huntsman Security supports ISM compliance

Huntsman Security’s solutions help you fulfil the requirements of the ISM within three key areas:

Essential 8 Scorecard

The Essential 8 Scorecard continuously scans and measures the effectiveness of your organisation’s security controls against the ACSC Essential Eight Framework. It delivers a continuous view of your cyber posture by automatically gathering data from ongoing security operations and through direct connections and configuration interfaces. The Essential 8 Scorecard identifies and reports on coverage, weak points, policy failures and vulnerabilities against each of the controls.

Essential 8 Scorecard - Trend Report

Enterprise SIEM

Huntsman Security’s Enterprise SIEM is a high volume, high speed next generation SIEM with inbuilt threat intelligence and behaviour anomaly detection. The technology undertakes high speed analysis of large volume streams of data to accurately detect non-compliant system activity, anomalous behaviour, security issues and cyber threats in real-time.

The technology has a proven track record of protecting environments within government, defence, intelligence and critical infrastructure.

Huntsman SIEM Dashboard - Incident Status

Find out more about ASD ISM compliance

SIGN UP TO RECEIVE CYBER SECURITY INSIGHTS

Read by directors, executives, and security professionals globally, operating in the most complex of security environments.