ACSC's 2018 Information Security Manual released
The Australian Cyber Security Centre (ACSC) has released the latest update to the Australian Government Information Security Manual (ISM), which aims to support a move to a risk-based approach to cybersecurity.
The ISM outlines a best practice approach to cybersecurity based on the ACSC’s experience in responding to Australian incidents.
The 2018 release of the manual aims to provide government organisations with greater flexibility to manage their cybersecurity based on their own unique circumstances.
It includes guidance covering a wide range of areas, including responding to cybersecurity incidents, as well as guidelines for enterprise mobility, communications systems and infrastructure security, physical and personnel security, email and network management, and the use of cryptography.
Updates to the guidance mostly concentrate on streamlining and simplifying existing content, as well as the move from a compliance-based regime to a risk management approach.
The ISM now also includes new controls to support the implementation of the Australian Securities Directorate’s Essential Eight cyber threat mitigation strategies.
“The ISM is updated regularly to make sure people are best equipped to tackle the security risks associated with prevailing cyber threats. You’ll see the document has been streamlined, to remove duplication and make it easier to use,” ACSC Head Alastair MacGibbon said.
“What hasn’t changed is each organisation’s responsibility to protect their people, information and assets.”
Please follow us and share on Twitter and Facebook. You can also subscribe for FREE to our weekly newsletter and quarterly magazine.
Securing Australia's digital future: identity security as a national priority
Government agencies in Australia must move beyond compliance minimums and embrace comprehensive...
Reflecting on the government DeepSeek ban
The AI arms race, especially between major players like DeepSeek, Alibaba, ByteDance and their US...
Demystifying zero trust for government
As zero trust becomes more central to ICT environments, it needs to be considered not just as an...