The Australian Signals Directorate (ASD) produces the Australian Government Information Security Manual (ISM). The manual is the standard which governs the security of government ICT systems. Improving ISM compliance is critical to government departments.
Is ASD ISM Compliance important to your business?
The Information Security Manual recognises that both public and private networks are subject to persistent and sophisticated levels of cyber security threat from numerous sources. Huntsman Security ISM Compliance Guide monitors your environment to the standard.
To deal with increasingly sophisticated targeted attacks, the ISM Principles advise Australian organisations to adopt a risk-based approach to protecting their information and ICT systems. The Australian Government Protective Security Policy Framework, and other nominated references, provide information about how to implement Information Security Risk Management processes to support the policy.
The key components of ISM Compliance
- IT security risk, IT security monitoring, risk mitigation
- Security breach, policy breach, cyber security, information security
- Security Event and Information Management (SIEM), IT risk management
- Event logging, root cause analysis, forensic audit, incident management
- Behaviour Anomaly Detection, security awareness training
How to achieve compliance to the ISM controls
The Huntsman® ISM Compliance Guide summarises the main controls of the ISM, shows how Huntsman technology maps to them, and how it helps organisations to assess and manage key aspects of their IT risk status, such as:
- Readiness to respond to targeted cyber security incidents
- The controls to protect the organisation from serious threats
- The potential cost of a cyber security incident
- Effectiveness of fostering a strong security culture