<?xml version="1.0" encoding="UTF-8"?>
<catalog xmlns="http://csrc.nist.gov/ns/oscal/1.0"
          uuid="abea4b79-3bd3-4f68-a333-85cbebb5100d">
   <metadata>
      <title>Information Security Manual</title>
      <published>2023-03-03T10:53:31.88948Z</published>
      <last-modified>2023-03-03T10:53:31.88948Z</last-modified>
      <version>2023.03.3</version>
      <oscal-version>1.0.4</oscal-version>
      <link rel="canonical" href="#6455b62e-c7af-4987-b87d-60b9575a59ff"/>
      <link rel="latest-version" href="#219fa690-b9c0-4e76-9333-d5136a5582d1"/>
      <link rel="predecessor-version" href="#22ed0344-d91c-43e9-80e0-adfed1aa0851"/>
      <link rel="successor-version" href="#16c8c2ed-5a37-40ac-a29e-3da92ad398dd"/>
      <link rel="alternate" href="#79f7a013-97a3-44f2-ba90-fcad6c5e4094"/>
      <role id="prepared-by">
         <title>Document creator</title>
      </role>
      <party type="organization" uuid="ae0012b5-2a98-4610-ba74-08928451a4c0">
         <name>Australian Cyber Security Centre</name>
         <short-name>ACSC</short-name>
         <link href="https://www.cyber.gov.au" rel="homepage"/>
         <email-address>asd.assist@defence.gov.au</email-address>
         <address type="work">
            <addr-line>Australian Cyber Security Centre</addr-line>
            <addr-line>General enquiries</addr-line>
            <addr-line>PO Box 5076</addr-line>
            <city>Kingston</city>
            <state>ACT</state>
            <postal-code>2604</postal-code>
            <country>AU</country>
         </address>
      </party>
      <responsible-party role-id="prepared-by">
         <party-uuid>ae0012b5-2a98-4610-ba74-08928451a4c0</party-uuid>
      </responsible-party>
   </metadata>
   <group>
      <title>Using the Information Security Manual</title>
      <prop name="sort-id" value="catalog[1].group[01]"/>
      <group>
         <title>Executive summary</title>
         <prop name="sort-id" value="catalog[1].group[01].group[1]"/>
         <group>
            <title>Purpose</title>
            <prop name="sort-id" value="catalog[1].group[01].group[1].group[1]"/>
            <part name="overview">
               <p>The purpose of the <a href="#e7ce6e23-4bbb-45c1-a657-7e563c0837ed">Information Security Manual</a> (ISM) is to outline a cyber security framework that an organisation can apply, using their risk management framework, to protect their systems and data from cyber threats.</p>
            </part>
         </group>
         <group>
            <title>Intended audience</title>
            <prop name="sort-id" value="catalog[1].group[01].group[1].group[2]"/>
            <part name="overview">
               <p>The ISM is intended for Chief Information Security Officers (CISOs), Chief Information Officers, cyber security professionals and information technology managers.</p>
            </part>
         </group>
         <group>
            <title>Authority</title>
            <prop name="sort-id" value="catalog[1].group[01].group[1].group[3]"/>
            <part name="overview">
               <p>The ISM represents the considered advice of the Australian Cyber Security Centre (ACSC) within the Australian Signals Directorate (ASD). This advice is provided in accordance with ASD’s designated functions under section 7(1)(ca) of the <a href="#bf76a2ec-3cf5-4a02-839a-7b2ea11cb3fc">Intelligence Services Act 2001</a>.</p>
               <p>The ACSC also provides cyber security advice in the form of Australian Communications Security Instructions and other cyber security-related publications. In these cases, device and application-specific advice may take precedence over the advice in the ISM.</p>
            </part>
         </group>
         <group>
            <title>Legislation and legal considerations</title>
            <prop name="sort-id" value="catalog[1].group[01].group[1].group[4]"/>
            <part name="overview">
               <p>An organisation is not required as a matter of law to comply with the ISM, unless legislation, or a direction given under legislation or by some other lawful authority, compels them to comply. Furthermore, the ISM does not override any obligations imposed by legislation or law. Finally, if the ISM conflicts with legislation or law, the latter takes precedence.</p>
               <p>While the ISM contains examples of when legislation or laws may be relevant for an organisation, there is no comprehensive consideration of such issues. When designing, operating and decommissioning systems, an organisation is encouraged to familiarise themselves with relevant legislation, such as the <a href="#e0d3b5ea-6a5a-400c-8daa-8a8059816a06">Archives Act 1983</a>, <a href="#6fac5a84-b86e-405f-b2b3-8c13ecee4a02">Privacy Act 1988</a>, <a href="#c0558477-3987-493c-99de-eeceff99847d">Security of Critical Infrastructure Act 2018</a> and <a href="#e4c07309-9ca8-40b7-9571-4f6c032180a1">Telecommunications (Interception and Access) Act 1979</a>.</p>
            </part>
         </group>
         <group>
            <title>Cyber security principles</title>
            <prop name="sort-id" value="catalog[1].group[01].group[1].group[5]"/>
            <part name="overview">
               <p>The purpose of the cyber security principles within the ISM is to provide strategic guidance on how an organisation can protect their systems and data from cyber threats. These cyber security principles are grouped into four key activities: govern, protect, detect and respond. An organisation should be able to demonstrate that the cyber security principles are being adhered to within their organisation.</p>
            </part>
         </group>
         <group>
            <title>Cyber security guidelines</title>
            <prop name="sort-id" value="catalog[1].group[01].group[1].group[6]"/>
            <part name="overview">
               <p>The purpose of the cyber security guidelines within the ISM is to provide practical guidance on how an organisation can protect their systems and data from cyber threats. These cyber security guidelines cover governance, physical security, personnel security, and information and communications technology security topics. An organisation should consider the cyber security guidelines that are relevant to each of the systems they operate.</p>
            </part>
         </group>
      </group>
      <group>
         <title>Applying a risk-based approach to cyber security</title>
         <prop name="sort-id" value="catalog[1].group[01].group[2]"/>
         <group>
            <title>Using a risk management framework</title>
            <prop name="sort-id" value="catalog[1].group[01].group[2].group[1]"/>
            <part name="overview">
               <p>The risk management framework used by the ISM draws from National Institute of Standards and Technology (NIST) Special Publication (SP) 800-37 Rev. 2, <a href="#4ea4e1e9-09f5-46c2-b003-352bc862d5ed">Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy</a>. Broadly, the risk management framework used by the ISM has six steps: define the system, select controls, implement controls, assess controls, authorise the system and monitor the system.</p>
            </part>
         </group>
         <group>
            <title>Define the system</title>
            <prop name="sort-id" value="catalog[1].group[01].group[2].group[2]"/>
            <part name="overview">
               <p>
                  <strong>Determine the type, value and security objectives for the system based on an assessment of the impact if it were to be compromised.</strong>
               </p>
               <p>When embarking upon the design of a system, the type, value and security objectives for the system, based on confidentiality, integrity and availability requirements, should be determined. This will ultimately guide activities, such as selecting and tailoring controls, to meet those security objectives and determine the level of residual security risk that will be accepted before the system is authorised to operate.</p>
               <p>Following the determination of the type and value of a system, along with its security objectives, a description of the system and its characteristics should be documented in the system’s system security plan.</p>
            </part>
         </group>
         <group>
            <title>Select controls</title>
            <prop name="sort-id" value="catalog[1].group[01].group[2].group[3]"/>
            <part name="overview">
               <p>
                  <strong>Select controls for the system and tailor them to achieve desired security objectives.</strong>
               </p>
               <p>Each cyber security guideline discusses security risks associated with the topics it covers. Paired with these discussions are controls that the ACSC considers to provide efficient and effective mitigations based on their suitability to achieve the security objectives for a system.</p>
               <p>While security risks and controls are discussed in the cyber security guidelines, and act as a baseline, they should not be considered an exhaustive list for a specific system type or technology. As such, the cyber security guidelines provide an important input into an organisation’s risk identification and risk treatment activities however do not represent the full extent of such activities.</p>
               <p>While the cyber security guidelines can assist with risk identification and risk treatment activities, an organisation will still need to undertake their own risk analysis and risk evaluation activities due to the unique nature of each system, its operating environment and the organisation’s risk tolerances.</p>
               <p>Following the selection and tailoring of controls for a system, they should be recorded along with the details of their planned implementation in the system’s system security plan annex. In addition, and as appropriate, controls should also be recorded in both the system’s incident response plan and continuous monitoring plan.</p>
               <p>Finally, the selection of controls for a system, as documented in the system’s system security plan annex, should be approved by the system’s authorising officer.</p>
            </part>
         </group>
         <group>
            <title>Implement controls</title>
            <prop name="sort-id" value="catalog[1].group[01].group[2].group[4]"/>
            <part name="overview">
               <p>
                  <strong>Implement controls for the system and its operating environment.</strong>
               </p>
               <p>Once suitable controls have been identified for a system, and approved by its authorising officer, they should be implemented. In doing so, the details of their actual implementation, if different from their planned implementation, should be documented in the system’s system security plan annex.</p>
            </part>
         </group>
         <group>
            <title>Assess controls</title>
            <prop name="sort-id" value="catalog[1].group[01].group[2].group[5]"/>
            <part name="overview">
               <p>
                  <strong>Assess controls for the system and its operating environment to determine if they have been implemented correctly and are operating as intended.</strong>
               </p>
               <p>In conducting a security assessment, it is important that assessors and system owners first agree to the scope, type and extent of assessment activities, which may be documented in a security assessment plan, such that any risks associated with the security assessment can be appropriately managed. To a large extent, the scope of the security assessment will be determined by the type of system and controls that have been implemented for the system and its operating environment.</p>
               <p>For TOP SECRET systems, including sensitive compartmented information systems, security assessments can be undertaken by ASD assessors (or their delegates). While for SECRET and below systems, security assessments can be undertaken by an organisation’s own assessors or Infosec Registered Assessors Program (IRAP) assessors. In all cases, assessors should hold an appropriate security clearance and have an appropriate level of experience and understanding of the type of system they are assessing.</p>
               <p>At the conclusion of a security assessment, a security assessment report should be produced outlining the scope of the security assessment, the system’s strengths and weaknesses, security risks associated with the operation of the system, the effectiveness of the implementation of controls, and any recommended remediation actions. This will assist in performing any initial remediation actions as well as guiding the development of the system’s plan of action and milestones.</p>
            </part>
         </group>
         <group>
            <title>Authorise the system</title>
            <prop name="sort-id" value="catalog[1].group[01].group[2].group[6]"/>
            <part name="overview">
               <p>
                  <strong>Authorise the system to operate based on the acceptance of the security risks associated with its operation.</strong>
               </p>
               <p>Before a system can be granted authorisation to operate, sufficient information should be provided to the authorising officer in order for them to make an informed risk-based decision as to whether the security risks associated with its operation are acceptable or not. This information should take the form of an authorisation package that includes the system’s system security plan, incident response plan, continuous monitoring plan, security assessment report, and plan of action and milestones.</p>
               <p>In some cases, the security risks associated with a system’s operation will be acceptable and it will be granted an ongoing authorisation to operate. However, in other cases the security risks associated with the operation of a system may be unacceptable. In such cases, the authorising officer may request further work be undertaken by the system owner. In the intervening time, the authorising officer may choose to grant authorisation to operate but with constraints placed on the system’s use, such as limiting the system’s functionality or specifying an expiration date for authorisation to operate. Finally, if the authorising officer deems the security risks to be unacceptable, regardless of any potential constraints placed on the system’s use, they may deny authorisation to operate until such time that sufficient remediation actions, if possible, have been completed to an acceptable standard.</p>
               <p>For TOP SECRET systems, and systems that process, store or communicate sensitive compartmented information, the authorising officer is Director-General ASD or their delegate; while for SECRET and below systems, the authorising officer is an organisation’s CISO or their delegate.</p>
               <p>For multinational and multi-organisation systems, the authorising officer should be determined by a formal agreement between the parties involved.</p>
               <p>For commercial providers providing services to an organisation, the authorising officer is the CISO of the supported organisation or their delegate.</p>
               <p>In all cases, the authorising officer should have an appropriate level of seniority and understanding of security risks they are accepting on behalf of their organisation. In cases where an organisation does not have a CISO, the authorising officer could be a Chief Security Officer, a Chief Information Officer or other senior executive within the organisation.</p>
            </part>
         </group>
         <group>
            <title>Monitor the system</title>
            <prop name="sort-id" value="catalog[1].group[01].group[2].group[7]"/>
            <part name="overview">
               <p>
                  <strong>Monitor the system, and associated cyber threats, security risks and controls, on an ongoing basis.</strong>
               </p>
               <p>Real-time monitoring of cyber threats, security risks and controls associated with a system and its operating environment, as outlined in a continuous monitoring plan, is essential to maintaining its security posture. In doing so, specific events may necessitate additional risk management activities. Such events may include:</p>
               <ul>
                  <li>changes in security policies relating to the system</li>
                  <li>detection of new or emerging cyber threats to the system or its operating environment</li>
                  <li>the discovery that controls for the system are not as effective as planned</li>
                  <li>a major cyber security incident involving the system</li>
                  <li>major architectural changes to the system.</li>
               </ul>
               <p>Following the implementation or modification of any controls as a result of risk management activities, another security assessment should be completed. In doing so, the system’s authorisation package should be updated. This in turn allows the authorising officer to make an informed risk-based decision as to whether the security risks associated with the system’s operation are still acceptable. Should security risks no longer be acceptable, the authorising officer may choose to either place constraints on the system’s use, such as introducing or amending an expiration date for authorisation to operate, or revoke authorisation to operate altogether.</p>
            </part>
         </group>
         <group>
            <title>Further information</title>
            <prop name="sort-id" value="catalog[1].group[01].group[2].group[8]"/>
            <part name="overview">
               <p>Further information on various risk management frameworks and practices can be found in:</p>
               <ul>
                  <li>International Organization for Standardization (ISO) 31000:2018, <a href="#5d217b62-2aa7-4d9c-93cc-da3916279802">Risk management – Guidelines</a>
                  </li>
                  <li>ISO Guide 73:2009, <a href="#96e29819-9d5d-4082-aa0d-b8debe59ef32">Risk management – Vocabulary</a>
                  </li>
                  <li>International Electrotechnical Commission 31010:2019, <a href="#69c67e26-82cf-426a-8358-0e486b5a9287">Risk management – Risk assessment techniques</a>
                  </li>
                  <li>ISO/International Electrotechnical Commission 27005:2022, <a href="#941626b7-cfcc-4ab2-83a0-f9a91b2e453e">Information security, cybersecurity and privacy protection – Guidance on managing information security risks</a>
                  </li>
                  <li>NIST SP 800-30 Rev. 1, <a href="#81401de7-184d-4535-a3f7-4de1c336630f">Guide for Conducting Risk Assessments</a>
                  </li>
                  <li>NIST SP 800-37 Rev. 2, <a href="#4ea4e1e9-09f5-46c2-b003-352bc862d5ed">Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy</a>.</li>
               </ul>
               <p>Further information on <a href="#84d3cbab-ab84-4981-a4f7-2bd469c8deaf">the purpose of IRAP</a>, and <a href="#bdd11ace-cb4e-470a-92ad-556c79b6c14a">a list of current IRAP assessors</a>, is available from the ACSC.</p>
            </part>
         </group>
      </group>
   </group>
   <group>
      <title>Cyber Security Principles</title>
      <prop name="sort-id" value="catalog[1].group[02]"/>
      <group>
         <title>The cyber security principles</title>
         <prop name="sort-id" value="catalog[1].group[02].group[1]"/>
         <part name="overview">
            <h1>Purpose of the cyber security principles</h1>
            <p>The purpose of the cyber security principles is to provide strategic guidance on how an organisation can protect their systems and data from cyber threats. These cyber security principles are grouped into four key activities: govern, protect, detect and respond.</p>
            <ul>
               <li>
                  <strong>Govern:</strong> Identifying and managing security risks.</li>
               <li>
                  <strong>Protect:</strong> Implementing controls to reduce security risks.</li>
               <li>
                  <strong>Detect:</strong> Detecting and understanding cyber security events to identify cyber security incidents.</li>
               <li>
                  <strong>Respond:</strong> Responding to and recovering from cyber security incidents.</li>
            </ul>
            <h1>Maturity modelling</h1>
            <p>When implementing the cyber security principles, an organisation can use the following maturity model to assess the implementation of individual principles, groups of principles or the cyber security principles as a whole. The five levels in the maturity model are:</p>
            <ul>
               <li>
                  <strong>Incomplete:</strong> The cyber security principles are partially implemented or not implemented.</li>
               <li>
                  <strong>Initial:</strong> The cyber security principles are implemented, but in a poor or ad hoc manner.</li>
               <li>
                  <strong>Developing:</strong> The cyber security principles are sufficiently implemented, but on a project-by-project basis.</li>
               <li>
                  <strong>Managing:</strong> The cyber security principles are established as standard business practices and robustly implemented throughout the organisation.</li>
               <li>
                  <strong>Optimising:</strong> A deliberate focus on optimisation and continual improvement exists for the implementation of the cyber security principles throughout the organisation.</li>
            </ul>
         </part>
         <group>
            <title>Govern principles</title>
            <prop name="sort-id" value="catalog[1].group[02].group[1].group[1]"/>
            <part name="overview">
               <p>The govern principles are:</p>
            </part>
            <control id="ism-principle-g1" class="ISM-principle">
               <title>Security Principle: G1</title>
               <prop name="sort-id"
                      value="catalog[1].group[02].group[1].group[1].control[1]"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-principle-g1_smt">
                  <p>A Chief Information Security Officer provides leadership and oversight of cyber security.</p>
               </part>
            </control>
            <control id="ism-principle-g2" class="ISM-principle">
               <title>Security Principle: G2</title>
               <prop name="sort-id"
                      value="catalog[1].group[02].group[1].group[1].control[2]"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-principle-g2_smt">
                  <p>The identity and value of systems, applications and data is determined and documented.</p>
               </part>
            </control>
            <control id="ism-principle-g3" class="ISM-principle">
               <title>Security Principle: G3</title>
               <prop name="sort-id"
                      value="catalog[1].group[02].group[1].group[1].control[3]"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-principle-g3_smt">
                  <p>The confidentiality, integrity and availability requirements for systems, applications and data are determined and documented.</p>
               </part>
            </control>
            <control id="ism-principle-g4" class="ISM-principle">
               <title>Security Principle: G4</title>
               <prop name="sort-id"
                      value="catalog[1].group[02].group[1].group[1].control[4]"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-principle-g4_smt">
                  <p>Security risk management processes are embedded into organisational risk management frameworks.</p>
               </part>
            </control>
            <control id="ism-principle-g5" class="ISM-principle">
               <title>Security Principle: G5</title>
               <prop name="sort-id"
                      value="catalog[1].group[02].group[1].group[1].control[5]"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-principle-g5_smt">
                  <p>Security risks are identified, documented, managed and accepted both before systems and applications are authorised for use, and continuously throughout their operational life.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Protect principles</title>
            <prop name="sort-id" value="catalog[1].group[02].group[1].group[2]"/>
            <part name="overview">
               <p>The protect principles are:</p>
            </part>
            <control id="ism-principle-p1" class="ISM-principle">
               <title>Security Principle: P1</title>
               <prop name="sort-id"
                      value="catalog[1].group[02].group[1].group[2].control[01]"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-principle-p1_smt">
                  <p>Systems and applications are designed, deployed, maintained and decommissioned according to their value and their confidentiality, integrity and availability requirements.</p>
               </part>
            </control>
            <control id="ism-principle-p2" class="ISM-principle">
               <title>Security Principle: P2</title>
               <prop name="sort-id"
                      value="catalog[1].group[02].group[1].group[2].control[02]"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-principle-p2_smt">
                  <p>Systems and applications are delivered and supported by trusted suppliers.</p>
               </part>
            </control>
            <control id="ism-principle-p3" class="ISM-principle">
               <title>Security Principle: P3</title>
               <prop name="sort-id"
                      value="catalog[1].group[02].group[1].group[2].control[03]"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-principle-p3_smt">
                  <p>Systems and applications are designed and configured to reduce their attack surface.</p>
               </part>
            </control>
            <control id="ism-principle-p4" class="ISM-principle">
               <title>Security Principle: P4</title>
               <prop name="sort-id"
                      value="catalog[1].group[02].group[1].group[2].control[04]"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-principle-p4_smt">
                  <p>Systems and applications are administered in a secure and accountable manner.</p>
               </part>
            </control>
            <control id="ism-principle-p5" class="ISM-principle">
               <title>Security Principle: P5</title>
               <prop name="sort-id"
                      value="catalog[1].group[02].group[1].group[2].control[05]"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-principle-p5_smt">
                  <p>Security vulnerabilities in systems and applications are identified and mitigated in a timely manner.</p>
               </part>
            </control>
            <control id="ism-principle-p6" class="ISM-principle">
               <title>Security Principle: P6</title>
               <prop name="sort-id"
                      value="catalog[1].group[02].group[1].group[2].control[06]"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-principle-p6_smt">
                  <p>Only trusted and supported operating systems, applications and computer code can execute on systems.</p>
               </part>
            </control>
            <control id="ism-principle-p7" class="ISM-principle">
               <title>Security Principle: P7</title>
               <prop name="sort-id"
                      value="catalog[1].group[02].group[1].group[2].control[07]"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-principle-p7_smt">
                  <p>Data is encrypted at rest and in transit between different systems.</p>
               </part>
            </control>
            <control id="ism-principle-p8" class="ISM-principle">
               <title>Security Principle: P8</title>
               <prop name="sort-id"
                      value="catalog[1].group[02].group[1].group[2].control[08]"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-principle-p8_smt">
                  <p>Data communicated between different systems is controlled and inspectable.</p>
               </part>
            </control>
            <control id="ism-principle-p9" class="ISM-principle">
               <title>Security Principle: P9</title>
               <prop name="sort-id"
                      value="catalog[1].group[02].group[1].group[2].control[09]"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-principle-p9_smt">
                  <p>Data, applications and configuration settings are backed up in a secure and proven manner on a regular basis.</p>
               </part>
            </control>
            <control id="ism-principle-p10" class="ISM-principle">
               <title>Security Principle: P10</title>
               <prop name="sort-id"
                      value="catalog[1].group[02].group[1].group[2].control[10]"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-principle-p10_smt">
                  <p>Only trusted and vetted personnel are granted access to systems, applications and data repositories.</p>
               </part>
            </control>
            <control id="ism-principle-p11" class="ISM-principle">
               <title>Security Principle: P11</title>
               <prop name="sort-id"
                      value="catalog[1].group[02].group[1].group[2].control[11]"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-principle-p11_smt">
                  <p>Personnel are granted the minimum access to systems, applications and data repositories required for their duties.</p>
               </part>
            </control>
            <control id="ism-principle-p12" class="ISM-principle">
               <title>Security Principle: P12</title>
               <prop name="sort-id"
                      value="catalog[1].group[02].group[1].group[2].control[12]"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-principle-p12_smt">
                  <p>Multiple methods are used to identify and authenticate personnel to systems, applications and data repositories.</p>
               </part>
            </control>
            <control id="ism-principle-p13" class="ISM-principle">
               <title>Security Principle: P13</title>
               <prop name="sort-id"
                      value="catalog[1].group[02].group[1].group[2].control[13]"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-principle-p13_smt">
                  <p>Personnel are provided with ongoing cyber security awareness training.</p>
               </part>
            </control>
            <control id="ism-principle-p14" class="ISM-principle">
               <title>Security Principle: P14</title>
               <prop name="sort-id"
                      value="catalog[1].group[02].group[1].group[2].control[14]"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-principle-p14_smt">
                  <p>Physical access to systems, supporting infrastructure and facilities is restricted to authorised personnel.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Detect principles</title>
            <prop name="sort-id" value="catalog[1].group[02].group[1].group[3]"/>
            <part name="overview">
               <p>The detect principles are:</p>
            </part>
            <control id="ism-principle-d1" class="ISM-principle">
               <title>Security Principle: D1</title>
               <prop name="sort-id"
                      value="catalog[1].group[02].group[1].group[3].control[1]"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-principle-d1_smt">
                  <p>Event logs are collected and analysed in a timely manner to detect cyber security events.</p>
               </part>
            </control>
            <control id="ism-principle-d2" class="ISM-principle">
               <title>Security Principle: D2</title>
               <prop name="sort-id"
                      value="catalog[1].group[02].group[1].group[3].control[2]"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-principle-d2_smt">
                  <p>Cyber security events are analysed in a timely manner to identify cyber security incidents.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Respond principles</title>
            <prop name="sort-id" value="catalog[1].group[02].group[1].group[4]"/>
            <part name="overview">
               <p>The respond principles are:</p>
            </part>
            <control id="ism-principle-r1" class="ISM-principle">
               <title>Security Principle: R1</title>
               <prop name="sort-id"
                      value="catalog[1].group[02].group[1].group[4].control[1]"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-principle-r1_smt">
                  <p>Cyber security incidents are reported both internally and externally to relevant bodies in a timely manner.</p>
               </part>
            </control>
            <control id="ism-principle-r2" class="ISM-principle">
               <title>Security Principle: R2</title>
               <prop name="sort-id"
                      value="catalog[1].group[02].group[1].group[4].control[2]"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-principle-r2_smt">
                  <p>Cyber security incidents are contained, eradicated and recovered from in a timely manner.</p>
               </part>
            </control>
            <control id="ism-principle-r3" class="ISM-principle">
               <title>Security Principle: R3</title>
               <prop name="sort-id"
                      value="catalog[1].group[02].group[1].group[4].control[3]"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-principle-r3_smt">
                  <p>Business continuity and disaster recovery plans are enacted when required.</p>
               </part>
            </control>
         </group>
      </group>
   </group>
   <group>
      <title>Guidelines for Cyber Security Roles</title>
      <prop name="sort-id" value="catalog[1].group[03]"/>
      <group>
         <title>Chief Information Security Officer</title>
         <prop name="sort-id" value="catalog[1].group[03].group[1]"/>
         <part name="overview">
            <h1>Required skills and experience</h1>
            <p>The role of the Chief Information Security Officer (CISO) requires a combination of technical and soft skills, such as business acumen, leadership, communications and relationship building. Additionally, a CISO must adopt a continuous approach to learning and up-skilling in order to maintain pace with the cyber threat landscape and new technologies. It is expected that a CISO show innovation and imagination in conceiving and delivering cyber security strategies for their organisation.</p>
            <h1>Further information</h1>
            <p>Further information on responding to cyber security incidents can be found in the managing cyber security incidents section of the <a href="#fe0138db-e83b-4a23-85d3-d84e1c22816f">Guidelines for Cyber Security Incidents</a>.</p>
            <p>Further information on cyber supply chain risk management can be found in the cyber supply chain risk management section of the <a href="#f37a4848-0791-4870-b316-5536c2681c28">Guidelines for Procurement and Outsourcing</a>.</p>
            <p>Further information on the procurement of outsourced services can be found in the managed services and cloud services section of the <a href="#f37a4848-0791-4870-b316-5536c2681c28">Guidelines for Procurement and Outsourcing</a>.</p>
            <p>Further information on cyber security awareness training programs can be found in the cyber security awareness training section of the <a href="#7d16ae67-87a7-4861-b939-e13ec279b5a2">Guidelines for Personnel Security</a>.</p>
         </part>
         <group>
            <title>Providing cyber security leadership and guidance</title>
            <prop name="sort-id" value="catalog[1].group[03].group[1].group[01]"/>
            <part name="overview">
               <p>To provide cyber security leadership and guidance within an organisation, it is important that the organisation appoints a CISO.</p>
            </part>
            <control id="ism-0714" class="ISM-control">
               <title>Control: ism-0714</title>
               <prop name="sort-id"
                      value="catalog[1].group[03].group[1].group[01].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="5"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Oct-20"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0714_smt">
                  <p>A CISO is appointed to provide cyber security leadership and guidance for their organisation.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Overseeing the cyber security program</title>
            <prop name="sort-id" value="catalog[1].group[03].group[1].group[02]"/>
            <part name="overview">
               <p>The CISO within an organisation is responsible for overseeing their organisation’s cyber security program and ensuring compliance with cyber security policy, standards, regulations and legislation. They are likely to work with a Chief Security Officer, a Chief Information Officer and other senior executives within their organisation.</p>
            </part>
            <control id="ism-1478" class="ISM-control">
               <title>Control: ism-1478</title>
               <prop name="sort-id"
                      value="catalog[1].group[03].group[1].group[02].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Oct-20"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1478_smt">
                  <p>The CISO oversees their organisation’s cyber security program and ensures their organisation’s compliance with cyber security policy, standards, regulations and legislation.</p>
               </part>
            </control>
            <control id="ism-1617" class="ISM-control">
               <title>Control: ism-1617</title>
               <prop name="sort-id"
                      value="catalog[1].group[03].group[1].group[02].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Oct-20"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1617_smt">
                  <p>The CISO regularly reviews and updates their organisation’s cyber security program to ensure its relevance in addressing cyber threats and harnessing business and cyber security opportunities.</p>
               </part>
            </control>
            <control id="ism-0724" class="ISM-control">
               <title>Control: ism-0724</title>
               <prop name="sort-id"
                      value="catalog[1].group[03].group[1].group[02].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Oct-20"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0724_smt">
                  <p>The CISO implements cyber security measurement metrics and key performance indicators for their organisation.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Coordinating cyber security</title>
            <prop name="sort-id" value="catalog[1].group[03].group[1].group[03]"/>
            <part name="overview">
               <p>The CISO is responsible for ensuring the alignment of cyber security and business objectives within their organisation. To achieve this, they should facilitate communication between cyber security and business stakeholders. This includes translating cyber security concepts and language into business concepts and language, as well as ensuring that business teams consult with cyber security teams to determine appropriate controls when planning new business projects. Additionally, as the CISO is responsible for the development of their organisation’s cyber security program, they are best placed to advise projects on the strategic direction of cyber security within their organisation.</p>
            </part>
            <control id="ism-0725" class="ISM-control">
               <title>Control: ism-0725</title>
               <prop name="sort-id"
                      value="catalog[1].group[03].group[1].group[03].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0725_smt">
                  <p>The CISO coordinates cyber security and business alignment through a cyber security steering committee or advisory board, comprising of key cyber security and business executives, which meets formally and on a regular basis.</p>
               </part>
            </control>
            <control id="ism-0726" class="ISM-control">
               <title>Control: ism-0726</title>
               <prop name="sort-id"
                      value="catalog[1].group[03].group[1].group[03].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Oct-20"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0726_smt">
                  <p>The CISO coordinates security risk management activities between cyber security and business teams.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Reporting on cyber security</title>
            <prop name="sort-id" value="catalog[1].group[03].group[1].group[04]"/>
            <part name="overview">
               <p>The CISO is responsible for reporting cyber security matters to their organisation’s senior executive or Board. Reporting should cover:</p>
               <ul>
                  <li>the organisation’s security risk profile</li>
                  <li>the status of key systems and any outstanding security risks</li>
                  <li>any planned cyber security uplift activities</li>
                  <li>any recent cyber security incidents</li>
                  <li>expected returns on cyber security investments.</li>
               </ul>
               <p>Reporting on cyber security matters should be structured by business functions, regions or legal entities and support a consolidated view of an organisation’s security risks.</p>
               <p>It is important that the CISO is able to translate security risks into operational risks for their organisation, including financial and legal risks, in order to enable more holistic conversations about their organisation’s risks.</p>
            </part>
            <control id="ism-0718" class="ISM-control">
               <title>Control: ism-0718</title>
               <prop name="sort-id"
                      value="catalog[1].group[03].group[1].group[04].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0718_smt">
                  <p>The CISO reports directly to their organisation’s senior executive or Board on cyber security matters.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Overseeing incident response activities</title>
            <prop name="sort-id" value="catalog[1].group[03].group[1].group[05]"/>
            <part name="overview">
               <p>To ensure the CISO is able to accurately report to their organisation’s senior executive or Board on cyber security matters, it is important they are fully aware of all cyber security incidents within their organisation.</p>
               <p>The CISO is also responsible for overseeing their organisation’s response to cyber security incidents, including how internal teams respond and communicate with each other during an incident. In the event of a major cyber security incident, the CISO should be prepared to step into a crisis management role. They should understand how to bring clarity to the situation and communicate effectively with internal and external stakeholders.</p>
            </part>
            <control id="ism-0733" class="ISM-control">
               <title>Control: ism-0733</title>
               <prop name="sort-id"
                      value="catalog[1].group[03].group[1].group[05].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Oct-20"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0733_smt">
                  <p>The CISO is fully aware of all cyber security incidents within their organisation.</p>
               </part>
            </control>
            <control id="ism-1618" class="ISM-control">
               <title>Control: ism-1618</title>
               <prop name="sort-id"
                      value="catalog[1].group[03].group[1].group[05].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Oct-20"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1618_smt">
                  <p>The CISO oversees their organisation’s response to cyber security incidents.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Contributing to business continuity and disaster recovery planning</title>
            <prop name="sort-id" value="catalog[1].group[03].group[1].group[06]"/>
            <part name="overview">
               <p>The CISO is responsible for contributing to the development and maintenance of their organisation’s business continuity and disaster recovery plans, with the aim to improve business resilience and ensure the continued operation of critical business processes.</p>
            </part>
            <control id="ism-0734" class="ISM-control">
               <title>Control: ism-0734</title>
               <prop name="sort-id"
                      value="catalog[1].group[03].group[1].group[06].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Jun-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0734_smt">
                  <p>The CISO contributes to the development and maintenance of business continuity and disaster recovery plans for their organisation to ensure that business-critical services are supported appropriately in the event of a disaster.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Developing a cyber security communications strategy</title>
            <prop name="sort-id" value="catalog[1].group[03].group[1].group[07]"/>
            <part name="overview">
               <p>To facilitate cyber security cultural change across their organisation, the CISO should act as a thought leader by continually communicating their strategy and vision. A communication strategy can be helpful in achieving this. Communications should be tailored to different parts of their organisation and be topical for the intended audience.</p>
            </part>
            <control id="ism-0720" class="ISM-control">
               <title>Control: ism-0720</title>
               <prop name="sort-id"
                      value="catalog[1].group[03].group[1].group[07].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0720_smt">
                  <p>The CISO develops, implements and maintains a cyber security communications strategy for their organisation.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Working with suppliers</title>
            <prop name="sort-id" value="catalog[1].group[03].group[1].group[08]"/>
            <part name="overview">
               <p>The CISO is responsible for ensuring that consistent vendor management processes are applied across their organisation, from discovery through to ongoing management. As supplier relationships come with additional security risks, the CISO should assist personnel with assessing cyber supply chain risks and understand the security impacts of entering into contracts with suppliers.</p>
            </part>
            <control id="ism-0731" class="ISM-control">
               <title>Control: ism-0731</title>
               <prop name="sort-id"
                      value="catalog[1].group[03].group[1].group[08].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Oct-20"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0731_smt">
                  <p>The CISO oversees cyber supply chain risk management activities for their organisation.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Receiving and managing a dedicated cyber security budget</title>
            <prop name="sort-id" value="catalog[1].group[03].group[1].group[09]"/>
            <part name="overview">
               <p>Receiving and managing a dedicated cyber security budget will ensure the CISO has sufficient access to funding to support their cyber security program, including cyber security uplift activities and responding to cyber security incidents.</p>
            </part>
            <control id="ism-0732" class="ISM-control">
               <title>Control: ism-0732</title>
               <prop name="sort-id"
                      value="catalog[1].group[03].group[1].group[09].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Oct-20"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0732_smt">
                  <p>The CISO receives and manages a dedicated cyber security budget for their organisation.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Overseeing cyber security personnel</title>
            <prop name="sort-id" value="catalog[1].group[03].group[1].group[10]"/>
            <part name="overview">
               <p>The CISO is responsible for the cyber security workforce within their organisation, including plans to attract, train and retain cyber security personnel. The CISO should also delegate relevant tasks to cyber security managers and other personnel as required and provide them with adequate authority and resources to perform their duties.</p>
            </part>
            <control id="ism-0717" class="ISM-control">
               <title>Control: ism-0717</title>
               <prop name="sort-id"
                      value="catalog[1].group[03].group[1].group[10].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Oct-20"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0717_smt">
                  <p>The CISO oversees the management of cyber security personnel within their organisation.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Overseeing cyber security awareness raising</title>
            <prop name="sort-id" value="catalog[1].group[03].group[1].group[11]"/>
            <part name="overview">
               <p>To ensure personnel are actively contributing to the security culture of their organisation, a cyber security awareness training program should be developed, implemented and maintained. As the CISO is responsible for cyber security within their organisation, they should oversee the development, implementation and maintenance of the cyber security awareness training program.</p>
            </part>
            <control id="ism-0735" class="ISM-control">
               <title>Control: ism-0735</title>
               <prop name="sort-id"
                      value="catalog[1].group[03].group[1].group[11].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0735_smt">
                  <p>The CISO oversees the development, implementation and maintenance of their organisation’s cyber security awareness training program.</p>
               </part>
            </control>
         </group>
      </group>
      <group>
         <title>System owners</title>
         <prop name="sort-id" value="catalog[1].group[03].group[2]"/>
         <part name="overview">
            <h1>Further information</h1>
            <p>Further information on using the <a href="#e7ce6e23-4bbb-45c1-a657-7e563c0837ed">Information Security Manual</a>’s six step risk management framework can be found in the applying a risk-based approach to cyber security section of <a href="#8a965432-7e2e-4020-86e4-b38837f9be60">Using the Information Security Manual</a>.</p>
            <p>Further information on monitoring systems and their operating environments can be found in the event logging and monitoring section of the <a href="#edc24216-f52b-4513-bcda-5fa564661999">Guidelines for System Monitoring</a>.</p>
         </part>
         <group>
            <title>System ownership and oversight</title>
            <prop name="sort-id" value="catalog[1].group[03].group[2].group[1]"/>
            <part name="overview">
               <p>System owners are responsible for ensuring the secure operation of their systems. However, system owners may delegate the day-to-day management and operation of their systems to system managers.</p>
            </part>
            <control id="ism-1071" class="ISM-control">
               <title>Control: ism-1071</title>
               <prop name="sort-id"
                      value="catalog[1].group[03].group[2].group[1].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-18"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1071_smt">
                  <p>Each system has a designated system owner.</p>
               </part>
            </control>
            <control id="ism-1525" class="ISM-control">
               <title>Control: ism-1525</title>
               <prop name="sort-id"
                      value="catalog[1].group[03].group[2].group[1].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Jan-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1525_smt">
                  <p>System owners register each system with its authorising officer.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Protecting systems and their resources</title>
            <prop name="sort-id" value="catalog[1].group[03].group[2].group[2]"/>
            <part name="overview">
               <p>Broadly, the risk management framework used by the <a href="#e7ce6e23-4bbb-45c1-a657-7e563c0837ed">Information Security Manual</a> has six steps: define the system, select controls, implement controls, assess controls, authorise the system and monitor the system. System owners are responsible for the implementation of this six step risk management framework for each of their systems.</p>
            </part>
            <control id="ism-1633" class="ISM-control">
               <title>Control: ism-1633</title>
               <prop name="sort-id"
                      value="catalog[1].group[03].group[2].group[2].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Jan-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1633_smt">
                  <p>System owners determine the type, value and security objectives for each system based on an assessment of the impact if it were to be compromised.</p>
               </part>
            </control>
            <control id="ism-1634" class="ISM-control">
               <title>Control: ism-1634</title>
               <prop name="sort-id"
                      value="catalog[1].group[03].group[2].group[2].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Jun-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1634_smt">
                  <p>System owners select controls for each system and tailor them to achieve desired security objectives.</p>
               </part>
            </control>
            <control id="ism-1635" class="ISM-control">
               <title>Control: ism-1635</title>
               <prop name="sort-id"
                      value="catalog[1].group[03].group[2].group[2].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Jun-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1635_smt">
                  <p>System owners implement controls for each system and its operating environment.</p>
               </part>
            </control>
            <control id="ism-1636" class="ISM-control">
               <title>Control: ism-1636</title>
               <prop name="sort-id"
                      value="catalog[1].group[03].group[2].group[2].control[4]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Jun-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1636_smt">
                  <p>System owners ensure controls for each system and its operating environment are assessed to determine if they have been implemented correctly and are operating as intended.</p>
               </part>
            </control>
            <control id="ism-0027" class="ISM-control">
               <title>Control: ism-0027</title>
               <prop name="sort-id"
                      value="catalog[1].group[03].group[2].group[2].control[5]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Jan-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0027_smt">
                  <p>System owners obtain authorisation to operate each system from its authorising officer based on the acceptance of the security risks associated with its operation.</p>
               </part>
            </control>
            <control id="ism-1526" class="ISM-control">
               <title>Control: ism-1526</title>
               <prop name="sort-id"
                      value="catalog[1].group[03].group[2].group[2].control[6]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Jun-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1526_smt">
                  <p>System owners monitor each system, and associated cyber threats, security risks and controls, on an ongoing basis.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Annual reporting of system security status</title>
            <prop name="sort-id" value="catalog[1].group[03].group[2].group[3]"/>
            <part name="overview">
               <p>Annual reporting by system owners on the security status of their systems to their authorising officer can assist the authorising officer in maintaining awareness of the security posture of systems within their organisation.</p>
            </part>
            <control id="ism-1587" class="ISM-control">
               <title>Control: ism-1587</title>
               <prop name="sort-id"
                      value="catalog[1].group[03].group[2].group[3].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Aug-20"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1587_smt">
                  <p>System owners report the security status of each system to its authorising officer at least annually.</p>
               </part>
            </control>
         </group>
      </group>
   </group>
   <group>
      <title>Guidelines for Cyber Security Incidents</title>
      <prop name="sort-id" value="catalog[1].group[04]"/>
      <group>
         <title>Managing cyber security incidents</title>
         <prop name="sort-id" value="catalog[1].group[04].group[1]"/>
         <part name="overview">
            <h1>Cyber security events</h1>
            <p>A cyber security event is an occurrence of a system, service or network state indicating a possible breach of security policy, failure of safeguards or a previously unknown situation that may be relevant to security.</p>
            <h1>Cyber security incidents</h1>
            <p>A cyber security incident is an unwanted or unexpected cyber security event, or a series of such events, that has either compromised business operations or has a significant probability of compromising business operations.</p>
            <h1>Cyber resilience</h1>
            <p>Cyber resilience is the ability to adapt to disruptions caused by cyber security incidents while maintaining continuous business operations. This includes the ability to detect, manage and recover from cyber security incidents.</p>
            <h1>Detecting cyber security incidents</h1>
            <p>One of the core elements of detecting and investigating cyber security incidents is the availability of appropriate data sources, such as event logs. The following event logs can be used by an organisation to assist with detecting and investigating cyber security incidents:</p>
            <ul>
               <li>
                  <strong>Cross Domain Solutions:</strong> May assist in identifying anomalous or malicious network traffic indicating an exploitation attempt or successful compromise.</li>
               <li>
                  <strong>Databases:</strong> May assist in identifying anomalous or malicious application or user behaviour indicating an exploitation attempt or successful compromise.</li>
               <li>
                  <strong>Domain Name System services:</strong> May assist in identifying attempts to resolve malicious domain names or Internet Protocol addresses indicating an exploitation attempt or successful compromise.</li>
               <li>
                  <strong>Email servers:</strong> May assist in identifying users targeted with phishing emails thereby helping to identify the initial vector of a compromise.</li>
               <li>
                  <strong>Gateways:</strong> May assist in identifying anomalous or malicious network traffic indicating an exploitation attempt or successful compromise.</li>
               <li>
                  <strong>Operating systems:</strong> May assist in identifying anomalous or malicious activity indicating an exploitation attempt or successful compromise.</li>
               <li>
                  <strong>Remote access services:</strong> May assist in identifying unusual locations of access or times of access indicating an exploitation attempt or successful compromise.</li>
               <li>
                  <strong>Security services:</strong> May assist in identifying anomalous or malicious application or network traffic indicating an exploitation attempt or successful compromise.</li>
               <li>
                  <strong>Server applications:</strong> May assist in identifying anomalous or malicious application behaviour indicating an exploitation attempt or successful compromise.</li>
               <li>
                  <strong>System access:</strong> May assist in identifying anomalous or malicious user behaviour indicating an exploitation attempt or successful compromise.</li>
               <li>
                  <strong>User applications:</strong> May assist in identifying anomalous or malicious application or user behaviour indicating an exploitation attempt or successful compromise.</li>
               <li>
                  <strong>Web applications:</strong> May assist in identifying anomalous or malicious application or user behaviour indicating an exploitation attempt or successful compromise.</li>
               <li>
                  <strong>Web proxies:</strong> May assist in identifying anomalous or malicious network traffic indicating an exploitation attempt or successful compromise.</li>
            </ul>
            <h1>Further information</h1>
            <p>Further information on event logging can be found in the event logging and monitoring section of the <a href="#edc24216-f52b-4513-bcda-5fa564661999">Guidelines for System Monitoring</a>.</p>
            <p>Further information on incident response plans can be found in the system-specific security documentation section of the <a href="#578d0434-6b3f-46f3-aad8-c7ac75c2ebcc">Guidelines for Security Documentation</a>.</p>
            <p>Further information on establishing and operating a trusted insider program can be found in the Carnegie Mellon University’s Software Engineering Institute’s <a href="#cad720b4-e47a-437d-b272-6958e738131d">Common Sense Guide to Mitigating Insider Threats</a> publication.</p>
            <p>Further information on reporting of cyber security incidents by service providers can be found in the managed services and cloud services section of the <a href="#f37a4848-0791-4870-b316-5536c2681c28">Guidelines for Procurement and Outsourcing</a>.</p>
            <p>Further information on <a href="#188466f6-be12-49ce-b99a-981e54b1663e">reporting cybercrime incidents</a> and <a href="#626d3582-3caf-49d6-89d5-4b8fdbbf1f31">reporting cyber security incidents</a> is available from the ACSC.</p>
         </part>
         <group>
            <title>Incident management policy</title>
            <prop name="sort-id" value="catalog[1].group[04].group[1].group[1]"/>
            <part name="overview">
               <p>Establishing an incident management policy can increase the likelihood of successfully planning for, detecting and responding to malicious activity on networks and hosts, such as cyber security events and cyber security incidents. In doing so, an incident management policy will likely cover the following:</p>
               <ul>
                  <li>responsibilities for planning for, detecting and responding to cyber security incidents</li>
                  <li>resources assigned to cyber security incident planning, detection and response activities</li>
                  <li>guidelines for triaging and responding to cyber security events and cyber security incidents.</li>
               </ul>
               <p>Furthermore, as part of maintaining the incident management policy, it is important that it is, along with its associated incident response plan, exercised at least annually to ensure it remains fit for purpose.</p>
            </part>
            <control id="ism-0576" class="ISM-control">
               <title>Control: ism-0576</title>
               <prop name="sort-id"
                      value="catalog[1].group[04].group[1].group[1].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="9"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0576_smt">
                  <p>An incident management policy, and associated incident response plan, is developed, implemented and maintained.</p>
               </part>
            </control>
            <control id="ism-1784" class="ISM-control">
               <title>Control: ism-1784</title>
               <prop name="sort-id"
                      value="catalog[1].group[04].group[1].group[1].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1784_smt">
                  <p>The incident management policy, including the associated incident response plan, is exercised at least annually.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Cyber security incident register</title>
            <prop name="sort-id" value="catalog[1].group[04].group[1].group[2]"/>
            <part name="overview">
               <p>Developing, implementing and maintaining a cyber security incident register can assist with ensuring that appropriate remediation activities are undertaken in response to cyber security incidents. In addition, the types and frequency of cyber security incidents, along with the costs of any remediation activities, can be used as an input to future risk assessment activities.</p>
            </part>
            <control id="ism-0125" class="ISM-control">
               <title>Control: ism-0125</title>
               <prop name="sort-id"
                      value="catalog[1].group[04].group[1].group[2].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="6"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0125_smt">
                  <p>A cyber security incident register is developed, implemented and maintained.</p>
               </part>
            </control>
            <control id="ism-1803" class="ISM-control">
               <title>Control: ism-1803</title>
               <prop name="sort-id"
                      value="catalog[1].group[04].group[1].group[2].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1803_smt">
                  <p>A cyber security incident register contains the following for each cyber security incident:</p>
                  <ul>
                     <li>the date the cyber security incident occurred</li>
                     <li>the date the cyber security incident was discovered</li>
                     <li>a description of the cyber security incident</li>
                     <li>any actions taken in response to the cyber security incident</li>
                     <li>to whom the cyber security incident was reported.</li>
                  </ul>
               </part>
            </control>
         </group>
         <group>
            <title>Trusted insider program</title>
            <prop name="sort-id" value="catalog[1].group[04].group[1].group[3]"/>
            <part name="overview">
               <p>As a trusted insider's system access and knowledge of business processes often makes them harder to detect, establishing and maintaining a trusted insider program can assist an organisation to detect and respond to trusted insider threats before they occur, or limit damage if they do occur. In doing so, an organisation will likely obtain the most benefit by logging and analysing the following user activities:</p>
               <ul>
                  <li>excessive copying or modification of files</li>
                  <li>unauthorised or excessive use of removable media</li>
                  <li>connecting devices capable of data storage to systems</li>
                  <li>unusual system usage outside of normal business hours</li>
                  <li>excessive data access or printing compared to their peers</li>
                  <li>data transfers to unauthorised cloud services or webmail</li>
                  <li>use of unauthorised Virtual Private Networks, file transfer applications or anonymity networks.</li>
               </ul>
            </part>
            <control id="ism-1625" class="ISM-control">
               <title>Control: ism-1625</title>
               <prop name="sort-id"
                      value="catalog[1].group[04].group[1].group[3].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1625_smt">
                  <p>A trusted insider program is developed, implemented and maintained.</p>
               </part>
            </control>
            <control id="ism-1626" class="ISM-control">
               <title>Control: ism-1626</title>
               <prop name="sort-id"
                      value="catalog[1].group[04].group[1].group[3].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Nov-20"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1626_smt">
                  <p>Legal advice is sought regarding the development and implementation of a trusted insider program.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Access to sufficient data sources and tools</title>
            <prop name="sort-id" value="catalog[1].group[04].group[1].group[4]"/>
            <part name="overview">
               <p>Successful detection of cyber security incidents requires trained cyber security personnel with access to sufficient data sources, such as event logs, that are complemented by tools that support both manual and automated analysis. As such, it is important that during system design and development activities, functionality is added to systems to ensure that sufficient data sources can be captured and provided to cyber security personnel.</p>
            </part>
            <control id="ism-0120" class="ISM-control">
               <title>Control: ism-0120</title>
               <prop name="sort-id"
                      value="catalog[1].group[04].group[1].group[4].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="5"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="May-20"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0120_smt">
                  <p>Cyber security personnel have access to sufficient data sources and tools to ensure that systems can be monitored for key indicators of compromise.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Reporting cyber security incidents</title>
            <prop name="sort-id" value="catalog[1].group[04].group[1].group[5]"/>
            <part name="overview">
               <p>Reporting cyber security incidents to an organisation’s Chief Information Security Officer, or one of their delegates, as soon as possible after they occur or are discovered provides senior management with the opportunity to assess the impact to their organisation and to oversee any incident response activities. Note, an organisation should also be cognisant of any legislative obligations in regards to reporting cyber security incidents to authorities, customers or the public.</p>
            </part>
            <control id="ism-0123" class="ISM-control">
               <title>Control: ism-0123</title>
               <prop name="sort-id"
                      value="catalog[1].group[04].group[1].group[5].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-18"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-0123_smt">
                  <p>Cyber security incidents are reported to an organisation’s Chief Information Security Officer, or one of their delegates, as soon as possible after they occur or are discovered.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Reporting cyber security incidents to the ACSC</title>
            <prop name="sort-id" value="catalog[1].group[04].group[1].group[6]"/>
            <part name="overview">
               <p>The Australian Cyber Security Centre (ACSC) uses the cyber security incident reports it receives as the basis for providing assistance to organisations. Cyber security incident reports are also used by the ACSC to identify trends and maintain an accurate threat environment picture. The ACSC utilises this understanding to assist in the development of new and updated cyber security advice, capabilities, and techniques to better prevent and respond to evolving cyber threats. An organisation is recommended to internally coordinate their reporting of cyber security incidents to the ACSC.</p>
               <p>The types of cyber security incidents that should be reported to the ACSC include:</p>
               <ul>
                  <li>suspicious activities, such as privileged account lockouts and unusual remote access activities</li>
                  <li>compromise of sensitive or classified data</li>
                  <li>unauthorised access or attempts to access a system</li>
                  <li>emails with suspicious attachments or links</li>
                  <li>denial-of-service attacks</li>
                  <li>ransomware attacks</li>
                  <li>suspected tampering of ICT equipment.</li>
               </ul>
            </part>
            <control id="ism-0140" class="ISM-control">
               <title>Control: ism-0140</title>
               <prop name="sort-id"
                      value="catalog[1].group[04].group[1].group[6].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="6"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="May-19"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-0140_smt">
                  <p>Cyber security incidents are reported to the ACSC.</p>
               </part>
            </control>
         </group>
      </group>
      <group>
         <title>Responding to cyber security incidents</title>
         <prop name="sort-id" value="catalog[1].group[04].group[2]"/>
         <part name="overview">
            <h1>Further information</h1>
            <p>Further information on incident response plans can be found in the system-specific security documentation section of the <a href="#578d0434-6b3f-46f3-aad8-c7ac75c2ebcc">Guidelines for Security Documentation</a>.</p>
            <p>Further information on handling and managing data spills can be found in the ACSC’s <a href="#705a6552-7266-4d4a-9643-77a21c6a2104">Data Spill Management Guide</a> publication.</p>
            <p>Further information on handling malicious code infections can be found in National Institute of Standards and Technology Special Publication 800-61 Rev. 2, <a href="#f48c0d05-5173-4c8e-8748-e5591518c1fb">Computer Security Incident Handling Guide</a>.</p>
         </part>
         <group>
            <title>Enacting incident response plans</title>
            <prop name="sort-id" value="catalog[1].group[04].group[2].group[1]"/>
            <part name="overview">
               <p>Following a cyber security incident being identified, an organisation’s incident response plan should be enacted.</p>
            </part>
            <control id="ism-1819" class="ISM-control">
               <title>Control: ism-1819</title>
               <prop name="sort-id"
                      value="catalog[1].group[04].group[2].group[1].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-23"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1819_smt">
                  <p>Following the identification of a cyber security incident, an organisation’s incident response plan is enacted.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Handling and containing data spills</title>
            <prop name="sort-id" value="catalog[1].group[04].group[2].group[2]"/>
            <part name="overview">
               <p>When a data spill occurs, an organisation should inform data owners and restrict access to the data. In doing so, affected systems can be powered off, have their network connectivity removed or have additional access controls applied to the data. It should be noted though that powering off systems could destroy data that would be useful for forensic investigations. Furthermore, users should be made aware of appropriate actions to take in the event of a data spill, such as not deleting, copying, printing or emailing the data.</p>
            </part>
            <control id="ism-0133" class="ISM-control">
               <title>Control: ism-0133</title>
               <prop name="sort-id"
                      value="catalog[1].group[04].group[2].group[2].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Jun-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0133_smt">
                  <p>When a data spill occurs, data owners are advised and access to the data is restricted.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Handling and containing malicious code infections</title>
            <prop name="sort-id" value="catalog[1].group[04].group[2].group[3]"/>
            <part name="overview">
               <p>Taking immediate remediation steps after the discovery of malicious code can minimise the time and cost spent eradicating and recovering from the infection. As a priority, all infected systems and media should be isolated to prevent the infection from spreading. Once isolated, infected systems and media can be scanned by antivirus software to potentially remove the infection or recover data. It is important to note though, a complete system restoration from a known good backup or rebuild may be the only reliable way to ensure that malicious code can be truly eradicated or data recovered.</p>
            </part>
            <control id="ism-0917" class="ISM-control">
               <title>Control: ism-0917</title>
               <prop name="sort-id"
                      value="catalog[1].group[04].group[2].group[3].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="7"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Oct-19"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0917_smt">
                  <p>When malicious code is detected, the following steps are taken to handle the infection:</p>
                  <ul>
                     <li>the infected systems are isolated</li>
                     <li>all previously connected media used in the period leading up to the infection are scanned for signs of infection and isolated if necessary</li>
                     <li>antivirus software is used to remove the infection from infected systems and media</li>
                     <li>if the infection cannot be reliably removed, systems are restored from a known good backup or rebuilt.</li>
                  </ul>
               </part>
            </control>
         </group>
         <group>
            <title>Handling and containing intrusions</title>
            <prop name="sort-id" value="catalog[1].group[04].group[2].group[4]"/>
            <part name="overview">
               <p>When an intrusion is detected on a system, an organisation may wish to allow the intrusion to continue for a short period of time in order to fully understand the extent of the compromise and to assist with planning intrusion remediation activities. However, an organisation allowing an intrusion to continue in order to collect data or evidence should first establish with their legal advisors whether such activities would be breaching the <a href="#e4c07309-9ca8-40b7-9571-4f6c032180a1">Telecommunications (Interception and Access) Act 1979</a>.</p>
               <p>To increase the likelihood of intrusion remediation activities successfully removing an adversary from their system, an organisation can take preventative measures to ensure the adversary has limited forewarning and awareness of planned intrusion remediation activities. Specifically, using an alternative system to plan and coordinate intrusion remediation activities will prevent alerting the adversary if they have already compromised email, messaging or collaboration services. In addition, conducting intrusion remediation activities in a coordinated manner during the same planned outage will prevent forewarning the adversary, thereby depriving them of sufficient time to establish alternative access points or persistence methods on the system.</p>
               <p>Following intrusion remediation activities, an organisation should determine whether the adversary has been successfully removed from the system, including whether or not they have since reacquired access. This can be achieved, in part, by capturing and analysing network traffic for at least seven days following remediation activities.</p>
            </part>
            <control id="ism-0137" class="ISM-control">
               <title>Control: ism-0137</title>
               <prop name="sort-id"
                      value="catalog[1].group[04].group[2].group[4].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0137_smt">
                  <p>Legal advice is sought before allowing intrusion activity to continue on a system for the purpose of collecting further data or evidence.</p>
               </part>
            </control>
            <control id="ism-1609" class="ISM-control">
               <title>Control: ism-1609</title>
               <prop name="sort-id"
                      value="catalog[1].group[04].group[2].group[4].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1609_smt">
                  <p>System owners are consulted before allowing intrusion activity to continue on a system for the purpose of collecting further data or evidence.</p>
               </part>
            </control>
            <control id="ism-1731" class="ISM-control">
               <title>Control: ism-1731</title>
               <prop name="sort-id"
                      value="catalog[1].group[04].group[2].group[4].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1731_smt">
                  <p>Planning and coordination of intrusion remediation activities are conducted on a separate system to that which has been compromised.</p>
               </part>
            </control>
            <control id="ism-1732" class="ISM-control">
               <title>Control: ism-1732</title>
               <prop name="sort-id"
                      value="catalog[1].group[04].group[2].group[4].control[4]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1732_smt">
                  <p>To the extent possible, all intrusion remediation activities are conducted in a coordinated manner during the same planned outage.</p>
               </part>
            </control>
            <control id="ism-1213" class="ISM-control">
               <title>Control: ism-1213</title>
               <prop name="sort-id"
                      value="catalog[1].group[04].group[2].group[4].control[5]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1213_smt">
                  <p>Following intrusion remediation activities, full network traffic is captured for at least seven days and analysed to determine whether the adversary has been successfully removed from the system.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Maintaining the integrity of evidence</title>
            <prop name="sort-id" value="catalog[1].group[04].group[2].group[5]"/>
            <part name="overview">
               <p>When gathering evidence following a cyber security incident, it is important that it is gathered in an appropriate manner and that its integrity is maintained. In addition, if the ACSC is requested to assist with investigations, no actions which could affect the integrity of evidence should be carried out before the ACSC becomes involved.</p>
            </part>
            <control id="ism-0138" class="ISM-control">
               <title>Control: ism-0138</title>
               <prop name="sort-id"
                      value="catalog[1].group[04].group[2].group[5].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="5"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-23"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0138_smt">
                  <p>The integrity of evidence gathered during an investigation is maintained by investigators:</p>
                  <ul>
                     <li>recording all of their actions</li>
                     <li>maintaining a proper chain of custody</li>
                     <li>following all instructions provided by relevant law enforcement agencies.</li>
                  </ul>
               </part>
            </control>
         </group>
      </group>
   </group>
   <group>
      <title>Guidelines for Procurement and Outsourcing</title>
      <prop name="sort-id" value="catalog[1].group[05]"/>
      <group>
         <title>Cyber supply chain risk management</title>
         <prop name="sort-id" value="catalog[1].group[05].group[1]"/>
         <part name="overview">
            <h1>Further information</h1>
            <p>Further information on cyber supply chain risk management can be found in the Australian Cyber Security Centre (ACSC)’s <a href="#37f65b5b-ce8c-4137-9c84-41678af1e70e">Cyber Supply Chain Risk Management</a> and <a href="#85ee803a-b711-443b-98bf-b279de8fbed0">Identifying Cyber Supply Chain Risks</a> publications.</p>
            <p>Further information on cyber supply chain risk management can also be found in:</p>
            <ul>
               <li>Canadian Centre for Cyber Security’s <a href="#971c6452-6e97-4b4f-b5e4-64e457cb8320">Cyber supply chain: An approach to assessing risk</a>
               </li>
               <li>New Zealand’s National Cyber Security Centre’s <a href="#8a0daed2-8840-443f-a83e-68252d2dcdc5">Supply Chain Cyber Security: In Safe Hands</a>
               </li>
               <li>United Kingdom’s National Cyber Security Centre’s <a href="#19947ae5-678c-4dc0-a35e-283e4af1284c">Supply chain security guidance</a>.</li>
               <li>Further information on cyber supply chain risk management can also be found in the United States’ Cybersecurity &amp; Infrastructure Security Agency’s <a href="#014064b7-5b77-4a79-af6c-79a16f4d0cb2">ICT supply chain resource library</a>.</li>
            </ul>
            <p>Further information on cyber supply chain integrity can be found in National Institute of Standards and Technology Special Publication 800-161 Rev. 1, <a href="#0d7243fc-65f0-4b4e-9358-bf4f6e0e34d7">Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations</a>.</p>
            <p>Further information on outsourced products and services can be found in the Attorney-General’s Department’s <a href="#92679127-f61d-486a-a93e-df2a26dfb07a">Protective Security Policy Framework</a>, <a href="#8bb7bf2c-a933-4a80-8ad7-ca4426839c5d">Security governance for contracted goods and service providers</a> policy.</p>
            <p>Further information on the procurement and use of evaluated applications and ICT equipment can be found in the evaluated product procurement and evaluated product use sections of the <a href="#a699a3aa-828d-479b-b50b-98127bb19437">Guidelines for Evaluated Products</a>.</p>
         </part>
         <group>
            <title>Cyber supply chain risk management activities</title>
            <prop name="sort-id" value="catalog[1].group[05].group[1].group[1]"/>
            <part name="overview">
               <p>Cyber supply chain risk management activities should be conducted during the earliest possible stage of procurement of applications, ICT equipment and services. In particular, an organisation should consider the security risks that may arise as systems, software and hardware are being designed, built, stored, delivered, installed, operated, maintained and decommissioned. This includes identifying and managing jurisdictional, governance, privacy and security risks associated with the use of suppliers, such as application developers, ICT equipment manufacturers, service providers and other organisations involved in distribution channels. For example, outsourced cloud services may be located offshore and subject to lawful and covert data collection without their customers’ knowledge. Additionally, use of offshore services introduces jurisdictional risks as foreign countries’ laws could change with little warning. Finally, foreign owned suppliers operating in Australia may be subject to a foreign government’s lawful access to data belonging to their customers.</p>
               <p>In managing cyber supply chain risks, it is important that an organisation preferences suppliers that have demonstrated a commitment to the security of their products and services – including throughout distribution channels. In addition, suppliers should have a strong track record of transparency and maintaining the security of their own systems and cyber supply chains. Also, in some cases, a shared responsibly model which clearly defines the responsibilities of suppliers and their customers can be highly beneficial.</p>
            </part>
            <control id="ism-1631" class="ISM-control">
               <title>Control: ism-1631</title>
               <prop name="sort-id"
                      value="catalog[1].group[05].group[1].group[1].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1631_smt">
                  <p>Suppliers of applications, ICT equipment and services associated with systems are identified.</p>
               </part>
            </control>
            <control id="ism-1452" class="ISM-control">
               <title>Control: ism-1452</title>
               <prop name="sort-id"
                      value="catalog[1].group[05].group[1].group[1].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1452_smt">
                  <p>A supply chain risk assessment is performed for suppliers of applications, ICT equipment and services in order to assess the impact to a system’s security risk profile.</p>
               </part>
            </control>
            <control id="ism-1567" class="ISM-control">
               <title>Control: ism-1567</title>
               <prop name="sort-id"
                      value="catalog[1].group[05].group[1].group[1].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1567_smt">
                  <p>Suppliers identified as high risk by a cyber supply chain risk assessment are not used.</p>
               </part>
            </control>
            <control id="ism-1568" class="ISM-control">
               <title>Control: ism-1568</title>
               <prop name="sort-id"
                      value="catalog[1].group[05].group[1].group[1].control[4]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-23"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1568_smt">
                  <p>Applications, ICT equipment and services are chosen from suppliers that have demonstrated a commitment to the security of their products and services.</p>
               </part>
            </control>
            <control id="ism-1632" class="ISM-control">
               <title>Control: ism-1632</title>
               <prop name="sort-id"
                      value="catalog[1].group[05].group[1].group[1].control[5]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1632_smt">
                  <p>Applications, ICT equipment and services are chosen from suppliers that have a strong track record of transparency and maintaining the security of their own systems and cyber supply chains.</p>
               </part>
            </control>
            <control id="ism-1569" class="ISM-control">
               <title>Control: ism-1569</title>
               <prop name="sort-id"
                      value="catalog[1].group[05].group[1].group[1].control[6]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1569_smt">
                  <p>A shared responsibility model is created, documented and shared between suppliers and their customers in order to articulate the security responsibilities of each party.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Supplier relationship management</title>
            <prop name="sort-id" value="catalog[1].group[05].group[1].group[2]"/>
            <part name="overview">
               <p>Developing, implementing and maintaining a supplier relationship management policy can assist an organisation in identifying, prioritising and maintaining strong relationships with suppliers that have demonstrated a commitment to the security of their products and services. In doing so, these suppliers should be recorded on an approved supplier list.</p>
            </part>
            <control id="ism-1785" class="ISM-control">
               <title>Control: ism-1785</title>
               <prop name="sort-id"
                      value="catalog[1].group[05].group[1].group[2].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1785_smt">
                  <p>A supplier relationship management policy is developed, implemented and maintained.</p>
               </part>
            </control>
            <control id="ism-1786" class="ISM-control">
               <title>Control: ism-1786</title>
               <prop name="sort-id"
                      value="catalog[1].group[05].group[1].group[2].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1786_smt">
                  <p>An approved supplier list is developed, implemented and maintained.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Sourcing applications, ICT equipment and services</title>
            <prop name="sort-id" value="catalog[1].group[05].group[1].group[3]"/>
            <part name="overview">
               <p>In sourcing applications, ICT equipment and services, an organisation should use trusted suppliers that they have previously vetted as part of cyber supply chain risk management assessments and subsequently recorded on their approved supplier list.</p>
               <p>Furthermore, in order to support system availability, an organisation should aim to identify multiple potential suppliers for critical applications, ICT equipment and services. This coupled with keeping sufficient spares of critical ICT equipment in reserve, can assist in mitigating the impact of cyber supply chain disruptions.</p>
            </part>
            <control id="ism-1787" class="ISM-control">
               <title>Control: ism-1787</title>
               <prop name="sort-id"
                      value="catalog[1].group[05].group[1].group[3].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1787_smt">
                  <p>Applications, ICT equipment and services are sourced from approved suppliers.</p>
               </part>
            </control>
            <control id="ism-1788" class="ISM-control">
               <title>Control: ism-1788</title>
               <prop name="sort-id"
                      value="catalog[1].group[05].group[1].group[3].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1788_smt">
                  <p>Multiple potential suppliers are identified for sourcing critical applications, ICT equipment and services.</p>
               </part>
            </control>
            <control id="ism-1789" class="ISM-control">
               <title>Control: ism-1789</title>
               <prop name="sort-id"
                      value="catalog[1].group[05].group[1].group[3].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1789_smt">
                  <p>Sufficient spares of critical ICT equipment are sourced and kept in reserve.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Delivery of applications, ICT equipment and services</title>
            <prop name="sort-id" value="catalog[1].group[05].group[1].group[4]"/>
            <part name="overview">
               <p>As part of the delivery of applications, ICT equipment and services, measures should be implemented to protect their integrity, noting that such measures will differ depending on whether delivery relates to digital or physical distribution channels. For example, applications may benefit from delivery via encrypted communication channels while ICT equipment may benefit from tracking and tamper-evident packaging. In doing so, such measures are only beneficial if they are assessed as part of acceptance of products and services. In all cases, suppliers should be consulted on how best to confirm the integrity of their products and services.</p>
               <p>While ensuring the integrity of applications, ICT equipment and services is important, so is ensuring their authenticity. For example, a counterfeit product or service securely delivered is still a counterfeit product or service that may not operate as intended or pose a risk to the security of a system. To assist in identifying counterfeit products and services, suppliers should be consulted on how best to confirm the authenticity of their products and services.</p>
            </part>
            <control id="ism-1790" class="ISM-control">
               <title>Control: ism-1790</title>
               <prop name="sort-id"
                      value="catalog[1].group[05].group[1].group[4].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1790_smt">
                  <p>Applications, ICT equipment and services are delivered in a manner that maintains their integrity.</p>
               </part>
            </control>
            <control id="ism-1791" class="ISM-control">
               <title>Control: ism-1791</title>
               <prop name="sort-id"
                      value="catalog[1].group[05].group[1].group[4].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1791_smt">
                  <p>The integrity of applications, ICT equipment and services are assessed as part of acceptance of products and services.</p>
               </part>
            </control>
            <control id="ism-1792" class="ISM-control">
               <title>Control: ism-1792</title>
               <prop name="sort-id"
                      value="catalog[1].group[05].group[1].group[4].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1792_smt">
                  <p>The authenticity of applications, ICT equipment and services are assessed as part of acceptance of products and services.</p>
               </part>
            </control>
         </group>
      </group>
      <group>
         <title>Managed services and cloud services</title>
         <prop name="sort-id" value="catalog[1].group[05].group[2]"/>
         <part name="overview">
            <h1>Further information</h1>
            <p>Further information on the use of outsourced cloud services can be found in the service continuity for online services section of the <a href="#f145ff5b-d396-4248-8f48-621349d6f0ed">Guidelines for Networking</a>.</p>
            <p>Further information on the use of outsourced gateway services can be found in the gateways section of the <a href="#e8bde527-526c-4a6a-b66f-05228f09dd7b">Guidelines for Gateways</a>.</p>
            <p>Further information on managed service providers can be found in the ACSC’s <a href="#45899752-c83f-4976-bc99-03f6824a0793">How to Manage Your Security When Engaging a Managed Service Provider</a> and <a href="#76068c96-8d89-4c37-9eef-03488d5e1b1d">Questions to ask Managed Service Providers</a> publications.</p>
            <p>Further information on the definition of cloud computing can be found in National Institute of Standards and Technology Special Publication 800-145, <a href="#c17600e6-8b13-4d6e-a380-035b51a71b73">The NIST Definition of Cloud Computing</a>.</p>
            <p>Further information on securing cloud services can be found in the ACSC’s <a href="#d7e72166-b127-4249-bf93-3a7467c53f1d">Cloud Computing Security Considerations</a>, <a href="#347eee88-cb61-44b9-81ce-ab97dd08387c">Cloud Computing Security for Cloud Service Providers</a> and <a href="#b959caf4-8b60-4b82-9552-963754841bb7">Cloud Computing Security for Tenants</a> publications.</p>
            <p>Further information on conducting security assessments of cloud service providers can be found in the ACSC’s <a href="#b6479d9a-43c9-41f2-9dbc-2bb689c8e6d8">Anatomy of a Cloud Assessment and Authorisation</a> and <a href="#dda788b6-183b-4e89-8254-8c4b5d0540a0">Cloud Assessment and Authorisation – Frequently Asked Questions</a> publications.</p>
            <p>Further information on <a href="#84d3cbab-ab84-4981-a4f7-2bd469c8deaf">the purpose of IRAP</a>, and <a href="#bdd11ace-cb4e-470a-92ad-556c79b6c14a">a list of current IRAP assessors</a>, is available from the ACSC.</p>
            <p>Further information on the whole-of-government policy for secure cloud computing can be found in the Digital Transformation Agency’s <a href="#6ba86dff-e078-4896-8884-344e491a9cc4">Secure Cloud Strategy</a> publication.</p>
            <p>Further information on reporting cyber security incidents can be found in the reporting cyber security incidents section of the <a href="#fe0138db-e83b-4a23-85d3-d84e1c22816f">Guidelines for Cyber Security Incidents</a>.</p>
         </part>
         <group>
            <title>Managed services</title>
            <prop name="sort-id" value="catalog[1].group[05].group[2].group[1]"/>
            <part name="overview">
               <p>Managed service providers manage the services of an organisation on their behalf. This may include application services, authentication services, backup services, desktop services, enterprise mobility services, gateway services, hosting services, network services, procurement services, security services, support services, and many other business-related services. In doing so, managed service providers may manage services from their customers’ premises or their own premises. In considering security risks associated with managed services, an organisation should consider all managed service providers that have access to their facilities, systems or data.</p>
            </part>
            <control id="ism-1736" class="ISM-control">
               <title>Control: ism-1736</title>
               <prop name="sort-id"
                      value="catalog[1].group[05].group[2].group[1].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1736_smt">
                  <p>A managed service register is developed, implemented, maintained and verified on a regular basis.</p>
               </part>
            </control>
            <control id="ism-1737" class="ISM-control">
               <title>Control: ism-1737</title>
               <prop name="sort-id"
                      value="catalog[1].group[05].group[2].group[1].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1737_smt">
                  <p>A managed service register contains the following for each managed service:</p>
                  <ul>
                     <li>managed service provider’s name</li>
                     <li>managed service’s name</li>
                     <li>purpose for using the managed service</li>
                     <li>sensitivity or classification of data involved</li>
                     <li>due date for the next security assessment of the managed service</li>
                     <li>contractual arrangements for the managed service</li>
                     <li>point of contact for users of the managed service</li>
                     <li>24/7 contact details for the managed service provider.</li>
                  </ul>
               </part>
            </control>
         </group>
         <group>
            <title>Assessment of managed service providers</title>
            <prop name="sort-id" value="catalog[1].group[05].group[2].group[2]"/>
            <part name="overview">
               <p>Managed service providers will need to undergo regular security assessments by an Infosec Registered Assessor Program (IRAP) assessor to determine their security posture and security risks associated with their use. Following an initial security assessment by an IRAP assessor, subsequent security assessments should focus on any new services that are being offered as well as any security-related changes that have occurred since the previous security assessment.</p>
            </part>
            <control id="ism-1793" class="ISM-control">
               <title>Control: ism-1793</title>
               <prop name="sort-id"
                      value="catalog[1].group[05].group[2].group[2].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1793_smt">
                  <p>Managed service providers and their managed services undergo a security assessment by an IRAP assessor at least every 24 months.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Outsourced cloud services</title>
            <prop name="sort-id" value="catalog[1].group[05].group[2].group[3]"/>
            <part name="overview">
               <p>Outsourcing can be a cost-effective option for providing cloud services, as well as potentially delivering a superior service. However, outsourcing can affect an organisation’s security risk profile. Ultimately, an organisation will still need to decide whether a particular outsourced cloud service represents an acceptable security risk and, if appropriate to do so, authorise it for their own use.</p>
            </part>
            <control id="ism-1637" class="ISM-control">
               <title>Control: ism-1637</title>
               <prop name="sort-id"
                      value="catalog[1].group[05].group[2].group[3].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1637_smt">
                  <p>An outsourced cloud service register is developed, implemented, maintained and verified on a regular basis.</p>
               </part>
            </control>
            <control id="ism-1638" class="ISM-control">
               <title>Control: ism-1638</title>
               <prop name="sort-id"
                      value="catalog[1].group[05].group[2].group[3].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1638_smt">
                  <p>An outsourced cloud service register contains the following for each outsourced cloud service:</p>
                  <ul>
                     <li>cloud service provider’s name</li>
                     <li>cloud service’s name</li>
                     <li>purpose for using the cloud service</li>
                     <li>sensitivity or classification of data involved</li>
                     <li>due date for the next security assessment of the cloud service</li>
                     <li>contractual arrangements for the cloud service</li>
                     <li>point of contact for users of the cloud service</li>
                     <li>24/7 contact details for the cloud service provider.</li>
                  </ul>
               </part>
            </control>
            <control id="ism-1529" class="ISM-control">
               <title>Control: ism-1529</title>
               <prop name="sort-id"
                      value="catalog[1].group[05].group[2].group[3].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-1529_smt">
                  <p>Only community or private clouds are used for outsourced SECRET and TOP SECRET cloud services.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Assessment of outsourced cloud service providers</title>
            <prop name="sort-id" value="catalog[1].group[05].group[2].group[4]"/>
            <part name="overview">
               <p>Outsourced cloud service providers and their cloud services will need to undergo regular security assessments by an IRAP assessor to determine their security posture and security risks associated with their use. Following an initial security assessment by an IRAP assessor, subsequent security assessments should focus on any new cloud services that are being offered as well as any security-related changes that have occurred since the previous security assessment.</p>
            </part>
            <control id="ism-1570" class="ISM-control">
               <title>Control: ism-1570</title>
               <prop name="sort-id"
                      value="catalog[1].group[05].group[2].group[4].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Jun-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1570_smt">
                  <p>Outsourced cloud service providers and their cloud services undergo a security assessment by an IRAP assessor at least every 24 months.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Contractual security requirements with service providers</title>
            <prop name="sort-id" value="catalog[1].group[05].group[2].group[5]"/>
            <part name="overview">
               <p>Obligations for protecting data are no different when using a managed service or cloud service than when using an in-house service. As such, contractual arrangements with service providers should address how data entrusted to them, including to any of their subcontractors, will be protected both during contractual arrangements and following the completion or termination of contractual arrangements. However, in some cases an organisation may require managed services or cloud services to be used before all security requirements have been implemented by a service provider. In such cases, contractual arrangements with service providers should include appropriate timeframes for the implementation of security requirements and break clauses if these are not achieved.</p>
               <p>In addition, although data ownership resides with service providers’ customers, this can become less clear in some circumstances, such as when legal action is taken and a service provider is asked to provide access to, or data from, their assets. To mitigate the likelihood of data being unavailable or compromised, an organisation can document the types of data and its ownership in contractual arrangements with service providers.</p>
               <p>Furthermore, an organisation may make the decision to move from their current service provider for strategic, operational or governance reasons. This may involve changing to another service provider, moving to a different service with the same service provider or moving back to an on-premises solution. In many cases, transferring data and functionality between old and new services or systems will be desired. Service providers can assist their customers by ensuring data is as portable as possible and that as much data can be exported as possible. As such, data should be stored in a documented format, preferably an open standard, noting that undocumented or proprietary formats may make it more difficult for an organisation to perform backup, service migration or service decommissioning activities.</p>
               <p>Finally, to ensure that an organisation is given sufficient time to download their data or move to another service provider should a service provider cease offering a particular service, a one month notification period should be documented in contractual arrangements with service providers.</p>
            </part>
            <control id="ism-1395" class="ISM-control">
               <title>Control: ism-1395</title>
               <prop name="sort-id"
                      value="catalog[1].group[05].group[2].group[5].control[01]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="7"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1395_smt">
                  <p>Service providers, including any subcontractors, provide an appropriate level of protection for any data entrusted to them or their services.</p>
               </part>
            </control>
            <control id="ism-0072" class="ISM-control">
               <title>Control: ism-0072</title>
               <prop name="sort-id"
                      value="catalog[1].group[05].group[2].group[5].control[02]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="9"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0072_smt">
                  <p>Security requirements associated with the confidentiality, integrity and availability of data are documented in contractual arrangements with service providers and reviewed on a regular and ongoing basis to ensure they remain fit for purpose.</p>
               </part>
            </control>
            <control id="ism-1571" class="ISM-control">
               <title>Control: ism-1571</title>
               <prop name="sort-id"
                      value="catalog[1].group[05].group[2].group[5].control[03]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1571_smt">
                  <p>The right to verify compliance with security requirements is documented in contractual arrangements with service providers.</p>
               </part>
            </control>
            <control id="ism-1738" class="ISM-control">
               <title>Control: ism-1738</title>
               <prop name="sort-id"
                      value="catalog[1].group[05].group[2].group[5].control[04]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1738_smt">
                  <p>The right to verify compliance with security requirements documented in contractual arrangements with service providers is exercised on a regular and ongoing basis.</p>
               </part>
            </control>
            <control id="ism-1804" class="ISM-control">
               <title>Control: ism-1804</title>
               <prop name="sort-id"
                      value="catalog[1].group[05].group[2].group[5].control[05]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1804_smt">
                  <p>Break clauses associated with failure to meet security requirements are documented in contractual arrangements with service providers.</p>
               </part>
            </control>
            <control id="ism-0141" class="ISM-control">
               <title>Control: ism-0141</title>
               <prop name="sort-id"
                      value="catalog[1].group[05].group[2].group[5].control[06]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="7"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0141_smt">
                  <p>The requirement for service providers to report cyber security incidents to a designated point of contact as soon as possible after they occur or are discovered is documented in contractual arrangements with service providers.</p>
               </part>
            </control>
            <control id="ism-1794" class="ISM-control">
               <title>Control: ism-1794</title>
               <prop name="sort-id"
                      value="catalog[1].group[05].group[2].group[5].control[07]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1794_smt">
                  <p>A minimum notification period of one month by service providers for significant changes to their own service provider arrangements is documented in contractual arrangements with service providers.</p>
               </part>
            </control>
            <control id="ism-1451" class="ISM-control">
               <title>Control: ism-1451</title>
               <prop name="sort-id"
                      value="catalog[1].group[05].group[2].group[5].control[08]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1451_smt">
                  <p>Types of data and its ownership is documented in contractual arrangements with service providers.</p>
               </part>
            </control>
            <control id="ism-1572" class="ISM-control">
               <title>Control: ism-1572</title>
               <prop name="sort-id"
                      value="catalog[1].group[05].group[2].group[5].control[09]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1572_smt">
                  <p>The regions or availability zones where data will be processed, stored and communicated is documented in contractual arrangements with service providers.</p>
               </part>
            </control>
            <control id="ism-1573" class="ISM-control">
               <title>Control: ism-1573</title>
               <prop name="sort-id"
                      value="catalog[1].group[05].group[2].group[5].control[10]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1573_smt">
                  <p>Access to all logs relating to an organisation’s data and services is documented in contractual arrangements with service providers.</p>
               </part>
            </control>
            <control id="ism-1574" class="ISM-control">
               <title>Control: ism-1574</title>
               <prop name="sort-id"
                      value="catalog[1].group[05].group[2].group[5].control[11]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1574_smt">
                  <p>The storage of data in a portable manner that allows for backups, service migration and service decommissioning without any loss of data is documented in contractual arrangements with service providers.</p>
               </part>
            </control>
            <control id="ism-1575" class="ISM-control">
               <title>Control: ism-1575</title>
               <prop name="sort-id"
                      value="catalog[1].group[05].group[2].group[5].control[12]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1575_smt">
                  <p>A minimum notification period of one month for the cessation of any services by a service provider is documented in contractual arrangements with service providers.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Access to systems and data by service providers</title>
            <prop name="sort-id" value="catalog[1].group[05].group[2].group[6]"/>
            <part name="overview">
               <p>To perform their contracted duties, service providers may need to access their customers’ systems and data. However, without proper controls in place, this could leave systems and data vulnerable – especially when access occurs from outside of Australian borders. As such, an organisation should ensure that their systems and data are not accessed or administered by service providers unless such requirements, and associated measures to control such requirements, are documented in contractual arrangements with service providers. In doing so, it is important that sufficient measures are also in place to detect and record any unauthorised access, such as customer support representatives or platform engineers accessing encryption keys. In such cases, the service provider should immediately report the cyber security incident to their customer and make available all logs pertaining to the unauthorised access.</p>
            </part>
            <control id="ism-1073" class="ISM-control">
               <title>Control: ism-1073</title>
               <prop name="sort-id"
                      value="catalog[1].group[05].group[2].group[6].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="5"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Jun-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1073_smt">
                  <p>An organisation’s systems and data are not accessed or administered by a service provider unless a contractual arrangement exists between the organisation and the service provider to do so.</p>
               </part>
            </control>
            <control id="ism-1576" class="ISM-control">
               <title>Control: ism-1576</title>
               <prop name="sort-id"
                      value="catalog[1].group[05].group[2].group[6].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1576_smt">
                  <p>If an organisation’s systems or data are accessed or administered by a service provider in an unauthorised manner, the organisation is immediately notified.</p>
               </part>
            </control>
         </group>
      </group>
   </group>
   <group>
      <title>Guidelines for Security Documentation</title>
      <prop name="sort-id" value="catalog[1].group[06]"/>
      <group>
         <title>Development and maintenance of security documentation</title>
         <prop name="sort-id" value="catalog[1].group[06].group[1]"/>
         <part name="overview">
            <h1>Further information</h1>
            <p>Further information on system-specific security documentation, such as a system security plan, incident response plan, continuous monitoring plan, security assessment report and plan of action and milestones, can be found in the following section of these guidelines.</p>
            <p>Further information on business continuity and disaster recovery plans can be found in the Chief Information Security Officer section of the <a href="#626dab35-81ab-45fe-8c12-0faff1c23c07">Guidelines for Cyber Security Roles</a>.</p>
            <p>Further information on cyber security communication strategies can be found in the Chief Information Security Officer section of the <a href="#626dab35-81ab-45fe-8c12-0faff1c23c07">Guidelines for Cyber Security Roles</a>.</p>
            <p>Further information on incident management policy can be found in the managing cyber security incidents section of the <a href="#fe0138db-e83b-4a23-85d3-d84e1c22816f">Guidelines for Cyber Security Incidents</a>.</p>
            <p>Further information on cyber security incident registers can be found in the managing cyber security incidents section of the <a href="#fe0138db-e83b-4a23-85d3-d84e1c22816f">Guidelines for Cyber Security Incidents</a>.</p>
            <p>Further information on supplier relationship management policy can be found in the cyber supply chain risk management section of the <a href="#f37a4848-0791-4870-b316-5536c2681c28">Guidelines for Procurement and Outsourcing</a>.</p>
            <p>Further information on approved supplier lists can be found in the cyber supply chain risk management section of the <a href="#f37a4848-0791-4870-b316-5536c2681c28">Guidelines for Procurement and Outsourcing</a>.</p>
            <p>Further information on managed service registers can be found in the managed services and cloud services section of the <a href="#f37a4848-0791-4870-b316-5536c2681c28">Guidelines for Procurement and Outsourcing</a>.</p>
            <p>Further information on outsourced cloud service registers can be found in the managed services and cloud services section of the <a href="#f37a4848-0791-4870-b316-5536c2681c28">Guidelines for Procurement and Outsourcing</a>.</p>
            <p>Further information on authorised Radio Frequency and infrared device registers can be found in the facilities and systems section of the <a href="#4deea7ea-18a2-4fd7-8b25-0b3603215df2">Guidelines for Physical Security</a>.</p>
            <p>Further information on cable registers can be found in the cabling infrastructure section of the <a href="#4defa9a8-c5f5-4b39-8b0a-537f14d9d14d">Guidelines for Communications Infrastructure</a>.</p>
            <p>Further information on floor plan diagrams can be found in the cabling infrastructure section of the <a href="#4defa9a8-c5f5-4b39-8b0a-537f14d9d14d">Guidelines for Communications Infrastructure</a>.</p>
            <p>Further information on cable labelling processes and procedures can be found in the cabling infrastructure section of the <a href="#4defa9a8-c5f5-4b39-8b0a-537f14d9d14d">Guidelines for Communications Infrastructure</a>.</p>
            <p>Further information on telephone system usage policy can be found in the telephone systems section of the <a href="#3a7b903b-ed0d-450d-9123-60f6f8fd5dd2">Guidelines for Communications Systems</a>.</p>
            <p>Further information on denial of service response plans for video conferencing and Internet Protocol telephony services can be found in the video conferencing and Internet Protocol telephony section of the <a href="#3a7b903b-ed0d-450d-9123-60f6f8fd5dd2">Guidelines for Communications Systems</a>.</p>
            <p>Further information on fax machine and multifunction device usage policy can be found in the fax machines and multifunction devices section of the <a href="#3a7b903b-ed0d-450d-9123-60f6f8fd5dd2">Guidelines for Communications Systems</a>.</p>
            <p>Further information on mobile device management policy can be found in the mobile device management section of the <a href="#9a8f5a63-bcd5-45a8-9f9c-974fc796ac95">Guidelines for Enterprise Mobility</a>.</p>
            <p>Further information on mobile device usage policy can be found in the mobile device usage section of the <a href="#9a8f5a63-bcd5-45a8-9f9c-974fc796ac95">Guidelines for Enterprise Mobility</a>.</p>
            <p>Further information on mobile device emergency sanitisation processes and procedures can be found in the mobile device usage section of the <a href="#9a8f5a63-bcd5-45a8-9f9c-974fc796ac95">Guidelines for Enterprise Mobility</a>.</p>
            <p>Further information on ICT equipment management policy can be found in the ICT equipment usage section of the <a href="#db2e237c-2dbc-4a1f-bae7-9cb63a1f1dc3">Guidelines for ICT Equipment</a>.</p>
            <p>Further information on ICT equipment registers can be found in the ICT equipment usage section of the <a href="#db2e237c-2dbc-4a1f-bae7-9cb63a1f1dc3">Guidelines for ICT Equipment</a>.</p>
            <p>Further information on ICT equipment sanitisation processes and procedures can be found in the ICT equipment sanitisation and destruction section of the <a href="#db2e237c-2dbc-4a1f-bae7-9cb63a1f1dc3">Guidelines for ICT Equipment</a>.</p>
            <p>Further information on ICT equipment destruction processes and procedures can be found in the ICT equipment sanitisation and destruction section of the <a href="#db2e237c-2dbc-4a1f-bae7-9cb63a1f1dc3">Guidelines for ICT Equipment</a>.</p>
            <p>Further information on ICT equipment disposal processes and procedures can be found in the ICT equipment disposal section of the <a href="#db2e237c-2dbc-4a1f-bae7-9cb63a1f1dc3">Guidelines for ICT Equipment</a>.</p>
            <p>Further information on media management policy can be found in the media usage section of the <a href="#b594c9c0-b42f-4f06-b643-38023275a5c7">Guidelines for Media</a>.</p>
            <p>Further information on removable media usage policy can be found in the media usage section of the <a href="#b594c9c0-b42f-4f06-b643-38023275a5c7">Guidelines for Media</a>.</p>
            <p>Further information on removable media registers can be found in the media usage section of the <a href="#b594c9c0-b42f-4f06-b643-38023275a5c7">Guidelines for Media</a>.</p>
            <p>Further information on media sanitisation processes and procedures can be found in the media sanitisation section of the <a href="#b594c9c0-b42f-4f06-b643-38023275a5c7">Guidelines for Media</a>.</p>
            <p>Further information on media destruction processes and procedures can be found in the media destruction section of the <a href="#b594c9c0-b42f-4f06-b643-38023275a5c7">Guidelines for Media</a>.</p>
            <p>Further information on media disposal processes and procedures can be found in the media disposal section of the <a href="#b594c9c0-b42f-4f06-b643-38023275a5c7">Guidelines for Media</a>.</p>
            <p>Further information on system administration processes and procedures can be found in the system administration section of the <a href="#c6ca6620-ccd5-4c5d-b97c-9d92f1162948">Guidelines for System Management</a>.</p>
            <p>Further information on patch management processes and procedures can be found in the system patching section of the <a href="#c6ca6620-ccd5-4c5d-b97c-9d92f1162948">Guidelines for System Management</a>.</p>
            <p>Further information on software registers can be found in the system patching section of the <a href="#c6ca6620-ccd5-4c5d-b97c-9d92f1162948">Guidelines for System Management</a>.</p>
            <p>Further information on digital preservation policy can be found in the data backup and restoration section of the <a href="#c6ca6620-ccd5-4c5d-b97c-9d92f1162948">Guidelines for System Management</a>.</p>
            <p>Further information on data backup processes and procedures can be found in the data backup and restoration section of the <a href="#c6ca6620-ccd5-4c5d-b97c-9d92f1162948">Guidelines for System Management</a>.</p>
            <p>Further information on data restoration processes and procedures can be found in the data backup and restoration section of the <a href="#c6ca6620-ccd5-4c5d-b97c-9d92f1162948">Guidelines for System Management</a>.</p>
            <p>Further information on event logging policy can be found in the event logging and monitoring section of the <a href="#edc24216-f52b-4513-bcda-5fa564661999">Guidelines for System Monitoring</a>.</p>
            <p>Further information on vulnerability disclosure policy can be found in the application development section of the <a href="#506198a8-7ae8-4c95-8b7b-2a4833cfab4b">Guidelines for Software Development</a>.</p>
            <p>Further information on vulnerability disclosure processes and procedures can be found in the application development section of the <a href="#506198a8-7ae8-4c95-8b7b-2a4833cfab4b">Guidelines for Software Development</a>.</p>
            <p>Further information on database registers can be found in the databases section of the <a href="#3f349d16-11a1-459a-a299-c9446aea7597">Guidelines for Database Systems</a>.</p>
            <p>Further information on email usage policy can be found in the email usage section of the <a href="#ab73fa95-f213-4041-915e-a8ccbdf74331">Guidelines for Email</a>.</p>
            <p>Further information on network diagrams can be found in the network design and configuration section of the <a href="#f145ff5b-d396-4248-8f48-621349d6f0ed">Guidelines for Networking</a>.</p>
            <p>Further information on cryptographic key management processes and procedures can be found in the cryptographic fundamentals section of the <a href="#195abe87-bb1e-4006-8b42-eaecca4d51f1">Guidelines for Cryptography</a>.</p>
            <p>Further information on web usage policy can be found in the web proxies section of the <a href="#e8bde527-526c-4a6a-b66f-05228f09dd7b">Guidelines for Gateways</a>.</p>
            <p>Further information on data transfer processes and procedures can be found in the data transfers section of the <a href="#1eefdaf7-3991-4ba2-9439-79565f508c44">Guidelines for Data Transfers</a>.</p>
         </part>
         <group>
            <title>Cyber security strategy</title>
            <prop name="sort-id" value="catalog[1].group[06].group[1].group[1]"/>
            <part name="overview">
               <p>A cyber security strategy sets out an organisation's guiding principles, objectives and priorities for cyber security, typically over a three to five year period. In addition, a cyber security strategy may also cover an organisation's threat environment, cyber security initiatives or investments the organisation plans to make as part of its cyber security program. Without a cyber security strategy, an organisation risks failing to adequately plan for and manage security and business risks within their organisation.</p>
            </part>
            <control id="ism-0039" class="ISM-control">
               <title>Control: ism-0039</title>
               <prop name="sort-id"
                      value="catalog[1].group[06].group[1].group[1].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="6"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0039_smt">
                  <p>A cyber security strategy is developed, implemented and maintained.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Approval of security documentation</title>
            <prop name="sort-id" value="catalog[1].group[06].group[1].group[2]"/>
            <part name="overview">
               <p>If security documentation is not reviewed and approved by an appropriate authority, system owners risk failing in their duty to ensure that appropriate controls have been identified and implemented for systems and their operating environments. In doing so, it is important that a system’s security architecture, as outlined within the system security plan and supported by the incident response plan and continuous monitoring plan, is approved by the system’s authorising officer prior to the development of the system.</p>
            </part>
            <control id="ism-0047" class="ISM-control">
               <title>Control: ism-0047</title>
               <prop name="sort-id"
                      value="catalog[1].group[06].group[1].group[2].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="May-19"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0047_smt">
                  <p>Organisational-level security documentation is approved by the Chief Information Security Officer while system-specific security documentation is approved by the system’s authorising officer.</p>
               </part>
            </control>
            <control id="ism-1739" class="ISM-control">
               <title>Control: ism-1739</title>
               <prop name="sort-id"
                      value="catalog[1].group[06].group[1].group[2].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1739_smt">
                  <p>A system’s security architecture is approved prior to the development of the system.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Maintenance of security documentation</title>
            <prop name="sort-id" value="catalog[1].group[06].group[1].group[3]"/>
            <part name="overview">
               <p>Threat environments are dynamic. If security documentation is not kept up-to-date to reflect the current threat environment, policies, processes and procedures may cease to be effective. In such a situation, resources could be devoted to cyber security initiatives or investments that have reduced effectiveness or are no longer relevant.</p>
            </part>
            <control id="ism-0888" class="ISM-control">
               <title>Control: ism-0888</title>
               <prop name="sort-id"
                      value="catalog[1].group[06].group[1].group[3].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="5"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="May-19"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0888_smt">
                  <p>Security documentation is reviewed at least annually and includes a ‘current as at [date]’ or equivalent statement.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Communication of security documentation</title>
            <prop name="sort-id" value="catalog[1].group[06].group[1].group[4]"/>
            <part name="overview">
               <p>It is important that once security documentation has been approved, it is published and communicated to all stakeholders. If security documentation is not communicated to stakeholders they will be unaware of what policies and procedures have been implemented for systems.</p>
            </part>
            <control id="ism-1602" class="ISM-control">
               <title>Control: ism-1602</title>
               <prop name="sort-id"
                      value="catalog[1].group[06].group[1].group[4].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Aug-20"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1602_smt">
                  <p>Security documentation, including notification of subsequent changes, is communicated to all stakeholders.</p>
               </part>
            </control>
         </group>
      </group>
      <group>
         <title>System-specific security documentation</title>
         <prop name="sort-id" value="catalog[1].group[06].group[2]"/>
         <part name="overview">
            <h1>System-specific security documentation</h1>
            <p>System-specific security documentation, such as a system security plan, incident response plan, continuous monitoring plan, security assessment report, and plan of action and milestones, supports the accurate and consistent application of policies, processes and procedures for systems. As such, it is important that they are developed by personnel with a good understanding of business requirements, technologies being used and cyber security matters.</p>
            <p>System-specific security documentation may be presented in a number of formats, including in wikis or other forms of document repositories. Furthermore, depending on the documentation framework used, details common to multiple systems could be consolidated into higher level security documentation.</p>
            <h1>Further information</h1>
            <p>To assist with the development of system-specific security documentation, a system security plan annex template, and an equivalent cloud controls matrix template, are available from the Australian Cyber Security Centre’s <a href="#e7ce6e23-4bbb-45c1-a657-7e563c0837ed">Information Security Manual</a> webpage.</p>
         </part>
         <group>
            <title>System security plan</title>
            <prop name="sort-id" value="catalog[1].group[06].group[2].group[1]"/>
            <part name="overview">
               <p>The system security plan provides a description of a system and includes an annex that describes the controls that have been identified for the system.</p>
               <p>There can be many stakeholders involved in developing and maintaining a system security plan. This can include representatives from:</p>
               <ul>
                  <li>cyber security teams</li>
                  <li>project teams who deliver the capability (including contractors)</li>
                  <li>support teams who operate and support the capability</li>
                  <li>data owners for data processed, stored or communicated by the system</li>
                  <li>users for whom the capability is being developed.</li>
               </ul>
            </part>
            <control id="ism-0041" class="ISM-control">
               <title>Control: ism-0041</title>
               <prop name="sort-id"
                      value="catalog[1].group[06].group[2].group[1].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="5"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Jun-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0041_smt">
                  <p>Systems have a system security plan that includes a description of the system and an annex that covers both applicable controls from this document and any additional controls that have been identified.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Incident response plan</title>
            <prop name="sort-id" value="catalog[1].group[06].group[2].group[2]"/>
            <part name="overview">
               <p>Having an incident response plan ensures that when a cyber security incident occurs, a plan is in place to respond appropriately to the situation. In most situations, the aim of the response will be to prevent the cyber security incident from escalating, restore any impacted system or data, and preserve any evidence.</p>
            </part>
            <control id="ism-0043" class="ISM-control">
               <title>Control: ism-0043</title>
               <prop name="sort-id"
                      value="catalog[1].group[06].group[2].group[2].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0043_smt">
                  <p>Systems have an incident response plan that covers the following:</p>
                  <ul>
                     <li>guidelines on what constitutes a cyber security incident</li>
                     <li>the types of cyber security incidents likely to be encountered and the expected response to each type</li>
                     <li>how to report cyber security incidents, internally to an organisation and externally to relevant authorities</li>
                     <li>other parties which need to be informed in the event of a cyber security incident</li>
                     <li>the authority, or authorities, responsible for investigating and responding to cyber security incidents</li>
                     <li>the criteria by which an investigation of a cyber security incident would be requested from a law enforcement agency, the Australian Cyber Security Centre or other relevant authority</li>
                     <li>the steps necessary to ensure the integrity of evidence relating to a cyber security incident</li>
                     <li>system contingency measures or a reference to such details if they are located in a separate document.</li>
                  </ul>
               </part>
            </control>
         </group>
         <group>
            <title>Continuous monitoring plan</title>
            <prop name="sort-id" value="catalog[1].group[06].group[2].group[3]"/>
            <part name="overview">
               <p>A continuous monitoring plan can assist an organisation in proactively identifying, prioritising and responding to security vulnerabilities. Measures to monitor and manage security vulnerabilities in systems can also provide an organisation with a wealth of valuable information about their exposure to cyber threats, as well as assisting them to determine security risks associated with the operation of their systems. Undertaking continuous monitoring activities is important as cyber threats and the effectiveness of controls will change over time.</p>
               <p>Three types of continuous monitoring activities are vulnerability assessments, vulnerability scans and penetration tests. A vulnerability assessment typically consists of a review of a system’s architecture or an in-depth hands-on assessment while a vulnerability scan involves using software tools to conduct automated checks for known security vulnerabilities. In each case, the goal is to identify as many security vulnerabilities as possible. A penetration test however is designed to exercise real-world scenarios in an attempt to achieve a specific goal, such as compromising critical system components or data. Regardless of the continuous monitoring activities chosen, they should be conducted by suitably skilled personnel independent of the system being assessed. Such personnel can be internal to an organisation or from a third party. This ensures that there is no conflict of interest, perceived or otherwise, and that the activities are undertaken in an objective manner.</p>
            </part>
            <control id="ism-1163" class="ISM-control">
               <title>Control: ism-1163</title>
               <prop name="sort-id"
                      value="catalog[1].group[06].group[2].group[3].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="8"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-23"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1163_smt">
                  <p>Systems have a continuous monitoring plan that includes:</p>
                  <ul>
                     <li>conducting vulnerability scans for systems at least monthly</li>
                     <li>conducting vulnerability assessments or penetration tests for systems at least annually</li>
                     <li>analysing identified security vulnerabilities to determine their potential impact</li>
                     <li>implementing mitigations based on risk, effectiveness and cost.</li>
                  </ul>
               </part>
            </control>
         </group>
         <group>
            <title>Security assessment report</title>
            <prop name="sort-id" value="catalog[1].group[06].group[2].group[4]"/>
            <part name="overview">
               <p>At the conclusion of a security assessment for a system, a security assessment report should be produced by the assessor. This will assist the system owner in performing any initial remediation actions as well as guiding the development of the system’s plan of action and milestones.</p>
            </part>
            <control id="ism-1563" class="ISM-control">
               <title>Control: ism-1563</title>
               <prop name="sort-id"
                      value="catalog[1].group[06].group[2].group[4].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Jun-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1563_smt">
                  <p>At the conclusion of a security assessment for a system, a security assessment report is produced by the assessor and covers:</p>
                  <ul>
                     <li>the scope of the security assessment</li>
                     <li>the system’s strengths and weaknesses</li>
                     <li>security risks associated with the operation of the system</li>
                     <li>the effectiveness of the implementation of controls</li>
                     <li>any recommended remediation actions.</li>
                  </ul>
               </part>
            </control>
         </group>
         <group>
            <title>Plan of action and milestones</title>
            <prop name="sort-id" value="catalog[1].group[06].group[2].group[5]"/>
            <part name="overview">
               <p>At the conclusion of a security assessment for a system, and after the production of a security assessment report by the assessor, a plan of action and milestones should be produced by the system owner. This will assist with tracking any of the system’s identified weaknesses and recommended remediation actions identified during the security assessment.</p>
            </part>
            <control id="ism-1564" class="ISM-control">
               <title>Control: ism-1564</title>
               <prop name="sort-id"
                      value="catalog[1].group[06].group[2].group[5].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="May-20"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1564_smt">
                  <p>At the conclusion of a security assessment for a system, a plan of action and milestones is produced by the system owner.</p>
               </part>
            </control>
         </group>
      </group>
   </group>
   <group>
      <title>Guidelines for Physical Security</title>
      <prop name="sort-id" value="catalog[1].group[07]"/>
      <group>
         <title>Facilities and systems</title>
         <prop name="sort-id" value="catalog[1].group[07].group[1]"/>
         <part name="overview">
            <h1>Further information</h1>
            <p>Further information on the certification and accreditation authorities for physical security can be found in the Attorney-General’s Department (AGD)’s <a href="#92679127-f61d-486a-a93e-df2a26dfb07a">Protective Security Policy Framework</a> (PSPF), <a href="#5424f156-70cd-4ff9-a80e-ff459706bf55">Entity facilities</a> policy.</p>
            <p>Further information on the physical security requirements for specific security zones can be found in AGD’s PSPF, <a href="#5424f156-70cd-4ff9-a80e-ff459706bf55">Entity facilities</a> policy.</p>
            <p>Further information on selecting security zones, security containers and secure rooms for the protection of ICT equipment can be found in AGD’s PSPF, <a href="#6e456a92-f405-4151-88ca-5621aa23519b">Physical security for entity resources</a> policy.</p>
            <p>Further information on emanation security considerations associated with usage of RF devices in SECRET and TOP SECRET areas can be found in the emanation security section of the <a href="#4defa9a8-c5f5-4b39-8b0a-537f14d9d14d">Guidelines for Communications Infrastructure</a>.</p>
         </part>
         <group>
            <title>Physical access to systems</title>
            <prop name="sort-id" value="catalog[1].group[07].group[1].group[1]"/>
            <part name="overview">
               <p>The application of the defence-in-depth principle to the protection of systems is enhanced through the use of successive layers of physical security. The first layer of physical security being the use of a security zone for facilities containing systems.</p>
               <p>Deployable platforms should also meet physical security requirements. Notably, physical security certification authorities dealing with deployable platforms may have specific requirements that supersede the controls in these guidelines. This may include perimeter controls, building standards and manning levels. As such, an organisation implementing deployable platforms should contact their physical security certification authority to seek additional guidance.</p>
            </part>
            <control id="ism-0810" class="ISM-control">
               <title>Control: ism-0810</title>
               <prop name="sort-id"
                      value="catalog[1].group[07].group[1].group[1].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="5"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="O"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="P"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-0810_smt">
                  <p>Systems are secured in facilities that meet the requirements for a security zone suitable for their sensitivity or classification.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Physical access to servers, network devices and cryptographic equipment</title>
            <prop name="sort-id" value="catalog[1].group[07].group[1].group[2]"/>
            <part name="overview">
               <p>The second layer of physical security is the use of an additional security zone for a server room or communications room. This is then further supplemented by the use of security containers or secure rooms for the protection of servers, network devices and cryptographic equipment.</p>
            </part>
            <control id="ism-1053" class="ISM-control">
               <title>Control: ism-1053</title>
               <prop name="sort-id"
                      value="catalog[1].group[07].group[1].group[2].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="O"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="P"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-1053_smt">
                  <p>Servers, network devices and cryptographic equipment are secured in server rooms or communications rooms that meet the requirements for a security zone suitable for their sensitivity or classification.</p>
               </part>
            </control>
            <control id="ism-1530" class="ISM-control">
               <title>Control: ism-1530</title>
               <prop name="sort-id"
                      value="catalog[1].group[07].group[1].group[2].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="O"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="P"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-1530_smt">
                  <p>Servers, network devices and cryptographic equipment are secured in security containers or secure rooms suitable for their sensitivity or classification taking into account the combination of security zones they reside in.</p>
               </part>
            </control>
            <control id="ism-0813" class="ISM-control">
               <title>Control: ism-0813</title>
               <prop name="sort-id"
                      value="catalog[1].group[07].group[1].group[2].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0813_smt">
                  <p>Server rooms, communications rooms, security containers and secure rooms are not left in unsecured states.</p>
               </part>
            </control>
            <control id="ism-1074" class="ISM-control">
               <title>Control: ism-1074</title>
               <prop name="sort-id"
                      value="catalog[1].group[07].group[1].group[2].control[4]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1074_smt">
                  <p>Keys or equivalent access mechanisms to server rooms, communications rooms, security containers and secure rooms are appropriately controlled.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Physical access to network devices in public areas</title>
            <prop name="sort-id" value="catalog[1].group[07].group[1].group[3]"/>
            <part name="overview">
               <p>Unprotected network devices in public areas could lead to accidental or deliberate physical damage resulting in an interruption of services. Alternatively, unauthorised access to network devices may allow an adversary to reset them to factory default settings, thereby removing any controls, or connect directly to them in order to bypass network access controls. Even if access to network devices is not gained by resetting them to factory default settings, it is highly likely that it will cause an interruption of services.</p>
               <p>Physical access to network devices can be restricted through the implementation of physical security, such as using enclosures that prevent access to their console ports and factory reset buttons, mounting them on ceilings or behind walls, or securing them in security containers.</p>
            </part>
            <control id="ism-1296" class="ISM-control">
               <title>Control: ism-1296</title>
               <prop name="sort-id"
                      value="catalog[1].group[07].group[1].group[3].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Jun-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1296_smt">
                  <p>Physical security is implemented to protect network devices in public areas from physical damage or unauthorised access.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Bringing Radio Frequency and infrared devices into facilities</title>
            <prop name="sort-id" value="catalog[1].group[07].group[1].group[4]"/>
            <part name="overview">
               <p>Radio Frequency (RF) devices, such as mobile devices, wireless keyboards and Bluetooth devices, as well as infrared (IR) devices, can pose a security risk to an organisation, especially when they are capable of recording or transmitting audio or data. In SECRET and TOP SECRET areas, it is important that an organisation understands the security risks associated with the introduction of RF and IR devices and develop, implement and maintain a register of those that have been authorised for use in such environments.</p>
               <p>In deciding which RF or IR devices to authorise to be brought into SECRET and TOP SECRET areas, an organisation should consider any mitigating measures already in place, such as whether IR communications would be prevented from travelling outside secured spaces, whether systems of different sensitives or classifications are used in the same spaces, and if any temporary or permanent method of blocking RF or IR transmissions has been applied to the facility.</p>
            </part>
            <control id="ism-1543" class="ISM-control">
               <title>Control: ism-1543</title>
               <prop name="sort-id"
                      value="catalog[1].group[07].group[1].group[4].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-1543_smt">
                  <p>An authorised RF and IR device register for SECRET and TOP SECRET areas is developed, implemented, maintained and verified on a regular basis.</p>
               </part>
            </control>
            <control id="ism-0225" class="ISM-control">
               <title>Control: ism-0225</title>
               <prop name="sort-id"
                      value="catalog[1].group[07].group[1].group[4].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-0225_smt">
                  <p>Unauthorised RF and IR devices are not brought into SECRET and TOP SECRET areas.</p>
               </part>
            </control>
            <control id="ism-0829" class="ISM-control">
               <title>Control: ism-0829</title>
               <prop name="sort-id"
                      value="catalog[1].group[07].group[1].group[4].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-19"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-0829_smt">
                  <p>Security measures are used to detect and respond to unauthorised RF devices in SECRET and TOP SECRET areas.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Preventing observation by unauthorised people</title>
            <prop name="sort-id" value="catalog[1].group[07].group[1].group[5]"/>
            <part name="overview">
               <p>Without sufficient perimeter security, the inside of a facility is often observable by unauthorised people, such as via direct observation or by using equipment with a telephoto lens. Ensuring systems, in particular workstation displays and keyboards, are not visible through windows, such as via the use of blinds, curtains, privacy films or workstation positioning, will assist in reducing this security risk.</p>
            </part>
            <control id="ism-0164" class="ISM-control">
               <title>Control: ism-0164</title>
               <prop name="sort-id"
                      value="catalog[1].group[07].group[1].group[5].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0164_smt">
                  <p>Unauthorised people are prevented from observing systems, in particular workstation displays and keyboards, within facilities.</p>
               </part>
            </control>
         </group>
      </group>
      <group>
         <title>ICT equipment and media</title>
         <prop name="sort-id" value="catalog[1].group[07].group[2]"/>
         <part name="overview">
            <h1>Further information</h1>
            <p>Further information on the handling of ICT equipment can be found in the ICT equipment usage section of the <a href="#db2e237c-2dbc-4a1f-bae7-9cb63a1f1dc3">Guidelines for ICT Equipment</a>.</p>
            <p>Further information on the handling of media can be found in the media usage section of the <a href="#b594c9c0-b42f-4f06-b643-38023275a5c7">Guidelines for Media</a>.</p>
            <p>Further information on encrypting media can be found in the cryptographic fundamentals section of the <a href="#195abe87-bb1e-4006-8b42-eaecca4d51f1">Guidelines for Cryptography</a>.</p>
            <p>Further information on selecting security zones, security containers and secure rooms for the protection of ICT equipment can be found in AGD’s PSPF, <a href="#6e456a92-f405-4151-88ca-5621aa23519b">Physical security for entity resources</a> policy.</p>
         </part>
         <group>
            <title>Securing ICT equipment and media</title>
            <prop name="sort-id" value="catalog[1].group[07].group[2].group[1]"/>
            <part name="overview">
               <p>ICT equipment and media needs to be secured when not in use. This can be achieved by implementing one of the following approaches:</p>
               <ul>
                  <li>securing ICT equipment and media in an appropriate security container or secure room</li>
                  <li>using ICT equipment without hard drives and sanitising memory at shut down</li>
                  <li>encrypting hard drives of ICT equipment and sanitising memory at shut down</li>
                  <li>sanitising memory of ICT equipment at shut down and removing and securing any hard drives.</li>
               </ul>
               <p>If none of the above approaches are feasible, an organisation may wish to minimise the potential impact of not securing ICT equipment when not in use. This can be achieved by preventing sensitive or classified data from being stored on hard drives, storing user profiles and documents on network shares, removing temporary user data at logoff, scrubbing virtual memory at shut down, and sanitising memory at shut down. It should be noted though that there is no guarantee that such measures will always work effectively or will not be bypassed due to unexpected circumstances, such as the loss of power. Therefore, hard drives in such cases will retain their sensitivity or classification for the purposes of reuse, reclassification, declassification, sanitisation, destruction and disposal.</p>
            </part>
            <control id="ism-0161" class="ISM-control">
               <title>Control: ism-0161</title>
               <prop name="sort-id"
                      value="catalog[1].group[07].group[2].group[1].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="5"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-19"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0161_smt">
                  <p>ICT equipment and media are secured when not in use.</p>
               </part>
            </control>
         </group>
      </group>
   </group>
   <group>
      <title>Guidelines for Personnel Security</title>
      <prop name="sort-id" value="catalog[1].group[08]"/>
      <group>
         <title>Cyber security awareness training</title>
         <prop name="sort-id" value="catalog[1].group[08].group[1]"/>
         <part name="overview">
            <h1>Further information</h1>
            <p>Further information on telephone system usage can be found in the telephone systems section of the <a href="#3a7b903b-ed0d-450d-9123-60f6f8fd5dd2">Guidelines for Communications Systems</a>.</p>
            <p>Further information on fax machine and multifunction device usage can be found in the fax machines and multifunction devices section of the <a href="#3a7b903b-ed0d-450d-9123-60f6f8fd5dd2">Guidelines for Communications Systems</a>.</p>
            <p>Further information on mobile device usage can be found in the mobile device usage section of the <a href="#9a8f5a63-bcd5-45a8-9f9c-974fc796ac95">Guidelines for Enterprise Mobility</a>.</p>
            <p>Further information on removable media usage can be found in the media usage section of the <a href="#b594c9c0-b42f-4f06-b643-38023275a5c7">Guidelines for Media</a>.</p>
            <p>Further information on email usage can be found in the email usage section of the <a href="#ab73fa95-f213-4041-915e-a8ccbdf74331">Guidelines for Email</a>.</p>
            <p>Further information on web usage can be found in the web proxies section of the <a href="#e8bde527-526c-4a6a-b66f-05228f09dd7b">Guidelines for Gateways</a>.</p>
            <p>Further information on detecting socially engineered messages be found in the Australian Cyber Security Centre (ACSC)’s <a href="#efddc783-51dc-48ac-a53e-a5dd56c17fd0">Detecting Socially Engineered Messages</a> publication.</p>
            <p>Further information on business email compromise can be found in the ACSC’s <a href="#98951624-a06e-4d9a-96a3-f89ac944bcaa">Protecting Against Business Email Compromise</a> publication.</p>
            <p>Further information on the use of social media can be found in the ACSC’s <a href="#c78caaed-9931-4197-b21e-bc4e9979a51a">Security Tips for Social Media and Messaging Apps</a> publication.</p>
            <p>Further information on the sanitisation of documents before posting them to authorised online services can be found in the ACSC’s <a href="#c3e69683-1e95-40df-bd1f-f86a3fa3a9c1">An Examination of the Redaction Functionality of Adobe Acrobat Pro DC 2017</a> publication.</p>
            <p>Further information on <a href="#188466f6-be12-49ce-b99a-981e54b1663e">reporting cybercrime incidents</a> and <a href="#626d3582-3caf-49d6-89d5-4b8fdbbf1f31">reporting cyber security incidents</a> is available from the ACSC.</p>
         </part>
         <group>
            <title>Providing cyber security awareness training</title>
            <prop name="sort-id" value="catalog[1].group[08].group[1].group[1]"/>
            <part name="overview">
               <p>An organisation should ensure that cyber security awareness training is provided to all personnel in order to assist them in understanding their security responsibilities. Furthermore, the content of cyber security awareness training should be tailored to the needs of specific groups of personnel. For example, personnel with responsibilities beyond that of a normal user will require tailored privileged user training.</p>
            </part>
            <control id="ism-0252" class="ISM-control">
               <title>Control: ism-0252</title>
               <prop name="sort-id"
                      value="catalog[1].group[08].group[1].group[1].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="7"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0252_smt">
                  <p>Cyber security awareness training is undertaken annually by all personnel and covers:</p>
                  <ul>
                     <li>the purpose of the cyber security awareness training</li>
                     <li>security appointments and contacts</li>
                     <li>authorised use of systems and their resources</li>
                     <li>protection of systems and their resources</li>
                     <li>reporting of cyber security incidents and suspected compromises of systems and their resources.</li>
                  </ul>
               </part>
            </control>
            <control id="ism-1565" class="ISM-control">
               <title>Control: ism-1565</title>
               <prop name="sort-id"
                      value="catalog[1].group[08].group[1].group[1].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Jun-20"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1565_smt">
                  <p>Tailored privileged user training is undertaken annually by all privileged users.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Managing and reporting suspicious changes to banking details or payment requests</title>
            <prop name="sort-id" value="catalog[1].group[08].group[1].group[2]"/>
            <part name="overview">
               <p>Business email compromise, a form of financial fraud, is when an adversary attempts to scam an organisation out of money or assets with the assistance of a compromised email account. An adversary will typically attempt to achieve this via invoice fraud, employee impersonation or company impersonation.</p>
               <p>With invoice fraud, an adversary will compromise a vendor’s email account and through it have access to legitimate invoices. The adversary will then edit contact and bank details on invoices and send them to customers with the compromised email account. Customers will then pay the invoices, thinking that they are paying the vendor, but instead be sending money to the adversary’s bank account.</p>
               <p>With employee impersonation, an adversary will compromise an organisation’s email account and impersonate an employee via email. This is then used to commit financial fraud in a number of ways. One common method is to impersonate a person in a position of authority, such as a Chief Executive Officer or Chief Financial Officer, and have a false invoice raised. Another method is to request a change to an employee’s banking details. The funds from the false invoice or the employee's salary is then sent to the adversary’s bank account.</p>
               <p>With company impersonation, an adversary registers a domain with a name similar to another organisation. The adversary then impersonates that organisation in an email to a vendor and requests a quote for a quantity of expensive assets, such as laptops, and subsequently negotiates for the assets to be delivered to them prior to payment. The assets are then delivered to a location specified by the adversary, with the invoice being sent to the legitimate organisation who never ordered or received the assets.</p>
               <p>To mitigate business email compromise, personnel should be educated to look for the following warning signs:</p>
               <ul>
                  <li>an unexpected request for a change of banking details</li>
                  <li>an urgent payment request, or threats of serious consequences if payment is not made</li>
                  <li>unexpected payment requests from a person in a position of authority, particularly if payment requests are unusual from this person</li>
                  <li>an email received from a suspicious email address, such as an email address not matching an organisation’s name.</li>
               </ul>
               <p>In dealing with such situations, personnel should have clear guidance to verify bank account details; think critically before actioning unusual payment requests; and have a process to report threatening demands for immediate action, pressure for secrecy, or requests to circumvent normal business processes and procedures.</p>
            </part>
            <control id="ism-1740" class="ISM-control">
               <title>Control: ism-1740</title>
               <prop name="sort-id"
                      value="catalog[1].group[08].group[1].group[2].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1740_smt">
                  <p>Personnel dealing with banking details and payment requests are advised of what business email compromise is, how to manage such situations and how to report it.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Reporting suspicious contact via online services</title>
            <prop name="sort-id" value="catalog[1].group[08].group[1].group[3]"/>
            <part name="overview">
               <p>Online services, such as email, internet forums, messaging apps and direct messaging on social media, can be used by an adversary in an attempt to elicit sensitive or classified information from personnel. As such, personnel should be advised of what suspicious contact via online services is and how to report it.</p>
            </part>
            <control id="ism-0817" class="ISM-control">
               <title>Control: ism-0817</title>
               <prop name="sort-id"
                      value="catalog[1].group[08].group[1].group[3].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Jan-20"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0817_smt">
                  <p>Personnel are advised of what suspicious contact via online services is and how to report it.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Posting work information to online services</title>
            <prop name="sort-id" value="catalog[1].group[08].group[1].group[4]"/>
            <part name="overview">
               <p>Personnel should be advised to take special care not to post work information to online services unless authorised to do so, especially in internet forums and on social media. Even information that appears to be benign in isolation could, along with other information, have a considerable security impact. In addition, to ensure that personal opinions of individuals are not misinterpreted, personnel should be advised to maintain separate work and personal accounts for online services, especially when using social media.</p>
            </part>
            <control id="ism-0820" class="ISM-control">
               <title>Control: ism-0820</title>
               <prop name="sort-id"
                      value="catalog[1].group[08].group[1].group[4].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="5"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Jan-20"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0820_smt">
                  <p>Personnel are advised to not post work information to unauthorised online services and to report cases where such information is posted.</p>
               </part>
            </control>
            <control id="ism-1146" class="ISM-control">
               <title>Control: ism-1146</title>
               <prop name="sort-id"
                      value="catalog[1].group[08].group[1].group[4].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-18"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1146_smt">
                  <p>Personnel are advised to maintain separate work and personal accounts for online services.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Posting personal information to online services</title>
            <prop name="sort-id" value="catalog[1].group[08].group[1].group[5]"/>
            <part name="overview">
               <p>Personnel should be advised that any personal information they post to online services, such as social media, could be used by an adversary to develop a detailed understanding of their lifestyle and interests. In turn, this information could be used to build trust in order to elicit sensitive or classified information from them, or influence them to undertake specific actions, such as opening malicious email attachments or visiting malicious websites. Furthermore, posting information on movements and activities may allow an adversary to time attempted financial fraud to align with when a person in a position of authority will be uncontactable, such as attending meetings or travelling. Finally, encouraging personnel to use any available privacy settings for online services can reduce security risks by restricting who can view their information as well as their interactions with such services.</p>
            </part>
            <control id="ism-0821" class="ISM-control">
               <title>Control: ism-0821</title>
               <prop name="sort-id"
                      value="catalog[1].group[08].group[1].group[5].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Oct-19"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0821_smt">
                  <p>Personnel are advised of security risks associated with posting personal information to online services and are encouraged to use any available privacy settings to restrict who can view such information.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Sending and receiving files via online services</title>
            <prop name="sort-id" value="catalog[1].group[08].group[1].group[6]"/>
            <part name="overview">
               <p>When personnel send and receive files via unauthorised online services, such as messaging apps and social media, they often bypass controls put in place to detect and quarantine malicious code. Advising personnel to send and receive files via authorised online services instead will ensure files are appropriately protected and scanned for malicious code.</p>
            </part>
            <control id="ism-0824" class="ISM-control">
               <title>Control: ism-0824</title>
               <prop name="sort-id"
                      value="catalog[1].group[08].group[1].group[6].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-18"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0824_smt">
                  <p>Personnel are advised not to send or receive files via unauthorised online services.</p>
               </part>
            </control>
         </group>
      </group>
      <group>
         <title>Access to systems and their resources</title>
         <prop name="sort-id" value="catalog[1].group[08].group[2]"/>
         <part name="overview">
            <h1>Security clearances</h1>
            <p>Where these guidelines refer to security clearances, it applies to Australian security clearances or security clearances from a foreign government which are formally recognised by Australia.</p>
            <h1>Further information</h1>
            <p>Further information on access to government resources, including required security clearances, can be found in the Attorney-General’s Department’s <a href="#92679127-f61d-486a-a93e-df2a26dfb07a">Protective Security Policy Framework</a>, <a href="#3e4cd135-5fa3-4a1e-a192-1793ff42067c">Access to information</a> policy.</p>
            <p>Further information on access to highly sensitive government resources, including required briefings, can be found in the Government Security Committee’s Australian Government Security Caveat Guidelines. This publication is available from the Protective Security Policy GovTEAMS community or the Australian Security Intelligence Organisation by email.</p>
            <p>Further information on restricting the use of privileged accounts can be found in the ACSC’s <a href="#3ccea9a8-a728-4f5b-a0a8-43f2f206f76b">Restricting Administrative Privileges</a> publication.</p>
            <p>Further information on administering systems and applications can be found in the system administration section of the <a href="#c6ca6620-ccd5-4c5d-b97c-9d92f1162948">Guidelines for System Management</a>.</p>
            <p>Further information on event logging can be found in the event logging and monitoring section of the <a href="#edc24216-f52b-4513-bcda-5fa564661999">Guidelines for System Monitoring</a>.</p>
         </part>
         <group>
            <title>System access requirements</title>
            <prop name="sort-id" value="catalog[1].group[08].group[2].group[01]"/>
            <part name="overview">
               <p>Documenting access requirements for a system and its resources can assist in determining if personnel have the appropriate authorisation, security clearance, briefings and need-to-know to access the system and its resources. Types of users for which access requirements should be documented include unprivileged users, privileged users, foreign nationals and contractors.</p>
            </part>
            <control id="ism-0432" class="ISM-control">
               <title>Control: ism-0432</title>
               <prop name="sort-id"
                      value="catalog[1].group[08].group[2].group[01].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="7"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0432_smt">
                  <p>Access requirements for a system and its resources are documented in its system security plan.</p>
               </part>
            </control>
            <control id="ism-0434" class="ISM-control">
               <title>Control: ism-0434</title>
               <prop name="sort-id"
                      value="catalog[1].group[08].group[2].group[01].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="7"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0434_smt">
                  <p>Personnel undergo appropriate employment screening and, where necessary, hold an appropriate security clearance before being granted access to a system and its resources.</p>
               </part>
            </control>
            <control id="ism-0435" class="ISM-control">
               <title>Control: ism-0435</title>
               <prop name="sort-id"
                      value="catalog[1].group[08].group[2].group[01].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Aug-19"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0435_smt">
                  <p>Personnel receive any necessary briefings before being granted access to a system and its resources.</p>
               </part>
            </control>
         </group>
         <group>
            <title>User identification</title>
            <prop name="sort-id" value="catalog[1].group[08].group[2].group[02]"/>
            <part name="overview">
               <p>Having uniquely identifiable users ensures accountability for access to a system and its resources. Furthermore, where a system processes, stores or communicates Australian Eyes Only (AUSTEO), Australian Government Access Only (AGAO) or Releasable To (REL) data, and foreign nationals have access to the system, it is important that the foreign nationals are identified as such.</p>
            </part>
            <control id="ism-0414" class="ISM-control">
               <title>Control: ism-0414</title>
               <prop name="sort-id"
                      value="catalog[1].group[08].group[2].group[02].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Aug-19"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0414_smt">
                  <p>Personnel granted access to a system and its resources are uniquely identifiable.</p>
               </part>
            </control>
            <control id="ism-0415" class="ISM-control">
               <title>Control: ism-0415</title>
               <prop name="sort-id"
                      value="catalog[1].group[08].group[2].group[02].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Aug-19"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0415_smt">
                  <p>The use of shared user accounts is strictly controlled, and personnel using such accounts are uniquely identifiable.</p>
               </part>
            </control>
            <control id="ism-1583" class="ISM-control">
               <title>Control: ism-1583</title>
               <prop name="sort-id"
                      value="catalog[1].group[08].group[2].group[02].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Aug-20"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1583_smt">
                  <p>Personnel who are contractors are identified as such.</p>
               </part>
            </control>
            <control id="ism-0420" class="ISM-control">
               <title>Control: ism-0420</title>
               <prop name="sort-id"
                      value="catalog[1].group[08].group[2].group[02].control[4]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="11"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-0420_smt">
                  <p>Where a system processes, stores or communicates AUSTEO, AGAO or REL data, personnel who are foreign nationals are identified as such, including by their specific nationality.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Unprivileged access to systems</title>
            <prop name="sort-id" value="catalog[1].group[08].group[2].group[03]"/>
            <part name="overview">
               <p>Personnel seeking access to systems, applications and data repositories should have a genuine business requirement validated by their manager or another appropriate authority.</p>
               <p>In addition, unprivileged access event logs can assist in monitoring the security posture of systems, detecting malicious behaviour and contributing to investigations following cyber security incidents. To facilitate such activities, unprivileged access event logs should be captured and stored centrally.</p>
            </part>
            <control id="ism-0405" class="ISM-control">
               <title>Control: ism-0405</title>
               <prop name="sort-id"
                      value="catalog[1].group[08].group[2].group[03].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="7"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0405_smt">
                  <p>Requests for unprivileged access to systems, applications and data repositories are validated when first requested.</p>
               </part>
            </control>
            <control id="ism-1566" class="ISM-control">
               <title>Control: ism-1566</title>
               <prop name="sort-id"
                      value="catalog[1].group[08].group[2].group[03].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1566_smt">
                  <p>Use of unprivileged access is logged.</p>
               </part>
            </control>
            <control id="ism-1714" class="ISM-control">
               <title>Control: ism-1714</title>
               <prop name="sort-id"
                      value="catalog[1].group[08].group[2].group[03].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1714_smt">
                  <p>Unprivileged access event logs are stored centrally.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Unprivileged access to systems by foreign nationals</title>
            <prop name="sort-id" value="catalog[1].group[08].group[2].group[04]"/>
            <part name="overview">
               <p>Due to the extra sensitivities associated with AUSTEO, AGAO and REL data, foreign access to such data is strictly controlled.</p>
            </part>
            <control id="ism-0409" class="ISM-control">
               <title>Control: ism-0409</title>
               <prop name="sort-id"
                      value="catalog[1].group[08].group[2].group[04].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="8"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Jun-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-0409_smt">
                  <p>Foreign nationals, including seconded foreign nationals, do not have access to systems that process, store or communicate AUSTEO or REL data unless effective controls are in place to ensure such data is not accessible to them.</p>
               </part>
            </control>
            <control id="ism-0411" class="ISM-control">
               <title>Control: ism-0411</title>
               <prop name="sort-id"
                      value="catalog[1].group[08].group[2].group[04].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="7"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Jun-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-0411_smt">
                  <p>Foreign nationals, excluding seconded foreign nationals, do not have access to systems that process, store or communicate AGAO data unless effective controls are in place to ensure such data is not accessible to them.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Privileged access to systems</title>
            <prop name="sort-id" value="catalog[1].group[08].group[2].group[05]"/>
            <part name="overview">
               <p>Privileged accounts are considered to be those which can alter or circumvent a system’s controls. This can also apply to users who have only limited privileges, such as software developers, but can still bypass controls. A privileged account often has the ability to modify system configurations, account privileges, event logs and security configurations for applications.</p>
               <p>Privileged users, and in some cases privileged service accounts, are often targeted by an adversary as they can potentially give full access to systems. As such, ensuring that privileged accounts do not have the ability to access the internet, email and web services minimises opportunities for these accounts to be compromised.</p>
               <p>Finally, privileged access event logs, privileged account management event logs and privileged group management logs can assist in monitoring the security posture of systems, detecting malicious behaviour and contributing to investigations following cyber security incidents. To facilitate such activities, privileged access event logs, privileged account management event logs and privileged group management logs should be captured and stored centrally.</p>
            </part>
            <control id="ism-1507" class="ISM-control">
               <title>Control: ism-1507</title>
               <prop name="sort-id"
                      value="catalog[1].group[08].group[2].group[05].control[01]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML2"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1507_smt">
                  <p>Requests for privileged access to systems and applications are validated when first requested.</p>
               </part>
            </control>
            <control id="ism-1733" class="ISM-control">
               <title>Control: ism-1733</title>
               <prop name="sort-id"
                      value="catalog[1].group[08].group[2].group[05].control[02]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1733_smt">
                  <p>Requests for privileged access to data repositories are validated when first requested.</p>
               </part>
            </control>
            <control id="ism-1508" class="ISM-control">
               <title>Control: ism-1508</title>
               <prop name="sort-id"
                      value="catalog[1].group[08].group[2].group[05].control[03]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1508_smt">
                  <p>Privileged access to systems and applications is limited to only what is required for users and services to undertake their duties.</p>
               </part>
            </control>
            <control id="ism-1175" class="ISM-control">
               <title>Control: ism-1175</title>
               <prop name="sort-id"
                      value="catalog[1].group[08].group[2].group[05].control[04]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML2"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1175_smt">
                  <p>Privileged user accounts are prevented from accessing the internet, email and web services.</p>
               </part>
            </control>
            <control id="ism-1653" class="ISM-control">
               <title>Control: ism-1653</title>
               <prop name="sort-id"
                      value="catalog[1].group[08].group[2].group[05].control[05]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1653_smt">
                  <p>Privileged service accounts are prevented from accessing the internet, email and web services.</p>
               </part>
            </control>
            <control id="ism-1649" class="ISM-control">
               <title>Control: ism-1649</title>
               <prop name="sort-id"
                      value="catalog[1].group[08].group[2].group[05].control[06]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1649_smt">
                  <p>Just-in-time administration is used for administering systems and applications.</p>
               </part>
            </control>
            <control id="ism-0445" class="ISM-control">
               <title>Control: ism-0445</title>
               <prop name="sort-id"
                      value="catalog[1].group[08].group[2].group[05].control[07]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="6"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-18"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0445_smt">
                  <p>Privileged users are assigned a dedicated privileged account to be used solely for tasks requiring privileged access.</p>
               </part>
            </control>
            <control id="ism-1263" class="ISM-control">
               <title>Control: ism-1263</title>
               <prop name="sort-id"
                      value="catalog[1].group[08].group[2].group[05].control[08]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-23"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1263_smt">
                  <p>Unique privileged accounts are used for administering individual server applications.</p>
               </part>
            </control>
            <control id="ism-1509" class="ISM-control">
               <title>Control: ism-1509</title>
               <prop name="sort-id"
                      value="catalog[1].group[08].group[2].group[05].control[09]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML2"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1509_smt">
                  <p>Privileged access events are logged.</p>
               </part>
            </control>
            <control id="ism-1651" class="ISM-control">
               <title>Control: ism-1651</title>
               <prop name="sort-id"
                      value="catalog[1].group[08].group[2].group[05].control[10]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1651_smt">
                  <p>Privileged access event logs are stored centrally.</p>
               </part>
            </control>
            <control id="ism-1650" class="ISM-control">
               <title>Control: ism-1650</title>
               <prop name="sort-id"
                      value="catalog[1].group[08].group[2].group[05].control[11]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML2"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1650_smt">
                  <p>Privileged account and group management events are logged.</p>
               </part>
            </control>
            <control id="ism-1652" class="ISM-control">
               <title>Control: ism-1652</title>
               <prop name="sort-id"
                      value="catalog[1].group[08].group[2].group[05].control[12]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1652_smt">
                  <p>Privileged account and group management event logs are stored centrally.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Privileged access to systems by foreign nationals</title>
            <prop name="sort-id" value="catalog[1].group[08].group[2].group[06]"/>
            <part name="overview">
               <p>As privileged accounts often have the ability to bypass a system’s controls, it is strongly encouraged that foreign nationals are not given privileged access to systems that process, store or communicate AUSTEO, AGAO or REL data.</p>
            </part>
            <control id="ism-0446" class="ISM-control">
               <title>Control: ism-0446</title>
               <prop name="sort-id"
                      value="catalog[1].group[08].group[2].group[06].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="5"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Jun-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-0446_smt">
                  <p>Foreign nationals, including seconded foreign nationals, do not have privileged access to systems that process, store or communicate AUSTEO or REL data.</p>
               </part>
            </control>
            <control id="ism-0447" class="ISM-control">
               <title>Control: ism-0447</title>
               <prop name="sort-id"
                      value="catalog[1].group[08].group[2].group[06].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Jun-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-0447_smt">
                  <p>Foreign nationals, excluding seconded foreign nationals, do not have privileged access to systems that process, store or communicate AGAO data.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Suspension of access to systems</title>
            <prop name="sort-id" value="catalog[1].group[08].group[2].group[07]"/>
            <part name="overview">
               <p>Removing or suspending access to systems, applications and data repositories can prevent them from being accessed when there is no longer a legitimate business requirement for their use, such as when personnel change duties, leave an organisation or are detected undertaking malicious activities.</p>
            </part>
            <control id="ism-0430" class="ISM-control">
               <title>Control: ism-0430</title>
               <prop name="sort-id"
                      value="catalog[1].group[08].group[2].group[07].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="7"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-19"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0430_smt">
                  <p>Access to systems, applications and data repositories is removed or suspended on the same day personnel no longer have a legitimate requirement for access.</p>
               </part>
            </control>
            <control id="ism-1591" class="ISM-control">
               <title>Control: ism-1591</title>
               <prop name="sort-id"
                      value="catalog[1].group[08].group[2].group[07].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Aug-20"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1591_smt">
                  <p>Access to systems, applications and data repositories is removed or suspended as soon as practicable when personnel are detected undertaking malicious activities.</p>
               </part>
            </control>
            <control id="ism-1404" class="ISM-control">
               <title>Control: ism-1404</title>
               <prop name="sort-id"
                      value="catalog[1].group[08].group[2].group[07].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1404_smt">
                  <p>Unprivileged access to systems and applications is automatically disabled after 45 days of inactivity.</p>
               </part>
            </control>
            <control id="ism-1648" class="ISM-control">
               <title>Control: ism-1648</title>
               <prop name="sort-id"
                      value="catalog[1].group[08].group[2].group[07].control[4]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML2"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1648_smt">
                  <p>Privileged access to systems and applications is automatically disabled after 45 days of inactivity.</p>
               </part>
            </control>
            <control id="ism-1716" class="ISM-control">
               <title>Control: ism-1716</title>
               <prop name="sort-id"
                      value="catalog[1].group[08].group[2].group[07].control[5]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1716_smt">
                  <p>Access to data repositories is automatically disabled after 45 days of inactivity.</p>
               </part>
            </control>
            <control id="ism-1647" class="ISM-control">
               <title>Control: ism-1647</title>
               <prop name="sort-id"
                      value="catalog[1].group[08].group[2].group[07].control[6]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML2"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1647_smt">
                  <p>Privileged access to systems and applications is automatically disabled after 12 months unless revalidated.</p>
               </part>
            </control>
            <control id="ism-1734" class="ISM-control">
               <title>Control: ism-1734</title>
               <prop name="sort-id"
                      value="catalog[1].group[08].group[2].group[07].control[7]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1734_smt">
                  <p>Privileged access to data repositories is automatically disabled after 12 months unless revalidated.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Recording authorisation for personnel to access systems</title>
            <prop name="sort-id" value="catalog[1].group[08].group[2].group[08]"/>
            <part name="overview">
               <p>Retaining records of system account requests will assist in maintaining personnel accountability. This is needed to ensure there is a record of all personnel authorised to access a system, their user identification, who provided the authorisation, when the authorisation was granted and when the access was last reviewed.</p>
            </part>
            <control id="ism-0407" class="ISM-control">
               <title>Control: ism-0407</title>
               <prop name="sort-id"
                      value="catalog[1].group[08].group[2].group[08].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-18"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0407_smt">
                  <p>A secure record is maintained for the life of each system covering:</p>
                  <ul>
                     <li>all personnel authorised to access the system, and their user identification</li>
                     <li>who provided authorisation for access</li>
                     <li>when access was granted</li>
                     <li>the level of access that was granted</li>
                     <li>when access, and the level of access, was last reviewed</li>
                     <li>when the level of access was changed, and to what extent (if applicable)</li>
                     <li>when access was withdrawn (if applicable).</li>
                  </ul>
               </part>
            </control>
         </group>
         <group>
            <title>Temporary access to systems</title>
            <prop name="sort-id" value="catalog[1].group[08].group[2].group[09]"/>
            <part name="overview">
               <p>Under strict circumstances, temporary access to systems, applications or data repositories may be granted to personnel who lack an appropriate security clearance or briefing. In such circumstances, personnel should have their access controlled in such a way that they only have access to data required for them to undertake their duties.</p>
            </part>
            <control id="ism-0441" class="ISM-control">
               <title>Control: ism-0441</title>
               <prop name="sort-id"
                      value="catalog[1].group[08].group[2].group[09].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="8"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Jun-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0441_smt">
                  <p>When personnel are granted temporary access to a system, effective controls are put in place to restrict their access to only data required for them to undertake their duties.</p>
               </part>
            </control>
            <control id="ism-0443" class="ISM-control">
               <title>Control: ism-0443</title>
               <prop name="sort-id"
                      value="catalog[1].group[08].group[2].group[09].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-18"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-0443_smt">
                  <p>Temporary access is not granted to systems that process, store or communicate caveated or sensitive compartmented information.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Emergency access to systems</title>
            <prop name="sort-id" value="catalog[1].group[08].group[2].group[10]"/>
            <part name="overview">
               <p>It is important that an organisation does not lose access to their systems. As such, an organisation should always have a method for gaining access during emergencies. Typically, emergencies would occur when access to systems cannot be gained via normal authentication processes, such as due to misconfigurations of authentication services, misconfigurations of security settings or due to a cyber security incident. In these situations, a break glass account (also known as an emergency access account) can be used to gain access. As break glass accounts generally have the highest level of privileges available for systems, extreme care should be taken to both protect them and to monitor for any signs of compromise or abuse.</p>
               <p>When break glass accounts are used, any administrative activities performed will not be directly attributable to an individual, and systems may not generate event logs. As such, additional controls need to be implemented in order to maintain the system’s integrity. In doing so, an organisation should ensure that any administrative activities performed using a break glass account are identified and documented in support of change management processes and procedures. This includes documenting the individual using the break glass account, the reason for using the break glass account and any administrative activities performed using the break glass account.</p>
               <p>As the custodian of each break glass account should be the only party who knows the account’s credentials, credentials will need to be changed and tested by custodians after any authorised access by another party. Modern password managers that support automated credential changes and testing can assist in reducing the administrative overhead of such activities.</p>
               <p>Finally, break glass event logs can assist in monitoring the security posture of systems, detecting malicious behaviour and contributing to investigations following cyber security incidents. To facilitate such activities, break glass event logs should be captured and stored centrally.</p>
            </part>
            <control id="ism-1610" class="ISM-control">
               <title>Control: ism-1610</title>
               <prop name="sort-id"
                      value="catalog[1].group[08].group[2].group[10].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Aug-20"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1610_smt">
                  <p>A method of emergency access to systems is documented and tested at least once when initially implemented and each time fundamental information technology infrastructure changes occur.</p>
               </part>
            </control>
            <control id="ism-1611" class="ISM-control">
               <title>Control: ism-1611</title>
               <prop name="sort-id"
                      value="catalog[1].group[08].group[2].group[10].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Aug-20"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1611_smt">
                  <p>Break glass accounts are only used when normal authentication processes cannot be used.</p>
               </part>
            </control>
            <control id="ism-1612" class="ISM-control">
               <title>Control: ism-1612</title>
               <prop name="sort-id"
                      value="catalog[1].group[08].group[2].group[10].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Aug-20"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1612_smt">
                  <p>Break glass accounts are only used for specific authorised activities.</p>
               </part>
            </control>
            <control id="ism-1614" class="ISM-control">
               <title>Control: ism-1614</title>
               <prop name="sort-id"
                      value="catalog[1].group[08].group[2].group[10].control[4]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Aug-20"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1614_smt">
                  <p>Break glass account credentials are changed by the account custodian after they are accessed by any other party.</p>
               </part>
            </control>
            <control id="ism-1615" class="ISM-control">
               <title>Control: ism-1615</title>
               <prop name="sort-id"
                      value="catalog[1].group[08].group[2].group[10].control[5]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Aug-20"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1615_smt">
                  <p>Break glass accounts are tested after credentials are changed.</p>
               </part>
            </control>
            <control id="ism-1613" class="ISM-control">
               <title>Control: ism-1613</title>
               <prop name="sort-id"
                      value="catalog[1].group[08].group[2].group[10].control[6]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1613_smt">
                  <p>Use of break glass accounts is logged.</p>
               </part>
            </control>
            <control id="ism-1715" class="ISM-control">
               <title>Control: ism-1715</title>
               <prop name="sort-id"
                      value="catalog[1].group[08].group[2].group[10].control[7]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1715_smt">
                  <p>Break glass event logs are stored centrally.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Control of Australian systems</title>
            <prop name="sort-id" value="catalog[1].group[08].group[2].group[11]"/>
            <part name="overview">
               <p>Due to extra sensitivities associated with AUSTEO and AGAO data, it is essential that control of systems that process, store or communicate such data are maintained by Australian nationals working for or on behalf of the Australian Government. Furthermore, AUSTEO and AGAO data should only be accessible from systems under the sole control of the Australian Government that are located within facilities authorised by the Australian Government.</p>
            </part>
            <control id="ism-0078" class="ISM-control">
               <title>Control: ism-0078</title>
               <prop name="sort-id"
                      value="catalog[1].group[08].group[2].group[11].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="5"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Jun-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-0078_smt">
                  <p>Systems processing, storing or communicating AUSTEO or AGAO data remain at all times under the control of an Australian national working for or on behalf of the Australian Government.</p>
               </part>
            </control>
            <control id="ism-0854" class="ISM-control">
               <title>Control: ism-0854</title>
               <prop name="sort-id"
                      value="catalog[1].group[08].group[2].group[11].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="6"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-0854_smt">
                  <p>AUSTEO and AGAO data can only be accessed from systems under the sole control of the Australian Government that are located within facilities authorised by the Australian Government.</p>
               </part>
            </control>
         </group>
      </group>
   </group>
   <group>
      <title>Guidelines for Communications Infrastructure</title>
      <prop name="sort-id" value="catalog[1].group[09]"/>
      <group>
         <title>Cabling infrastructure</title>
         <prop name="sort-id" value="catalog[1].group[09].group[1]"/>
         <part name="overview">
            <h1>Applicability</h1>
            <p>This section is only applicable to facilities located within Australia. In addition, this section only applies to new cabling infrastructure installations or upgrades.</p>
            <h1>Shared facilities</h1>
            <p>In addition to common controls, this section provides additional controls for shared facilities, such as a single floor, or part of a floor, within a multi-tenanted building.</p>
            <h1>Cables and structured cabling systems</h1>
            <p>For the purposes of this section, a cable is defined as any fibre optic or copper material housed within a protective sheath for the purposes of transmitting data or control signals from one point in a facility to another. Each cable will form part of a structured cabling system and will need to comply with the Australian Standards associated with that system. In addition to network communications and data systems, some common building management structured cabling systems found within facilities are:</p>
            <ul>
               <li>fire control and sensor systems</li>
               <li>security control and surveillance systems</li>
               <li>lighting control systems</li>
               <li>access control systems</li>
               <li>voice and emergency telephony systems</li>
               <li>emergency control alert systems.</li>
            </ul>
            <h1>Cable sheaths and conduits</h1>
            <p>A cable’s protective sheath is not considered to be a conduit.</p>
            <h1>Cable connector types</h1>
            <p>The same cable connector types can be used for all systems within a facility regardless of their sensitivity or classification.</p>
            <h1>Further information</h1>
            <p>
               <a href="#7000d51a-6cca-40a0-95d9-f1f15048ea68">Australian cabling standards and regulations</a> can be obtained from the Australian Communications and Media Authority.</p>
            <p>Further information on SCEC-approved tamper-evident seals can be found on the SCEC’s <a href="#f7e13f7b-eb48-4294-bd01-9c22c756d96b">Security Equipment Evaluated Products List</a>.</p>
            <p>Further information on audio secure rooms can be found in the Attorney-General’s Department’s <a href="#92679127-f61d-486a-a93e-df2a26dfb07a">Protective Security Policy Framework</a>, <a href="#6e456a92-f405-4151-88ca-5621aa23519b">Physical security for entity resources</a> policy.</p>
         </part>
         <group>
            <title>Cabling infrastructure standards</title>
            <prop name="sort-id" value="catalog[1].group[09].group[1].group[01]"/>
            <part name="overview">
               <p>Cabling infrastructure should be installed by an endorsed cable installer to the relevant Australian Standards to ensure personnel safety and system availability.</p>
            </part>
            <control id="ism-0181" class="ISM-control">
               <title>Control: ism-0181</title>
               <prop name="sort-id"
                      value="catalog[1].group[09].group[1].group[01].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0181_smt">
                  <p>Cabling infrastructure is installed in accordance with relevant Australian Standards, as directed by the Australian Communications and Media Authority.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Use of fibre-optic cables</title>
            <prop name="sort-id" value="catalog[1].group[09].group[1].group[02]"/>
            <part name="overview">
               <p>Fibre-optic cables do not produce, nor are influenced by, electromagnetic emanations; thereby offering the highest degree of protection from electromagnetic emanation effects.</p>
            </part>
            <control id="ism-1111" class="ISM-control">
               <title>Control: ism-1111</title>
               <prop name="sort-id"
                      value="catalog[1].group[09].group[1].group[02].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1111_smt">
                  <p>Fibre-optic cables are used for cabling infrastructure instead of copper cables.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Cable register</title>
            <prop name="sort-id" value="catalog[1].group[09].group[1].group[03]"/>
            <part name="overview">
               <p>Developing, implementing, maintaining and regularly verifying cable registers assists installers and inspectors, with the help of floor plan diagrams, to trace cables for malicious or accidental changes or damage. In doing so, cable registers should track all cabling changes throughout the life of a system.</p>
            </part>
            <control id="ism-0211" class="ISM-control">
               <title>Control: ism-0211</title>
               <prop name="sort-id"
                      value="catalog[1].group[09].group[1].group[03].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="7"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0211_smt">
                  <p>A cable register is developed, implemented, maintained and verified on a regular basis.</p>
               </part>
            </control>
            <control id="ism-0208" class="ISM-control">
               <title>Control: ism-0208</title>
               <prop name="sort-id"
                      value="catalog[1].group[09].group[1].group[03].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="6"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Jun-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0208_smt">
                  <p>A cable register contains the following for each cable:</p>
                  <ul>
                     <li>cable identifier</li>
                     <li>cable colour</li>
                     <li>sensitivity/classification</li>
                     <li>source</li>
                     <li>destination</li>
                     <li>location</li>
                     <li>seal numbers (if applicable).</li>
                  </ul>
               </part>
            </control>
         </group>
         <group>
            <title>Floor plan diagrams</title>
            <prop name="sort-id" value="catalog[1].group[09].group[1].group[04]"/>
            <part name="overview">
               <p>Floor plan diagrams, developed using computer-aided design and drafting software, and using alphanumeric grid referencing, provide an accurate scaled view for each floor and are critical to ensuring that cabling infrastructure components can be easily located by installers and inspectors. In doing so, floor plan diagrams should track all cabling infrastructure changes throughout the life of a system.</p>
            </part>
            <control id="ism-1645" class="ISM-control">
               <title>Control: ism-1645</title>
               <prop name="sort-id"
                      value="catalog[1].group[09].group[1].group[04].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1645_smt">
                  <p>Floor plan diagrams are developed, implemented, maintained and verified on a regular basis.</p>
               </part>
            </control>
            <control id="ism-1646" class="ISM-control">
               <title>Control: ism-1646</title>
               <prop name="sort-id"
                      value="catalog[1].group[09].group[1].group[04].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Jun-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1646_smt">
                  <p>Floor plan diagrams contain the following:</p>
                  <ul>
                     <li>cable paths (including ingress and egress points between floors)</li>
                     <li>cable reticulation system and conduit paths</li>
                     <li>floor concentration boxes</li>
                     <li>wall outlet boxes</li>
                     <li>network cabinets.</li>
                  </ul>
               </part>
            </control>
         </group>
         <group>
            <title>Cable labelling processes and procedures</title>
            <prop name="sort-id" value="catalog[1].group[09].group[1].group[05]"/>
            <part name="overview">
               <p>Well documented cable labelling processes and procedures can make cable verification and fault finding easier.</p>
            </part>
            <control id="ism-0206" class="ISM-control">
               <title>Control: ism-0206</title>
               <prop name="sort-id"
                      value="catalog[1].group[09].group[1].group[05].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="7"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0206_smt">
                  <p>Cable labelling processes, and supporting cable labelling procedures, are developed, implemented and maintained.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Labelling cables</title>
            <prop name="sort-id" value="catalog[1].group[09].group[1].group[06]"/>
            <part name="overview">
               <p>Labelling cables with the correct source and destination details minimises the likelihood of cross-patching and aids in fault finding and configuration management.</p>
            </part>
            <control id="ism-1096" class="ISM-control">
               <title>Control: ism-1096</title>
               <prop name="sort-id"
                      value="catalog[1].group[09].group[1].group[06].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Oct-19"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1096_smt">
                  <p>Cables are labelled at each end with sufficient source and destination details to enable the physical identification and inspection of the cable.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Labelling building management cables</title>
            <prop name="sort-id" value="catalog[1].group[09].group[1].group[07]"/>
            <part name="overview">
               <p>All facilities will contain structured cabling systems to support building management and control functions. As Australian Standards require some structured cabling systems to use specified colours, such as red for fire control systems, it is important that all building management cables are appropriately labelled.</p>
            </part>
            <control id="ism-1639" class="ISM-control">
               <title>Control: ism-1639</title>
               <prop name="sort-id"
                      value="catalog[1].group[09].group[1].group[07].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1639_smt">
                  <p>Building management cables are labelled with their purpose in black writing on a yellow background, with a minimum size of 2.5 cm x 1 cm, and attached at five-metre intervals.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Labelling cables for foreign systems in Australian facilities</title>
            <prop name="sort-id" value="catalog[1].group[09].group[1].group[08]"/>
            <part name="overview">
               <p>Labelling cables for foreign systems in Australian facilities helps prevent unintended cross-patching of Australian and foreign systems.</p>
            </part>
            <control id="ism-1640" class="ISM-control">
               <title>Control: ism-1640</title>
               <prop name="sort-id"
                      value="catalog[1].group[09].group[1].group[08].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1640_smt">
                  <p>Cables for foreign systems installed in Australian facilities are labelled at inspection points.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Cable colours</title>
            <prop name="sort-id" value="catalog[1].group[09].group[1].group[09]"/>
            <part name="overview">
               <p>To avoid confusion, it is important that, regardless of the type of cabling involved, a consistent cable colour is used. Furthermore, the use of designated cable colours can provide an easy way to distinguish cables for SECRET and TOP SECRET systems from cables for other systems. For example, while SECRET and TOP SECRET cables have designated cable colours, cables for other systems may be any colour except for those reserved for SECRET and TOP SECRET systems. In addition, cable colours for other systems, such as OFFICIAL and PROTECTED systems, may use the same colour, such as blue.</p>
            </part>
            <control id="ism-1820" class="ISM-control">
               <title>Control: ism-1820</title>
               <prop name="sort-id"
                      value="catalog[1].group[09].group[1].group[09].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-23"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1820_smt">
                  <p>Cables for individual systems use a consistent colour.</p>
               </part>
            </control>
            <control id="ism-0926" class="ISM-control">
               <title>Control: ism-0926</title>
               <prop name="sort-id"
                      value="catalog[1].group[09].group[1].group[09].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="9"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="O"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="P"/>
               <part name="statement" id="ism-0926_smt">
                  <p>OFFICIAL and PROTECTED cables are coloured neither salmon pink nor red.</p>
               </part>
            </control>
            <control id="ism-1718" class="ISM-control">
               <title>Control: ism-1718</title>
               <prop name="sort-id"
                      value="catalog[1].group[09].group[1].group[09].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-23"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <part name="statement" id="ism-1718_smt">
                  <p>SECRET cables are coloured salmon pink.</p>
               </part>
            </control>
            <control id="ism-1719" class="ISM-control">
               <title>Control: ism-1719</title>
               <prop name="sort-id"
                      value="catalog[1].group[09].group[1].group[09].control[4]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-23"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-1719_smt">
                  <p>TOP SECRET cables are coloured red.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Cable colour non-conformance</title>
            <prop name="sort-id" value="catalog[1].group[09].group[1].group[10]"/>
            <part name="overview">
               <p>In certain circumstances it may not be possible to use the correct colour for SECRET or TOP SECRET cables. In such cases, an organisation should band such cables with the appropriate colour and ensure that the cable bands are easily visible at inspection points. In doing so, it is important that cable bands are robust enough to stand the test of time. Examples of appropriate cable bands include stick-on coloured labels, colour heat shrink, coloured ferrules or short lengths of banded conduit.</p>
            </part>
            <control id="ism-1216" class="ISM-control">
               <title>Control: ism-1216</title>
               <prop name="sort-id"
                      value="catalog[1].group[09].group[1].group[10].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-1216_smt">
                  <p>SECRET and TOP SECRET cables with non-conformant cable colouring are both banded with the appropriate colour and labelled at inspection points.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Cable inspectability</title>
            <prop name="sort-id" value="catalog[1].group[09].group[1].group[11]"/>
            <part name="overview">
               <p>The ability to inspect cabling infrastructure is necessary to detect illicit tampering or degradation. Note, this does not necessarily mean that cables need to be fully visible all the time. Rather, cable inspectability can still be achieved as long as cables can be viewed and inspected through the easy removal of ceiling, floor or wall panels or manholes.</p>
            </part>
            <control id="ism-1112" class="ISM-control">
               <title>Control: ism-1112</title>
               <prop name="sort-id"
                      value="catalog[1].group[09].group[1].group[11].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1112_smt">
                  <p>Cables are inspectable at a minimum of five-metre intervals.</p>
               </part>
            </control>
            <control id="ism-1119" class="ISM-control">
               <title>Control: ism-1119</title>
               <prop name="sort-id"
                      value="catalog[1].group[09].group[1].group[11].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1119_smt">
                  <p>Cables in TOP SECRET areas are fully inspectable for their entire length.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Common cable bundles and conduits</title>
            <prop name="sort-id" value="catalog[1].group[09].group[1].group[12]"/>
            <part name="overview">
               <p>In some circumstances, cables for different systems can be bundled together or run in a common conduit in order to reduce costs, such as cables for OFFICIAL and PROTECTED systems.</p>
            </part>
            <control id="ism-0187" class="ISM-control">
               <title>Control: ism-0187</title>
               <prop name="sort-id"
                      value="catalog[1].group[09].group[1].group[12].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="8"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-23"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <part name="statement" id="ism-0187_smt">
                  <p>SECRET cables, when bundled together or run in conduit, are run exclusively in their own individual cable bundle or conduit.</p>
               </part>
            </control>
            <control id="ism-1821" class="ISM-control">
               <title>Control: ism-1821</title>
               <prop name="sort-id"
                      value="catalog[1].group[09].group[1].group[12].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-23"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-1821_smt">
                  <p>TOP SECRET cables, when bundled together or run in conduit, are run exclusively in their own individual cable bundle or conduit.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Common cable reticulation systems</title>
            <prop name="sort-id" value="catalog[1].group[09].group[1].group[13]"/>
            <part name="overview">
               <p>When cable reticulation systems are used for more than one cable bundle or conduit, it is important that there is a dividing partition or visible gap between cable bundles and conduits to facilitate easier cable inspection.</p>
            </part>
            <control id="ism-1114" class="ISM-control">
               <title>Control: ism-1114</title>
               <prop name="sort-id"
                      value="catalog[1].group[09].group[1].group[13].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-23"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1114_smt">
                  <p>Cable bundles or conduits sharing a common cable reticulation system have a dividing partition or visible gap between each cable bundle and conduit.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Enclosed cable reticulation systems</title>
            <prop name="sort-id" value="catalog[1].group[09].group[1].group[14]"/>
            <part name="overview">
               <p>In shared facilities, cables should be enclosed in a sealed cable reticulation system to prevent access and enhance cable management.</p>
            </part>
            <control id="ism-1130" class="ISM-control">
               <title>Control: ism-1130</title>
               <prop name="sort-id"
                      value="catalog[1].group[09].group[1].group[14].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1130_smt">
                  <p>In shared facilities, cables are run in an enclosed cable reticulation system.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Covers for enclosed cable reticulation systems</title>
            <prop name="sort-id" value="catalog[1].group[09].group[1].group[15]"/>
            <part name="overview">
               <p>In shared facilities, clear covers on enclosed cable reticulation systems are a convenient method of maintaining inspection requirements. Having clear covers face inwards increases their inspectability.</p>
            </part>
            <control id="ism-1164" class="ISM-control">
               <title>Control: ism-1164</title>
               <prop name="sort-id"
                      value="catalog[1].group[09].group[1].group[15].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1164_smt">
                  <p>In shared facilities, conduits or the front covers of ducts, cable trays in floors and ceilings, and associated fittings are clear plastic.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Sealing cable reticulation systems and conduits</title>
            <prop name="sort-id" value="catalog[1].group[09].group[1].group[16]"/>
            <part name="overview">
               <p>In shared facilities, uniquely identifiable Security Construction and Equipment Committee (SCEC)-approved tamper-evident seals should be used to provide evidence of any tampering or illicit access to TOP SECRET cable reticulation systems. In addition, TOP SECRET conduits should be sealed with a visible smear of conduit glue to prevent access.</p>
            </part>
            <control id="ism-0195" class="ISM-control">
               <title>Control: ism-0195</title>
               <prop name="sort-id"
                      value="catalog[1].group[09].group[1].group[16].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="7"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Jun-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-0195_smt">
                  <p>In shared facilities, uniquely identifiable SCEC-approved tamper-evident seals are used to seal all removable covers on TOP SECRET cable reticulation systems.</p>
               </part>
            </control>
            <control id="ism-0194" class="ISM-control">
               <title>Control: ism-0194</title>
               <prop name="sort-id"
                      value="catalog[1].group[09].group[1].group[16].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-0194_smt">
                  <p>In shared facilities, a visible smear of conduit glue is used to seal all plastic conduit joints and TOP SECRET conduits connected by threaded lock nuts.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Labelling conduits</title>
            <prop name="sort-id" value="catalog[1].group[09].group[1].group[17]"/>
            <part name="overview">
               <p>Labels for TOP SECRET conduits should be of sufficient size and colour to allow for easy identification.</p>
            </part>
            <control id="ism-0201" class="ISM-control">
               <title>Control: ism-0201</title>
               <prop name="sort-id"
                      value="catalog[1].group[09].group[1].group[17].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-0201_smt">
                  <p>Labels for TOP SECRET conduits are a minimum size of 2.5 cm x 1 cm, attached at five-metre intervals and marked as ‘TS RUN’.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Cables in walls</title>
            <prop name="sort-id" value="catalog[1].group[09].group[1].group[18]"/>
            <part name="overview">
               <p>Cables run correctly in walls allow for neater installations while maintaining separation and inspection requirements.</p>
            </part>
            <control id="ism-1115" class="ISM-control">
               <title>Control: ism-1115</title>
               <prop name="sort-id"
                      value="catalog[1].group[09].group[1].group[18].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-19"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1115_smt">
                  <p>Cables from cable trays to wall outlet boxes are run in flexible or plastic conduit.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Cables in party walls</title>
            <prop name="sort-id" value="catalog[1].group[09].group[1].group[19]"/>
            <part name="overview">
               <p>In shared facilities, TOP SECRET cables are not run in party walls. However, an inner wall can be used to run TOP SECRET cables where sufficient space exists for their inspection.</p>
            </part>
            <control id="ism-1133" class="ISM-control">
               <title>Control: ism-1133</title>
               <prop name="sort-id"
                      value="catalog[1].group[09].group[1].group[19].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-1133_smt">
                  <p>In shared facilities, TOP SECRET cables are not run in party walls.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Wall penetrations</title>
            <prop name="sort-id" value="catalog[1].group[09].group[1].group[20]"/>
            <part name="overview">
               <p>Penetrating a wall between a TOP SECRET area and a lower classified area requires the integrity of the TOP SECRET area to be maintained. In such scenarios, TOP SECRET cables should be encased in conduit with all gaps between the TOP SECRET conduit and the wall filled with an appropriate sealing compound.</p>
            </part>
            <control id="ism-1122" class="ISM-control">
               <title>Control: ism-1122</title>
               <prop name="sort-id"
                      value="catalog[1].group[09].group[1].group[20].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-1122_smt">
                  <p>Where wall penetrations exit a TOP SECRET area into a lower classified area, TOP SECRET cables are encased in conduit with all gaps between the TOP SECRET conduit and the wall filled with an appropriate sealing compound.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Wall outlet boxes</title>
            <prop name="sort-id" value="catalog[1].group[09].group[1].group[21]"/>
            <part name="overview">
               <p>Wall outlet boxes are the main method of connecting cabling infrastructure to workstations. They allow the management of cables and the types of connectors allocated to various systems.</p>
            </part>
            <control id="ism-1105" class="ISM-control">
               <title>Control: ism-1105</title>
               <prop name="sort-id"
                      value="catalog[1].group[09].group[1].group[21].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-23"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-1105_smt">
                  <p>SECRET and TOP SECRET wall outlet boxes contain exclusively SECRET or TOP SECRET cables.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Labelling wall outlet boxes</title>
            <prop name="sort-id" value="catalog[1].group[09].group[1].group[22]"/>
            <part name="overview">
               <p>Clear labelling of wall outlet boxes diminishes the possibility of incorrectly attaching ICT equipment to the wrong wall outlet box. In cases where a wall outbox contains cables for different systems, each connector should be individually labelled.</p>
            </part>
            <control id="ism-1095" class="ISM-control">
               <title>Control: ism-1095</title>
               <prop name="sort-id"
                      value="catalog[1].group[09].group[1].group[22].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="5"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1095_smt">
                  <p>Wall outlet boxes denote the systems, cable identifiers and wall outlet box identifier.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Wall outlet box colours</title>
            <prop name="sort-id" value="catalog[1].group[09].group[1].group[23]"/>
            <part name="overview">
               <p>The use of designated wall outlet box colours can provide an easy way to distinguish wall outlet boxes for SECRET and TOP SECRET systems from wall outlet boxes for other systems. For example, while SECRET and TOP SECRET wall outlet boxes have designated wall outlet box colours, wall outlet boxes for other systems may be any colour except for those reserved for SECRET and TOP SECRET systems. In addition, wall outlet box colours for other systems, such as OFFICIAL and PROTECTED systems, may use the same colour, such as blue. Ideally, wall outlet boxes should be the same colour that is used for associated cabling.</p>
            </part>
            <control id="ism-1822" class="ISM-control">
               <title>Control: ism-1822</title>
               <prop name="sort-id"
                      value="catalog[1].group[09].group[1].group[23].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-23"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1822_smt">
                  <p>Wall outlet boxes for individual systems use a consistent colour.</p>
               </part>
            </control>
            <control id="ism-1107" class="ISM-control">
               <title>Control: ism-1107</title>
               <prop name="sort-id"
                      value="catalog[1].group[09].group[1].group[23].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="5"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="O"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="P"/>
               <part name="statement" id="ism-1107_smt">
                  <p>OFFICIAL and PROTECTED wall outlet boxes are coloured neither salmon pink nor red.</p>
               </part>
            </control>
            <control id="ism-1720" class="ISM-control">
               <title>Control: ism-1720</title>
               <prop name="sort-id"
                      value="catalog[1].group[09].group[1].group[23].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <part name="statement" id="ism-1720_smt">
                  <p>SECRET wall outlet boxes are coloured salmon pink.</p>
               </part>
            </control>
            <control id="ism-1721" class="ISM-control">
               <title>Control: ism-1721</title>
               <prop name="sort-id"
                      value="catalog[1].group[09].group[1].group[23].control[4]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-1721_smt">
                  <p>TOP SECRET wall outlet boxes are coloured red.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Wall outlet box covers</title>
            <prop name="sort-id" value="catalog[1].group[09].group[1].group[24]"/>
            <part name="overview">
               <p>Transparent wall outlet box covers allow for inspection of cable cross-patching and tampering.</p>
            </part>
            <control id="ism-1109" class="ISM-control">
               <title>Control: ism-1109</title>
               <prop name="sort-id"
                      value="catalog[1].group[09].group[1].group[24].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-19"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1109_smt">
                  <p>Wall outlet box covers are clear plastic.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Fly lead installation</title>
            <prop name="sort-id" value="catalog[1].group[09].group[1].group[25]"/>
            <part name="overview">
               <p>Keeping the lengths of TOP SECRET fibre-optic fly leads to a minimum prevents clutter around desks, prevents damage, and reduces the chance of cross-patching and tampering. If lengths become excessive, TOP SECRET fibre-optic fly leads should be treated as cabling infrastructure and run in TOP SECRET conduit or fixed infrastructure, such as desk partitioning.</p>
            </part>
            <control id="ism-0218" class="ISM-control">
               <title>Control: ism-0218</title>
               <prop name="sort-id"
                      value="catalog[1].group[09].group[1].group[25].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="6"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-0218_smt">
                  <p>If TOP SECRET fibre-optic fly leads exceeding five metres in length are used to connect wall outlet boxes to ICT equipment, they are run in a protective and easily inspected pathway that is clearly labelled at the ICT equipment end with the wall outlet box’s identifier.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Connecting cable reticulation systems to cabinets</title>
            <prop name="sort-id" value="catalog[1].group[09].group[1].group[26]"/>
            <part name="overview">
               <p>Controlling the routing from cable reticulation systems to cabinets can assist in preventing unauthorised modifications and tampering while also providing easy inspection of cables.</p>
            </part>
            <control id="ism-1102" class="ISM-control">
               <title>Control: ism-1102</title>
               <prop name="sort-id"
                      value="catalog[1].group[09].group[1].group[26].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1102_smt">
                  <p>Cable reticulation systems leading into cabinets are terminated as close as possible to the cabinet.</p>
               </part>
            </control>
            <control id="ism-1101" class="ISM-control">
               <title>Control: ism-1101</title>
               <prop name="sort-id"
                      value="catalog[1].group[09].group[1].group[26].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1101_smt">
                  <p>In TOP SECRET areas, cable reticulation systems leading into cabinets in server rooms or communications rooms are terminated as close as possible to the cabinet.</p>
               </part>
            </control>
            <control id="ism-1103" class="ISM-control">
               <title>Control: ism-1103</title>
               <prop name="sort-id"
                      value="catalog[1].group[09].group[1].group[26].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1103_smt">
                  <p>In TOP SECRET areas, cable reticulation systems leading into cabinets not in server rooms or communications rooms are terminated at the boundary of the cabinet.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Terminating cables in cabinets</title>
            <prop name="sort-id" value="catalog[1].group[09].group[1].group[27]"/>
            <part name="overview">
               <p>Having individual or divided cabinets can assist in preventing accidental or deliberate cross-patching and makes inspection of cables easier.</p>
            </part>
            <control id="ism-1098" class="ISM-control">
               <title>Control: ism-1098</title>
               <prop name="sort-id"
                      value="catalog[1].group[09].group[1].group[27].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="5"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-23"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <part name="statement" id="ism-1098_smt">
                  <p>SECRET cables are terminated in an individual cabinet; or for small systems, a cabinet with a division plate between any SECRET cables and non-SECRET cables.</p>
               </part>
            </control>
            <control id="ism-1100" class="ISM-control">
               <title>Control: ism-1100</title>
               <prop name="sort-id"
                      value="catalog[1].group[09].group[1].group[27].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-18"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-1100_smt">
                  <p>TOP SECRET cables are terminated in an individual TOP SECRET cabinet.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Terminating cables on patch panels</title>
            <prop name="sort-id" value="catalog[1].group[09].group[1].group[28]"/>
            <part name="overview">
               <p>Terminating SECRET and TOP SECRET cables on different patch panels in cabinets can assist in preventing accidental or deliberate cross-patching and makes inspection of cables easier.</p>
            </part>
            <control id="ism-0213" class="ISM-control">
               <title>Control: ism-0213</title>
               <prop name="sort-id"
                      value="catalog[1].group[09].group[1].group[28].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-23"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-0213_smt">
                  <p>SECRET and TOP SECRET cables are terminated on their own individual patch panels.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Physical separation of cabinets and patch panels</title>
            <prop name="sort-id" value="catalog[1].group[09].group[1].group[29]"/>
            <part name="overview">
               <p>Physical separation between TOP SECRET systems and non-TOP SECRET systems reduces the chance of cross-patching, thereby the possibility of unauthorised personnel gaining access to TOP SECRET systems.</p>
            </part>
            <control id="ism-0216" class="ISM-control">
               <title>Control: ism-0216</title>
               <prop name="sort-id"
                      value="catalog[1].group[09].group[1].group[29].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-23"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-0216_smt">
                  <p>TOP SECRET patch panels are installed in individual TOP SECRET cabinets.</p>
               </part>
            </control>
            <control id="ism-0217" class="ISM-control">
               <title>Control: ism-0217</title>
               <prop name="sort-id"
                      value="catalog[1].group[09].group[1].group[29].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="5"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-23"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-0217_smt">
                  <p>Where spatial constraints demand non-TOP SECRET patch panels be installed in the same cabinet as a TOP SECRET patch panel:</p>
                  <ul>
                     <li>a physical barrier in the cabinet is provided to separate patch panels</li>
                     <li>only personnel holding a Positive Vetting security clearance have access to the cabinet</li>
                     <li>approval from the TOP SECRET system’s authorising officer is obtained prior to installation.</li>
                  </ul>
               </part>
            </control>
            <control id="ism-1116" class="ISM-control">
               <title>Control: ism-1116</title>
               <prop name="sort-id"
                      value="catalog[1].group[09].group[1].group[29].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-23"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-1116_smt">
                  <p>A visible gap exists between TOP SECRET cabinets and non-TOP SECRET cabinets.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Audio secure rooms</title>
            <prop name="sort-id" value="catalog[1].group[09].group[1].group[30]"/>
            <part name="overview">
               <p>Audio secure rooms are designed to prevent audio conversations from being overheard. The Australian Security Intelligence Organisation should be consulted before any modifications are made to TOP SECRET audio secure rooms.</p>
            </part>
            <control id="ism-0198" class="ISM-control">
               <title>Control: ism-0198</title>
               <prop name="sort-id"
                      value="catalog[1].group[09].group[1].group[30].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-0198_smt">
                  <p>When penetrating a TOP SECRET audio secure room, the Australian Security Intelligence Organisation is consulted and all directions provided are complied with.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Power reticulation</title>
            <prop name="sort-id" value="catalog[1].group[09].group[1].group[31]"/>
            <part name="overview">
               <p>It is important that TOP SECRET systems have control over the power system to prevent denial of service by deliberate or accidental means.</p>
            </part>
            <control id="ism-1123" class="ISM-control">
               <title>Control: ism-1123</title>
               <prop name="sort-id"
                      value="catalog[1].group[09].group[1].group[31].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-1123_smt">
                  <p>A power distribution board with a feed from an Uninterruptible Power Supply is used to power all TOP SECRET ICT equipment.</p>
               </part>
            </control>
         </group>
      </group>
      <group>
         <title>Emanation security</title>
         <prop name="sort-id" value="catalog[1].group[09].group[2]"/>
         <part name="overview">
            <h1>Further information</h1>
            <p>Further information on the ACSC’s <a href="#df17ad0f-58d3-4bb8-814a-b60f34c5f841">Emanation Security Program</a>, including a list of certified emanation security providers, is available from the ACSC.</p>
         </part>
         <group>
            <title>Emanation security threat assessments in Australia</title>
            <prop name="sort-id" value="catalog[1].group[09].group[2].group[1]"/>
            <part name="overview">
               <p>Obtaining advice from the Australian Cyber Security Centre (ACSC) on emanation security threats is vital to protecting SECRET and TOP SECRET systems.</p>
            </part>
            <control id="ism-0248" class="ISM-control">
               <title>Control: ism-0248</title>
               <prop name="sort-id"
                      value="catalog[1].group[09].group[2].group[1].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="6"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="O"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="P"/>
               <part name="statement" id="ism-0248_smt">
                  <p>System owners deploying OFFICIAL or PROTECTED systems with Radio Frequency transmitters that will be co-located with SECRET or TOP SECRET systems contact the ACSC for an emanation security threat assessment and implement any additional installation criteria derived from the threat assessment.</p>
               </part>
            </control>
            <control id="ism-0247" class="ISM-control">
               <title>Control: ism-0247</title>
               <prop name="sort-id"
                      value="catalog[1].group[09].group[2].group[1].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-0247_smt">
                  <p>System owners deploying SECRET or TOP SECRET systems with Radio Frequency transmitters inside or co-located with their facility contact the ACSC for an emanation security threat assessment and implement any additional installation criteria derived from the threat assessment.</p>
               </part>
            </control>
            <control id="ism-1137" class="ISM-control">
               <title>Control: ism-1137</title>
               <prop name="sort-id"
                      value="catalog[1].group[09].group[2].group[1].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-1137_smt">
                  <p>System owners deploying SECRET or TOP SECRET systems in shared facilities contact the ACSC for an emanation security threat assessment and implement any additional installation criteria derived from the threat assessment.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Emanation security threat assessments outside Australia</title>
            <prop name="sort-id" value="catalog[1].group[09].group[2].group[2]"/>
            <part name="overview">
               <p>Fixed sites outside Australia, and deployed military platforms, are more vulnerable to emanation security threats. Failing to address emanation security threats could result in systems or military platforms emanating compromising signals, which if intercepted and analysed, could lead to serious consequences.</p>
            </part>
            <control id="ism-0249" class="ISM-control">
               <title>Control: ism-0249</title>
               <prop name="sort-id"
                      value="catalog[1].group[09].group[2].group[2].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="O"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="P"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-0249_smt">
                  <p>System owners deploying systems or military platforms overseas contact the ACSC for an emanation security threat assessment and implement any additional installation criteria derived from the threat assessment.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Early consideration of emanation security threats</title>
            <prop name="sort-id" value="catalog[1].group[09].group[2].group[3]"/>
            <part name="overview">
               <p>It is important to consider emanation security threats as early as possible in a system’s life cycle as costs will be much greater if changes have to be made once a system has been designed and deployed.</p>
            </part>
            <control id="ism-0246" class="ISM-control">
               <title>Control: ism-0246</title>
               <prop name="sort-id"
                      value="catalog[1].group[09].group[2].group[3].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Jun-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="O"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="P"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-0246_smt">
                  <p>An emanation security threat assessment is sought as early as possible in a system’s life cycle as implementing emanation security can have significant cost implications.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Electromagnetic interference/electromagnetic compatibility standards</title>
            <prop name="sort-id" value="catalog[1].group[09].group[2].group[4]"/>
            <part name="overview">
               <p>While all ICT equipment may not need certification to emanation security standards, it still needs to meet applicable industry and government standards relating to electromagnetic interference/electromagnetic compatibility.</p>
            </part>
            <control id="ism-0250" class="ISM-control">
               <title>Control: ism-0250</title>
               <prop name="sort-id"
                      value="catalog[1].group[09].group[2].group[4].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0250_smt">
                  <p>ICT equipment meets industry and government standards relating to electromagnetic interference/electromagnetic compatibility.</p>
               </part>
            </control>
         </group>
      </group>
   </group>
   <group>
      <title>Guidelines for Communications Systems</title>
      <prop name="sort-id" value="catalog[1].group[10]"/>
      <group>
         <title>Telephone systems</title>
         <prop name="sort-id" value="catalog[1].group[10].group[1]"/>
         <part name="overview">
            <h1>Further information</h1>
            <p>Further information on encrypting communications can be found in the cryptographic fundamentals section of the <a href="#195abe87-bb1e-4006-8b42-eaecca4d51f1">Guidelines for Cryptography</a>.</p>
         </part>
         <group>
            <title>Telephone system usage policy</title>
            <prop name="sort-id" value="catalog[1].group[10].group[1].group[1]"/>
            <part name="overview">
               <p>All non-secure telephone systems are subject to interception. Personnel accidentally or maliciously communicating sensitive or classified information over a public telephone network can lead to its compromise.</p>
            </part>
            <control id="ism-1078" class="ISM-control">
               <title>Control: ism-1078</title>
               <prop name="sort-id"
                      value="catalog[1].group[10].group[1].group[1].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1078_smt">
                  <p>A telephone system usage policy is developed, implemented and maintained.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Personnel awareness</title>
            <prop name="sort-id" value="catalog[1].group[10].group[1].group[2]"/>
            <part name="overview">
               <p>As there is a potential for unintended disclosure of information when using telephone systems, it is important that personnel are made aware of the sensitivity or classification of conversations that they can be used for. In addition, personnel should also be made aware of the security risks associated with the use of non-secure telephone systems in sensitive or classified areas.</p>
               <p>When using cryptographic equipment to enable different levels of conversation for different kinds of connections, providing a visual indication to personnel as to the sensitivity or classification of information that can be discussed over the telephone system can assist in reducing the likelihood of unintended disclosure of information.</p>
            </part>
            <control id="ism-0229" class="ISM-control">
               <title>Control: ism-0229</title>
               <prop name="sort-id"
                      value="catalog[1].group[10].group[1].group[2].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-18"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0229_smt">
                  <p>Personnel are advised of the permitted sensitivity or classification of information that can be discussed over both internal and external telephone systems.</p>
               </part>
            </control>
            <control id="ism-0230" class="ISM-control">
               <title>Control: ism-0230</title>
               <prop name="sort-id"
                      value="catalog[1].group[10].group[1].group[2].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-18"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0230_smt">
                  <p>Personnel are advised of security risks posed by non-secure telephone systems in areas where sensitive or classified conversations can occur.</p>
               </part>
            </control>
            <control id="ism-0231" class="ISM-control">
               <title>Control: ism-0231</title>
               <prop name="sort-id"
                      value="catalog[1].group[10].group[1].group[2].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0231_smt">
                  <p>When using cryptographic equipment to permit different levels of conversation for different kinds of connections, telephone systems give a visual indication of what kind of connection has been made.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Protecting conversations</title>
            <prop name="sort-id" value="catalog[1].group[10].group[1].group[3]"/>
            <part name="overview">
               <p>When sensitive or classified conversations are held using telephone systems, the conversation needs to be appropriately protected through the use of encryption.</p>
            </part>
            <control id="ism-0232" class="ISM-control">
               <title>Control: ism-0232</title>
               <prop name="sort-id"
                      value="catalog[1].group[10].group[1].group[3].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-18"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0232_smt">
                  <p>Telephone systems used for sensitive or classified conversations encrypt all traffic that passes over external systems.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Cordless telephone systems</title>
            <prop name="sort-id" value="catalog[1].group[10].group[1].group[4]"/>
            <part name="overview">
               <p>Cordless telephone handsets and headsets typically have minimal transmission security and are susceptible to interception. As such, using cordless telephone handsets and headsets may result in the disclosure of communications to an adversary unless appropriate encryption is used.</p>
            </part>
            <control id="ism-0233" class="ISM-control">
               <title>Control: ism-0233</title>
               <prop name="sort-id"
                      value="catalog[1].group[10].group[1].group[4].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-23"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0233_smt">
                  <p>Cordless telephone handsets and headsets are not used for sensitive or classified conversations unless all communications are encrypted.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Speakerphones</title>
            <prop name="sort-id" value="catalog[1].group[10].group[1].group[5]"/>
            <part name="overview">
               <p>As speakerphones are designed to pick up and transmit conversations in the vicinity of the device, using speakerphones in TOP SECRET areas presents a number of security risks and they should not be used. However, if personnel are able to reduce security risks through the use of an audio secure room that is secure during any conversations then they may be used.</p>
            </part>
            <control id="ism-0235" class="ISM-control">
               <title>Control: ism-0235</title>
               <prop name="sort-id"
                      value="catalog[1].group[10].group[1].group[5].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="O"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="P"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-0235_smt">
                  <p>Speakerphones are not used on telephone systems in TOP SECRET areas unless the telephone system is located in an audio secure room, the room is audio secure during conversations and only personnel involved in conversations are present in the room.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Off-hook audio protection</title>
            <prop name="sort-id" value="catalog[1].group[10].group[1].group[6]"/>
            <part name="overview">
               <p>Using off-hook protection features minimises the chance of background conversations being accidentally coupled into handsets, headsets and speakerphones. Limiting the time an active microphone is open minimises this security risk.</p>
            </part>
            <control id="ism-0236" class="ISM-control">
               <title>Control: ism-0236</title>
               <prop name="sort-id"
                      value="catalog[1].group[10].group[1].group[6].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="5"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0236_smt">
                  <p>Off-hook audio protection features are used on telephone systems in areas where background conversations may exceed the sensitivity or classification that the telephone system is authorised for communicating.</p>
               </part>
            </control>
            <control id="ism-0931" class="ISM-control">
               <title>Control: ism-0931</title>
               <prop name="sort-id"
                      value="catalog[1].group[10].group[1].group[6].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="6"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="O"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="P"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-0931_smt">
                  <p>In SECRET and TOP SECRET areas, push-to-talk handsets or push-to-talk headsets are used to meet any off-hook audio protection requirements.</p>
               </part>
            </control>
         </group>
      </group>
      <group>
         <title>Video conferencing and Internet Protocol telephony</title>
         <prop name="sort-id" value="catalog[1].group[10].group[2]"/>
         <part name="overview">
            <h1>Internet Protocol telephony</h1>
            <p>This section describes the controls applicable to Internet Protocol (IP) telephony and extends upon the prior telephone systems section.</p>
            <h1>Video conferencing and Internet Protocol telephony gateways</h1>
            <p>Where a video conferencing or IP telephony network is connected to another video conferencing or IP telephony network from a different security domain, the gateways section of the <a href="#e8bde527-526c-4a6a-b66f-05228f09dd7b">Guidelines for Gateways</a> applies.</p>
            <p>Where an analog telephone network, such as the Public Switched Telephone Network (PSTN), is connected to a data network, the gateways section of the <a href="#e8bde527-526c-4a6a-b66f-05228f09dd7b">Guidelines for Gateways</a> does not apply.</p>
            <h1>Further information</h1>
            <p>Further information on gateways can be found in the gateways section of the <a href="#e8bde527-526c-4a6a-b66f-05228f09dd7b">Guidelines for Gateways</a>.</p>
            <p>Further information on firewalls can be found in the firewalls section of the <a href="#e8bde527-526c-4a6a-b66f-05228f09dd7b">Guidelines for Gateways</a>.</p>
            <p>Further information on the use of web conferencing solutions can be found in the Australian Cyber Security Centre’s <a href="#e19a0c40-0a68-4fba-aea1-142fdd57dc75">Web Conferencing Security</a> publication.</p>
         </part>
         <group>
            <title>Video conferencing and Internet Protocol telephony infrastructure hardening</title>
            <prop name="sort-id" value="catalog[1].group[10].group[2].group[1]"/>
            <part name="overview">
               <p>Video conferencing and IP telephony infrastructure can be hardened in order to reduce its attack surface. For example, by ensuring that a Session Initiation Protocol server has a fully patched operating system, uses fully patched software and runs only required services.</p>
            </part>
            <control id="ism-1562" class="ISM-control">
               <title>Control: ism-1562</title>
               <prop name="sort-id"
                      value="catalog[1].group[10].group[2].group[1].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-19"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1562_smt">
                  <p>Video conferencing and IP telephony infrastructure is hardened.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Video-aware and voice-aware firewalls and proxies</title>
            <prop name="sort-id" value="catalog[1].group[10].group[2].group[2]"/>
            <part name="overview">
               <p>The use of video-aware and voice-aware firewalls and proxies provides network security while supporting video and voice traffic. As such, when implementing a firewall or proxy in a gateway, and video conferencing or IP telephony traffic passes through the gateway, a video-aware or voice-aware firewall or proxy will need to be used. However, this does not require separate firewalls or proxies to be deployed for video conferencing, IP telephony and data traffic. In such cases, an organisation is encouraged to implement one firewall or proxy that is video-aware and data-aware; voice-aware and data-aware; or video-aware, voice-aware and data-aware depending on their needs.</p>
            </part>
            <control id="ism-0546" class="ISM-control">
               <title>Control: ism-0546</title>
               <prop name="sort-id"
                      value="catalog[1].group[10].group[2].group[2].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="9"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Jun-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0546_smt">
                  <p>When video conferencing or IP telephony traffic passes through a gateway containing a firewall or proxy, a video-aware or voice-aware firewall or proxy is used.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Protecting video conferencing and Internet Protocol telephony traffic</title>
            <prop name="sort-id" value="catalog[1].group[10].group[2].group[3]"/>
            <part name="overview">
               <p>Video conferencing and IP telephony traffic can be vulnerable to eavesdropping, denial-of-service, person-in-the-middle and call spoofing attacks. To mitigate this security risk, video conferencing and IP telephony signalling and audio/video data can be protected with the use of Transport Layer Security. This is achieved through the use of the Session Initiation Protocol Secure protocol and the Secure Real-time Transport Protocol.</p>
            </part>
            <control id="ism-0548" class="ISM-control">
               <title>Control: ism-0548</title>
               <prop name="sort-id"
                      value="catalog[1].group[10].group[2].group[3].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0548_smt">
                  <p>Video conferencing and IP telephony calls are established using a secure session initiation protocol.</p>
               </part>
            </control>
            <control id="ism-0547" class="ISM-control">
               <title>Control: ism-0547</title>
               <prop name="sort-id"
                      value="catalog[1].group[10].group[2].group[3].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0547_smt">
                  <p>Video conferencing and IP telephony calls are conducted using a secure real-time transport protocol.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Video conferencing unit and Internet Protocol phone authentication</title>
            <prop name="sort-id" value="catalog[1].group[10].group[2].group[4]"/>
            <part name="overview">
               <p>Blocking unauthorised or unauthenticated devices by default will reduce the likelihood of unauthorised access to a video conferencing or IP telephony network.</p>
            </part>
            <control id="ism-0554" class="ISM-control">
               <title>Control: ism-0554</title>
               <prop name="sort-id"
                      value="catalog[1].group[10].group[2].group[4].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-18"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0554_smt">
                  <p>An encrypted and non-replayable two-way authentication scheme is used for call authentication and authorisation.</p>
               </part>
            </control>
            <control id="ism-0553" class="ISM-control">
               <title>Control: ism-0553</title>
               <prop name="sort-id"
                      value="catalog[1].group[10].group[2].group[4].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-18"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0553_smt">
                  <p>Authentication and authorisation is used for all actions on a video conferencing network, including call setup and changing settings.</p>
               </part>
            </control>
            <control id="ism-0555" class="ISM-control">
               <title>Control: ism-0555</title>
               <prop name="sort-id"
                      value="catalog[1].group[10].group[2].group[4].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-19"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0555_smt">
                  <p>Authentication and authorisation is used for all actions on an IP telephony network, including registering a new IP phone, changing phone users, changing settings and accessing voicemail.</p>
               </part>
            </control>
            <control id="ism-0551" class="ISM-control">
               <title>Control: ism-0551</title>
               <prop name="sort-id"
                      value="catalog[1].group[10].group[2].group[4].control[4]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="7"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Jan-20"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0551_smt">
                  <p>IP telephony is configured such that:</p>
                  <ul>
                     <li>IP phones authenticate themselves to the call controller upon registration</li>
                     <li>auto-registration is disabled and only authorised devices are allowed to access the network</li>
                     <li>unauthorised devices are blocked by default</li>
                     <li>all unused and prohibited functionality is disabled.</li>
                  </ul>
               </part>
            </control>
            <control id="ism-1014" class="ISM-control">
               <title>Control: ism-1014</title>
               <prop name="sort-id"
                      value="catalog[1].group[10].group[2].group[4].control[5]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="6"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-1014_smt">
                  <p>Individual logins are implemented for IP phones used for SECRET or TOP SECRET conversations.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Traffic separation</title>
            <prop name="sort-id" value="catalog[1].group[10].group[2].group[5]"/>
            <part name="overview">
               <p>Video conferencing and IP telephony traffic should be physically or logically separated from other data traffic to ensure its availability and quality of service.</p>
            </part>
            <control id="ism-0549" class="ISM-control">
               <title>Control: ism-0549</title>
               <prop name="sort-id"
                      value="catalog[1].group[10].group[2].group[5].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Oct-19"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0549_smt">
                  <p>Video conferencing and IP telephony traffic is separated physically or logically from other data traffic.</p>
               </part>
            </control>
            <control id="ism-0556" class="ISM-control">
               <title>Control: ism-0556</title>
               <prop name="sort-id"
                      value="catalog[1].group[10].group[2].group[5].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="5"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Oct-19"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0556_smt">
                  <p>Workstations are not connected to video conferencing units or IP phones unless the workstation or the device uses Virtual Local Area Networks or similar mechanisms to maintain separation between video conferencing, IP telephony and other data traffic.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Internet Protocol phones in public areas</title>
            <prop name="sort-id" value="catalog[1].group[10].group[2].group[6]"/>
            <part name="overview">
               <p>IP phones in public areas may give an adversary the opportunity to access data networks or poorly protected voicemail and directory services. As such, any services accessible to IP phones in public areas should be restricted.</p>
            </part>
            <control id="ism-0558" class="ISM-control">
               <title>Control: ism-0558</title>
               <prop name="sort-id"
                      value="catalog[1].group[10].group[2].group[6].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="6"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0558_smt">
                  <p>IP phones used in public areas do not have the ability to access data networks, voicemail and directory services.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Microphones and webcams</title>
            <prop name="sort-id" value="catalog[1].group[10].group[2].group[7]"/>
            <part name="overview">
               <p>Microphones (including headsets and Universal Serial Bus [USB] handsets) and webcams can pose a security risk in SECRET and TOP SECRET areas. Specifically, an adversary can email or host a malicious application on a compromised website and use social engineering techniques to convince users into installing the application on their workstation. Such malicious applications may then activate microphones or webcams that are attached to the workstation to act as remote listening and recording devices.</p>
            </part>
            <control id="ism-0559" class="ISM-control">
               <title>Control: ism-0559</title>
               <prop name="sort-id"
                      value="catalog[1].group[10].group[2].group[7].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="5"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="O"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="P"/>
               <part name="statement" id="ism-0559_smt">
                  <p>Microphones (including headsets and USB handsets) and webcams are not used with non-SECRET workstations in SECRET areas.</p>
               </part>
            </control>
            <control id="ism-1450" class="ISM-control">
               <title>Control: ism-1450</title>
               <prop name="sort-id"
                      value="catalog[1].group[10].group[2].group[7].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="O"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="P"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <part name="statement" id="ism-1450_smt">
                  <p>Microphones (including headsets and USB handsets) and webcams are not used with non-TOP SECRET workstations in TOP SECRET areas.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Denial of service response plan</title>
            <prop name="sort-id" value="catalog[1].group[10].group[2].group[8]"/>
            <part name="overview">
               <p>Video conferencing and IP telephony services may be a critical service for an organisation. In such cases, a denial of service response plan will assist in responding to denial-of-service attacks against these services.</p>
            </part>
            <control id="ism-1019" class="ISM-control">
               <title>Control: ism-1019</title>
               <prop name="sort-id"
                      value="catalog[1].group[10].group[2].group[8].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="9"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1019_smt">
                  <p>A denial of service response plan for video conferencing and IP telephony services is developed, implemented and maintained.</p>
               </part>
            </control>
            <control id="ism-1805" class="ISM-control">
               <title>Control: ism-1805</title>
               <prop name="sort-id"
                      value="catalog[1].group[10].group[2].group[8].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1805_smt">
                  <p>A denial of service response plan for video conferencing and IP telephony services contains the following:</p>
                  <ul>
                     <li>how to identify signs of a denial-of-service attack</li>
                     <li>how to identify the source of a denial-of-service attack</li>
                     <li>how capabilities can be maintained during a denial-of-service attack</li>
                     <li>what actions can be taken to respond to a denial-of-service attack.</li>
                  </ul>
               </part>
            </control>
         </group>
      </group>
      <group>
         <title>Fax machines and multifunction devices</title>
         <prop name="sort-id" value="catalog[1].group[10].group[3]"/>
         <part name="overview">
            <h1>Using cryptographic equipment with fax machines and multifunction devices</h1>
            <p>Further information on processes and procedures for sending classified fax messages using Australian Signals Directorate-approved High Assurance Cryptographic Equipment can be requested from the Australian Cyber Security Centre.</p>
            <h1>Further information</h1>
            <p>Further information on encrypting communications can be found in the cryptographic fundamentals section of the <a href="#195abe87-bb1e-4006-8b42-eaecca4d51f1">Guidelines for Cryptography</a>.</p>
         </part>
         <group>
            <title>Fax machine and multifunction device usage policy</title>
            <prop name="sort-id" value="catalog[1].group[10].group[3].group[1]"/>
            <part name="overview">
               <p>As fax machines and multifunction devices (MFDs) are a potential source of cyber security incidents, it is important that an organisation develops, implements and maintains a policy governing their use.</p>
            </part>
            <control id="ism-0588" class="ISM-control">
               <title>Control: ism-0588</title>
               <prop name="sort-id"
                      value="catalog[1].group[10].group[3].group[1].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0588_smt">
                  <p>A fax machine and MFD usage policy is developed, implemented and maintained.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Sending fax messages</title>
            <prop name="sort-id" value="catalog[1].group[10].group[3].group[2]"/>
            <part name="overview">
               <p>Once a fax machine or MFD has been connected to cryptographic equipment, and used to send a sensitive or classified fax message, it can no longer be trusted when connected directly to unsecured telecommunications infrastructure, such as the PSTN. For example, if a fax machine fails to send a sensitive or classified fax message the device will continue attempting to send the fax message even if it has been disconnected from cryptographic equipment and re-connected directly to the PSTN. In such cases, the fax machine could send the sensitive or classified fax message in the clear causing a data spill.</p>
            </part>
            <control id="ism-1092" class="ISM-control">
               <title>Control: ism-1092</title>
               <prop name="sort-id"
                      value="catalog[1].group[10].group[3].group[2].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-18"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1092_smt">
                  <p>Separate fax machines or MFDs are used for sending sensitive or classified fax messages and all other fax messages.</p>
               </part>
            </control>
            <control id="ism-0241" class="ISM-control">
               <title>Control: ism-0241</title>
               <prop name="sort-id"
                      value="catalog[1].group[10].group[3].group[2].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0241_smt">
                  <p>When sending fax messages, the fax message is encrypted to an appropriate level to be communicated over unsecured telecommunications infrastructure.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Receiving fax messages</title>
            <prop name="sort-id" value="catalog[1].group[10].group[3].group[3]"/>
            <part name="overview">
               <p>While the communications path between fax machines and MFDs may be appropriately protected, personnel should still be aware of who has a need to know of the information being communicated. It is therefore important that fax messages are collected from the receiving fax machine or MFD as soon as possible. Furthermore, if an expected fax message is not received it may indicate that there was a problem with the original transmission or the fax message has been taken by an unauthorised person.</p>
            </part>
            <control id="ism-1075" class="ISM-control">
               <title>Control: ism-1075</title>
               <prop name="sort-id"
                      value="catalog[1].group[10].group[3].group[3].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1075_smt">
                  <p>The sender of a fax message makes arrangements for the receiver to collect the fax message as soon as possible after it is sent and for the receiver to notify the sender if the fax message does not arrive in an agreed amount of time.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Connecting multifunction devices to networks</title>
            <prop name="sort-id" value="catalog[1].group[10].group[3].group[4]"/>
            <part name="overview">
               <p>As networked MFDs are considered to be devices that reside on networks, they should have controls of a similar strength to other devices on networks.</p>
            </part>
            <control id="ism-0590" class="ISM-control">
               <title>Control: ism-0590</title>
               <prop name="sort-id"
                      value="catalog[1].group[10].group[3].group[4].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="7"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Jun-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0590_smt">
                  <p>Controls for MFDs connected to networks are of a similar strength to those for other devices on networks.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Connecting multifunction devices to both networks and digital telephone systems</title>
            <prop name="sort-id" value="catalog[1].group[10].group[3].group[5]"/>
            <part name="overview">
               <p>When an MFD is connected to both a network and a digital telephone system, the MFD can act as a bridge between the two. The digital telephone system therefore needs to operate at the same sensitivity or classification as the network.</p>
            </part>
            <control id="ism-0245" class="ISM-control">
               <title>Control: ism-0245</title>
               <prop name="sort-id"
                      value="catalog[1].group[10].group[3].group[5].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="5"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-19"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0245_smt">
                  <p>A direct connection from an MFD to a digital telephone system is not enabled unless the digital telephone system is authorised to operate at the same sensitivity or classification as the network to which the MFD is connected.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Copying documents on multifunction devices</title>
            <prop name="sort-id" value="catalog[1].group[10].group[3].group[6]"/>
            <part name="overview">
               <p>As networked MFDs are capable of sending scanned or copied documents across connected networks, personnel should be aware that if they scan or copy documents at a level higher than that of networks that devices are connected to it will cause a data spill.</p>
            </part>
            <control id="ism-0589" class="ISM-control">
               <title>Control: ism-0589</title>
               <prop name="sort-id"
                      value="catalog[1].group[10].group[3].group[6].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="6"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0589_smt">
                  <p>MFDs connected to networks are not used to copy documents above the sensitivity or classification of connected networks.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Observing fax machine and multifunction device use</title>
            <prop name="sort-id" value="catalog[1].group[10].group[3].group[7]"/>
            <part name="overview">
               <p>Placing fax machines and MFDs in public areas can help reduce the likelihood of any suspicious use going unnoticed.</p>
            </part>
            <control id="ism-1036" class="ISM-control">
               <title>Control: ism-1036</title>
               <prop name="sort-id"
                      value="catalog[1].group[10].group[3].group[7].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-18"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1036_smt">
                  <p>Fax machines and MFDs are located in areas where their use can be observed.</p>
               </part>
            </control>
         </group>
      </group>
   </group>
   <group>
      <title>Guidelines for Enterprise Mobility</title>
      <prop name="sort-id" value="catalog[1].group[11]"/>
      <group>
         <title>Mobile device management</title>
         <prop name="sort-id" value="catalog[1].group[11].group[1]"/>
         <part name="overview">
            <h1>Types of mobile devices</h1>
            <p>These guidelines describe the use and protection of mobile devices, such as smartphones, tablets and laptops. Further guidance for laptops is available in the <a href="#de7525f3-a466-40a5-abdd-3ae24a6d1b44">Guidelines for System Hardening</a> and the <a href="#c6ca6620-ccd5-4c5d-b97c-9d92f1162948">Guidelines for System Management</a>.</p>
            <h1>Further information</h1>
            <p>Further information on hardening operating systems for laptops can be found in the operating system hardening section of the <a href="#de7525f3-a466-40a5-abdd-3ae24a6d1b44">Guidelines for System Hardening</a>.</p>
            <p>Further information on hardening applications for laptops can be found in the user application hardening section of the <a href="#de7525f3-a466-40a5-abdd-3ae24a6d1b44">Guidelines for System Hardening</a>.</p>
            <p>Further information on patching or updating operating systems and applications for laptops can be found in the system patching section of the <a href="#c6ca6620-ccd5-4c5d-b97c-9d92f1162948">Guidelines for System Management</a>.</p>
            <p>Further information on allowing the use of privately-owned mobile devices by personnel to access their organisation’s systems and data can be found in the ACSC’s <a href="#0e982561-93dc-4cf7-9a98-e91411e99ca6">Bring Your Own Device for Executives</a> publication.</p>
            <p>Further information and specific guidance on enterprise mobility can be found in the ACSC’s <a href="#e8ec7a1f-775d-4b79-a164-0752278177fa">Risk Management of Enterprise Mobility Including Bring Your Own Device (BYOD)</a> publication.</p>
            <p>Further information on cyber supply chain risk management can be found in the cyber supply chain risk management section of the <a href="#f37a4848-0791-4870-b316-5536c2681c28">Guidelines for Procurement and Outsourcing</a>.</p>
            <p>Further information on evaluated products can be found in the evaluated product procurement section of the <a href="#a699a3aa-828d-479b-b50b-98127bb19437">Guidelines for Evaluated Products</a>.</p>
            <p>Further information on ASD-approved platforms can be found in the following ACSC publications:</p>
            <ul>
               <li>
                  <a href="#d2910e61-da88-4d29-b860-83c25161fd18">Security Configuration Guide – Apple iOS 14 Devices</a>
               </li>
               <li>
                  <a href="#616fce77-495b-472a-a552-7593ab64f188">Security Configuration Guide – Samsung Galaxy S10, S20 and Note 20 Devices</a>
               </li>
               <li>
                  <a href="#daae37ef-262f-4b20-bfb7-a27901f3c2db">Security Configuration Guide – Viasat Mobile Dynamic Defense</a>.</li>
            </ul>
            <p>Further information on encrypting mobile devices and their communications can be found in the cryptographic fundamentals section of the <a href="#195abe87-bb1e-4006-8b42-eaecca4d51f1">Guidelines for Cryptography</a>.</p>
            <p>Further information on Bluetooth security can be found in National Institute of Standards and Technology Special Publication 800-121 Rev. 2, <a href="#315744ea-3523-4c93-838d-fe2848ac4181">Guide to Bluetooth Security</a>.</p>
         </part>
         <group>
            <title>Mobile device management policy</title>
            <prop name="sort-id" value="catalog[1].group[11].group[1].group[1]"/>
            <part name="overview">
               <p>Since mobile devices routinely leave the office environment, and the protection it affords, it is important that a mobile device management policy is developed, implemented and maintained to ensure that they are sufficiently hardened.</p>
            </part>
            <control id="ism-1533" class="ISM-control">
               <title>Control: ism-1533</title>
               <prop name="sort-id"
                      value="catalog[1].group[11].group[1].group[1].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1533_smt">
                  <p>A mobile device management policy is developed, implemented and maintained.</p>
               </part>
            </control>
            <control id="ism-1195" class="ISM-control">
               <title>Control: ism-1195</title>
               <prop name="sort-id"
                      value="catalog[1].group[11].group[1].group[1].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-18"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1195_smt">
                  <p>A Mobile Device Management solution is used to ensure mobile device management policy is applied to all mobile devices.</p>
               </part>
            </control>
         </group>
         <group>
            <title>ASD-approved platforms</title>
            <prop name="sort-id" value="catalog[1].group[11].group[1].group[2]"/>
            <part name="overview">
               <p>In order to ensure interoperability and maintain trust, all mobile devices that process, store or communicate SECRET or TOP SECRET data must be approved for use by the Australian Signals Directorate (ASD).</p>
            </part>
            <control id="ism-0687" class="ISM-control">
               <title>Control: ism-0687</title>
               <prop name="sort-id"
                      value="catalog[1].group[11].group[1].group[2].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="9"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-0687_smt">
                  <p>Mobile devices do not process, store or communicate SECRET or TOP SECRET data until approved for use by ASD.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Privately-owned mobile devices</title>
            <prop name="sort-id" value="catalog[1].group[11].group[1].group[3]"/>
            <part name="overview">
               <p>Allowing privately-owned mobile devices to access an organisation’s systems or data can increase liability risk. As such, an organisation should seek legal advice to ascertain whether this scenario affects compliance with relevant legislation, such as the <a href="#6fac5a84-b86e-405f-b2b3-8c13ecee4a02">Privacy Act 1988</a> and the <a href="#e0d3b5ea-6a5a-400c-8daa-8a8059816a06">Archives Act 1983</a>, and also consider whether the increased liability risks are acceptable to the organisation.</p>
               <p>If an organisation chooses to allow personnel to use a privately-owned mobile device to access their organisation’s systems or data, they should ensure that it does not present an unacceptable security risk. This can be achieved by encouraging the use of an ASD-approved platform, with a security configuration in accordance with Australian Cyber Security Centre (ACSC) guidance, along with enforced separation of work and personal data.</p>
            </part>
            <control id="ism-1297" class="ISM-control">
               <title>Control: ism-1297</title>
               <prop name="sort-id"
                      value="catalog[1].group[11].group[1].group[3].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1297_smt">
                  <p>Legal advice is sought prior to allowing privately-owned mobile devices to access systems or data.</p>
               </part>
            </control>
            <control id="ism-1400" class="ISM-control">
               <title>Control: ism-1400</title>
               <prop name="sort-id"
                      value="catalog[1].group[11].group[1].group[3].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="7"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="O"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="P"/>
               <part name="statement" id="ism-1400_smt">
                  <p>Personnel accessing OFFICIAL and PROTECTED systems or data using a privately-owned mobile device use an ASD-approved platform, a security configuration in accordance with ACSC guidance, and have enforced separation of work and personal data.</p>
               </part>
            </control>
            <control id="ism-0694" class="ISM-control">
               <title>Control: ism-0694</title>
               <prop name="sort-id"
                      value="catalog[1].group[11].group[1].group[3].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="7"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-0694_smt">
                  <p>Privately-owned mobile devices do not access SECRET and TOP SECRET systems or data.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Organisation-owned mobile devices</title>
            <prop name="sort-id" value="catalog[1].group[11].group[1].group[4]"/>
            <part name="overview">
               <p>If an organisation chooses to issue personnel with an organisation-owned mobile device to access their organisation’s systems or data, they should ensure that it does not present an unacceptable security risk. This can be achieved by using an ASD-approved platform, with a security configuration in accordance with ACSC guidance, along with enforced separation of work and personal data.</p>
            </part>
            <control id="ism-1482" class="ISM-control">
               <title>Control: ism-1482</title>
               <prop name="sort-id"
                      value="catalog[1].group[11].group[1].group[4].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="6"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="O"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="P"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-1482_smt">
                  <p>Personnel accessing systems or data using an organisation-owned mobile device use an ASD-approved platform, a security configuration in accordance with ACSC guidance, and have enforced separation of work and personal data.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Storage encryption</title>
            <prop name="sort-id" value="catalog[1].group[11].group[1].group[5]"/>
            <part name="overview">
               <p>Encrypting the internal storage, and any removable media, for mobile devices will prevent an adversary from gaining easy access to any sensitive or classified data stored on them if they are lost or stolen.</p>
            </part>
            <control id="ism-0869" class="ISM-control">
               <title>Control: ism-0869</title>
               <prop name="sort-id"
                      value="catalog[1].group[11].group[1].group[5].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="5"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0869_smt">
                  <p>Mobile devices encrypt their internal storage and any removable media.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Communications encryption</title>
            <prop name="sort-id" value="catalog[1].group[11].group[1].group[6]"/>
            <part name="overview">
               <p>If appropriate encryption is not available to protect data in transit, mobile devices communicating sensitive or classified data will present a security risk.</p>
            </part>
            <control id="ism-1085" class="ISM-control">
               <title>Control: ism-1085</title>
               <prop name="sort-id"
                      value="catalog[1].group[11].group[1].group[6].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1085_smt">
                  <p>Mobile devices encrypt all sensitive or classified data communicated over public network infrastructure.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Bluetooth functionality</title>
            <prop name="sort-id" value="catalog[1].group[11].group[1].group[7]"/>
            <part name="overview">
               <p>To mitigate security risks associated with pairing mobile devices with other Bluetooth devices, Bluetooth version 4.1 introduced the Secure Connections functionality for Bluetooth Classic, while Bluetooth version 4.2 introduced the Secure Connections functionality for Bluetooth Low Energy. This functionality uses keys generated using Elliptic Curve Diffie-Hellman cryptography, thereby offering greater security compared to previous key exchange protocols. However, personnel should still consider the location and manner in which they pair OFFICIAL and PROTECTED mobile devices with other Bluetooth devices, such as by avoiding pairing devices in public locations, and remove all Bluetooth pairings when there is no longer a requirement for their use.</p>
               <p>Note, however, the Bluetooth protocol provides inadequate protection for the communication of SECRET and TOP SECRET data. As such, Bluetooth functionality is not suitable for use with SECRET and TOP SECRET mobile devices.</p>
            </part>
            <control id="ism-1196" class="ISM-control">
               <title>Control: ism-1196</title>
               <prop name="sort-id"
                      value="catalog[1].group[11].group[1].group[7].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Jun-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="O"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="P"/>
               <part name="statement" id="ism-1196_smt">
                  <p>OFFICIAL and PROTECTED mobile devices are configured to remain undiscoverable to other Bluetooth devices except during Bluetooth pairing.</p>
               </part>
            </control>
            <control id="ism-1200" class="ISM-control">
               <title>Control: ism-1200</title>
               <prop name="sort-id"
                      value="catalog[1].group[11].group[1].group[7].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="5"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Jun-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="O"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="P"/>
               <part name="statement" id="ism-1200_smt">
                  <p>Bluetooth pairing for OFFICIAL and PROTECTED mobile devices is performed using Secure Connections, preferably with Numeric Comparison if supported.</p>
               </part>
            </control>
            <control id="ism-1198" class="ISM-control">
               <title>Control: ism-1198</title>
               <prop name="sort-id"
                      value="catalog[1].group[11].group[1].group[7].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Jun-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="O"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="P"/>
               <part name="statement" id="ism-1198_smt">
                  <p>Bluetooth pairing for OFFICIAL and PROTECTED mobile devices is performed in a manner such that connections are only made between intended Bluetooth devices.</p>
               </part>
            </control>
            <control id="ism-1199" class="ISM-control">
               <title>Control: ism-1199</title>
               <prop name="sort-id"
                      value="catalog[1].group[11].group[1].group[7].control[4]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Jun-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="O"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="P"/>
               <part name="statement" id="ism-1199_smt">
                  <p>Bluetooth pairings for OFFICIAL and PROTECTED mobile devices are removed when there is no longer a requirement for their use.</p>
               </part>
            </control>
            <control id="ism-0682" class="ISM-control">
               <title>Control: ism-0682</title>
               <prop name="sort-id"
                      value="catalog[1].group[11].group[1].group[7].control[5]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="5"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-0682_smt">
                  <p>Bluetooth functionality is not enabled on SECRET and TOP SECRET mobile devices.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Maintaining mobile device security</title>
            <prop name="sort-id" value="catalog[1].group[11].group[1].group[8]"/>
            <part name="overview">
               <p>Poorly secured mobile devices are more vulnerable to compromise, and provide an adversary with a potential access point into any connected systems. Although an organisation may initially provide secure mobile devices, their security posture may degrade over time if personnel are capable of installing or uninstalling non-approved applications, or disabling or modifying security functionality. Furthermore, it is important that security updates are applied to mobile devices as soon as they become available in order to maintain their security posture.</p>
            </part>
            <control id="ism-0863" class="ISM-control">
               <title>Control: ism-0863</title>
               <prop name="sort-id"
                      value="catalog[1].group[11].group[1].group[8].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0863_smt">
                  <p>Mobile devices prevent personnel from installing or uninstalling non-approved applications once provisioned.</p>
               </part>
            </control>
            <control id="ism-0864" class="ISM-control">
               <title>Control: ism-0864</title>
               <prop name="sort-id"
                      value="catalog[1].group[11].group[1].group[8].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0864_smt">
                  <p>Mobile devices prevent personnel from disabling or modifying security functionality once provisioned.</p>
               </part>
            </control>
            <control id="ism-1366" class="ISM-control">
               <title>Control: ism-1366</title>
               <prop name="sort-id"
                      value="catalog[1].group[11].group[1].group[8].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1366_smt">
                  <p>Security updates are applied to mobile devices as soon as they become available.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Connecting mobile devices to the internet</title>
            <prop name="sort-id" value="catalog[1].group[11].group[1].group[9]"/>
            <part name="overview">
               <p>When connecting mobile devices to the internet, best practice involves establishing a Virtual Private Network (VPN) connection to an organisation’s internet gateway rather than a direct connection to the internet. In doing so, mobile devices will be protected by additional security functionality, such as web content filtering, provided by an organisation’s internet gateway.</p>
               <p>A split tunnel VPN can allow access into an organisation’s network from other networks, such as the internet. If split tunnelling is not disabled there is an increased security risk that the VPN connection will be susceptible to intrusions from other networks. An organisation can refer to the relevant ACSC security configuration guidance for mobile devices on how to mitigate this security risk.</p>
            </part>
            <control id="ism-0874" class="ISM-control">
               <title>Control: ism-0874</title>
               <prop name="sort-id"
                      value="catalog[1].group[11].group[1].group[9].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="5"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0874_smt">
                  <p>Mobile devices access the internet via a VPN connection to an organisation’s internet gateway rather than via a direct connection to the internet.</p>
               </part>
            </control>
            <control id="ism-0705" class="ISM-control">
               <title>Control: ism-0705</title>
               <prop name="sort-id"
                      value="catalog[1].group[11].group[1].group[9].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0705_smt">
                  <p>When accessing an organisation’s network via a VPN connection, split tunnelling is disabled.</p>
               </part>
            </control>
         </group>
      </group>
      <group>
         <title>Mobile device usage</title>
         <prop name="sort-id" value="catalog[1].group[11].group[2]"/>
         <part name="overview">
            <h1>Further information</h1>
            <p>Further information on usage of mobile devices in SECRET and TOP SECRET areas can be found in the facilities and systems section of the <a href="#4deea7ea-18a2-4fd7-8b25-0b3603215df2">Guidelines for Physical Security</a>.</p>
            <p>Further information on security briefcases can be found in the Australian Security Intelligence Organisation’s Security Equipment Guide-005, Briefcases for the Carriage of Security Classified Information. This publication is available from the Protective Security Policy GovTEAMS community or the Australian Security Intelligence Organisation by email.</p>
            <p>Further information on approved multi-use satchels, pouches and transit bags can be found on the Security Construction and Equipment Committee’s <a href="#f7e13f7b-eb48-4294-bd01-9c22c756d96b">Security Equipment Evaluated Products List</a>.</p>
            <p>Further information on travelling overseas with mobile devices can be found in the ACSC’s <a href="#5796c2ee-4dbc-4084-ae80-2febc26d5807">Travelling Overseas with Electronic Devices</a> publication.</p>
         </part>
         <group>
            <title>Mobile device usage policy</title>
            <prop name="sort-id" value="catalog[1].group[11].group[2].group[1]"/>
            <part name="overview">
               <p>Since mobile devices routinely leave the office environment, and the protection it affords, it is important that an organisation develops, implements and maintains a mobile device usage policy governing their use.</p>
            </part>
            <control id="ism-1082" class="ISM-control">
               <title>Control: ism-1082</title>
               <prop name="sort-id"
                      value="catalog[1].group[11].group[2].group[1].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1082_smt">
                  <p>A mobile device usage policy is developed, implemented and maintained.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Personnel awareness</title>
            <prop name="sort-id" value="catalog[1].group[11].group[2].group[2]"/>
            <part name="overview">
               <p>Mobile devices can have both a voice and data communications component. In such cases, personnel should know the sensitivity or classification of voice and data that mobile devices have been approved to process, store and communicate.</p>
            </part>
            <control id="ism-1083" class="ISM-control">
               <title>Control: ism-1083</title>
               <prop name="sort-id"
                      value="catalog[1].group[11].group[2].group[2].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-18"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1083_smt">
                  <p>Personnel are advised of the sensitivity or classification permitted for voice and data communications when using mobile devices.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Paging, message services and messaging apps</title>
            <prop name="sort-id" value="catalog[1].group[11].group[2].group[3]"/>
            <part name="overview">
               <p>As paging, messaging services and many messaging apps do not sufficiently encrypt data in transit, they cannot be relied upon for the communication of sensitive or classified data.</p>
            </part>
            <control id="ism-0240" class="ISM-control">
               <title>Control: ism-0240</title>
               <prop name="sort-id"
                      value="catalog[1].group[11].group[2].group[3].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="7"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0240_smt">
                  <p>Paging, Multimedia Message Service, Short Message Service and messaging apps are not used to communicate sensitive or classified data.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Using mobile devices in public spaces</title>
            <prop name="sort-id" value="catalog[1].group[11].group[2].group[4]"/>
            <part name="overview">
               <p>Personnel should be aware of the environment in which they use mobile devices to view or communicate sensitive or classified data. In particular, personnel should take care to ensure that sensitive or classified data is not observed by other parties in public areas, such as on public transport, in transit lounges and at coffee shops. In some cases, privacy filters can be applied to the screen of a mobile device to prevent onlookers from reading content off its screen.</p>
               <p>In addition, personnel should maintain awareness of the environments from which they conduct sensitive or classified phone calls and the potential for their conversations to be overheard.</p>
            </part>
            <control id="ism-0866" class="ISM-control">
               <title>Control: ism-0866</title>
               <prop name="sort-id"
                      value="catalog[1].group[11].group[2].group[4].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="5"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Jun-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0866_smt">
                  <p>Sensitive or classified data is not viewed or communicated in public locations unless care is taken to reduce the chance of the screen of a mobile device being observed.</p>
               </part>
            </control>
            <control id="ism-1145" class="ISM-control">
               <title>Control: ism-1145</title>
               <prop name="sort-id"
                      value="catalog[1].group[11].group[2].group[4].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-1145_smt">
                  <p>Privacy filters are applied to the screens of SECRET and TOP SECRET mobile devices.</p>
               </part>
            </control>
            <control id="ism-1644" class="ISM-control">
               <title>Control: ism-1644</title>
               <prop name="sort-id"
                      value="catalog[1].group[11].group[2].group[4].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Jun-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1644_smt">
                  <p>Sensitive or classified phone calls are not conducted in public locations unless care is taken to reduce the chance of conversations being overheard.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Maintaining control of mobile devices</title>
            <prop name="sort-id" value="catalog[1].group[11].group[2].group[5]"/>
            <part name="overview">
               <p>As mobile devices are portable in nature, and can be easily lost or stolen, it is strongly advised that personnel maintain continual direct supervision of them when they are being actively used and carry or store them in a secured state when they are not being activity used. Note, while mobile devices may be encrypted, the effectiveness of encryption might be reduced if they are lost or stolen while in sleep mode or powered on with a locked screen.</p>
            </part>
            <control id="ism-0871" class="ISM-control">
               <title>Control: ism-0871</title>
               <prop name="sort-id"
                      value="catalog[1].group[11].group[2].group[5].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Apr-19"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0871_smt">
                  <p>Mobile devices are kept under continual direct supervision when being actively used.</p>
               </part>
            </control>
            <control id="ism-0870" class="ISM-control">
               <title>Control: ism-0870</title>
               <prop name="sort-id"
                      value="catalog[1].group[11].group[2].group[5].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Apr-19"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0870_smt">
                  <p>Mobile devices are carried or stored in a secured state when not being actively used.</p>
               </part>
            </control>
            <control id="ism-1084" class="ISM-control">
               <title>Control: ism-1084</title>
               <prop name="sort-id"
                      value="catalog[1].group[11].group[2].group[5].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1084_smt">
                  <p>If unable to carry or store mobile devices in a secured state, they are physically transferred in a security briefcase or an approved multi-use satchel, pouch or transit bag.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Mobile device emergency sanitisation processes and procedures</title>
            <prop name="sort-id" value="catalog[1].group[11].group[2].group[6]"/>
            <part name="overview">
               <p>The sanitisation of mobile devices in emergency situations can assist in reducing the potential for compromise of data by an adversary. This may be achieved through the use of a remote wipe capability or a cryptographic key zeroise or sanitisation function if present.</p>
            </part>
            <control id="ism-0701" class="ISM-control">
               <title>Control: ism-0701</title>
               <prop name="sort-id"
                      value="catalog[1].group[11].group[2].group[6].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="6"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0701_smt">
                  <p>Mobile device emergency sanitisation processes, and supporting mobile device emergency sanitisation procedures, are developed, implemented and maintained.</p>
               </part>
            </control>
            <control id="ism-0702" class="ISM-control">
               <title>Control: ism-0702</title>
               <prop name="sort-id"
                      value="catalog[1].group[11].group[2].group[6].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="5"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-0702_smt">
                  <p>If a cryptographic zeroise or sanitise function is provided for cryptographic keys on a SECRET or TOP SECRET mobile device, the function is used as part of mobile device emergency sanitisation processes and procedures.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Before travelling overseas with mobile devices</title>
            <prop name="sort-id" value="catalog[1].group[11].group[2].group[7]"/>
            <part name="overview">
               <p>Personnel travelling overseas with mobile devices face additional security risks compared to travelling domestically, especially when travelling to high or extreme risk countries. As such, appropriate precautions should be taken. Personnel should also be aware that when they leave Australian borders they also leave behind any expectations of privacy.</p>
            </part>
            <control id="ism-1298" class="ISM-control">
               <title>Control: ism-1298</title>
               <prop name="sort-id"
                      value="catalog[1].group[11].group[2].group[7].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Oct-19"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1298_smt">
                  <p>Personnel are advised of privacy and security risks when travelling overseas with mobile devices.</p>
               </part>
            </control>
            <control id="ism-1554" class="ISM-control">
               <title>Control: ism-1554</title>
               <prop name="sort-id"
                      value="catalog[1].group[11].group[2].group[7].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1554_smt">
                  <p>If travelling overseas with mobile devices to high or extreme risk countries, personnel are:</p>
                  <ul>
                     <li>issued with newly provisioned accounts, mobile devices and removable media from a pool of dedicated travel devices which are used solely for work-related activities</li>
                     <li>advised on how to apply and inspect tamper seals to key areas of mobile devices</li>
                     <li>advised to avoid taking any personal mobile devices, especially if rooted or jailbroken.</li>
                  </ul>
               </part>
            </control>
            <control id="ism-1555" class="ISM-control">
               <title>Control: ism-1555</title>
               <prop name="sort-id"
                      value="catalog[1].group[11].group[2].group[7].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1555_smt">
                  <p>Before travelling overseas with mobile devices, personnel take the following actions:</p>
                  <ul>
                     <li>record all details of the mobile devices being taken, such as product types, serial numbers and International Mobile Equipment Identity numbers</li>
                     <li>update all operating systems and applications</li>
                     <li>remove all non-essential accounts, applications and data</li>
                     <li>apply security configuration settings, such as lock screens</li>
                     <li>configure remote locate and wipe functionality</li>
                     <li>enable encryption, including for any removable media</li>
                     <li>backup all important data and configuration settings.</li>
                  </ul>
               </part>
            </control>
         </group>
         <group>
            <title>While travelling overseas with mobile devices</title>
            <prop name="sort-id" value="catalog[1].group[11].group[2].group[8]"/>
            <part name="overview">
               <p>Personnel lose control of mobile devices and removable media any time they are not on their person. This includes when placing mobile devices and removable media in checked-in luggage or leaving them in hotel rooms (including hotel room safes). In addition, allowing untrusted people to access mobile devices provides an opportunity for them to be tampered with.</p>
            </part>
            <control id="ism-1299" class="ISM-control">
               <title>Control: ism-1299</title>
               <prop name="sort-id"
                      value="catalog[1].group[11].group[2].group[8].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1299_smt">
                  <p>Personnel take the following precautions when travelling overseas with mobile devices:</p>
                  <ul>
                     <li>never leaving mobile devices or removable media unattended for any period of time, including by placing them in checked-in luggage or leaving them in hotel safes</li>
                     <li>never storing credentials with mobile devices that they grant access to, such as in laptop bags</li>
                     <li>never lending mobile devices or removable media to untrusted people, even if briefly</li>
                     <li>never allowing untrusted people to connect their mobile devices or removable media, including for charging</li>
                     <li>never using designated charging stations, wall outlet charging ports or chargers supplied by untrusted people</li>
                     <li>avoiding connecting mobile devices to open or untrusted Wi-Fi networks</li>
                     <li>using a VPN connection to encrypt all mobile device communications</li>
                     <li>using encrypted messaging apps for communications instead of using foreign telecommunication networks</li>
                     <li>disabling any communications capabilities of mobile devices when not in use, such as cellular data, wireless, Bluetooth and Near Field Communication</li>
                     <li>avoiding reuse of removable media once used with other parties’ systems or mobile devices</li>
                     <li>ensuring any removable media used for data transfers are thoroughly checked for malicious code beforehand</li>
                     <li>never using any gifted mobile devices, especially removable media, when travelling or upon returning from travelling.</li>
                  </ul>
               </part>
            </control>
            <control id="ism-1088" class="ISM-control">
               <title>Control: ism-1088</title>
               <prop name="sort-id"
                      value="catalog[1].group[11].group[2].group[8].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="5"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1088_smt">
                  <p>Personnel report the potential compromise of mobile devices, removable media or credentials to their organisation as soon as possible, especially if they:</p>
                  <ul>
                     <li>provide credentials to foreign government officials</li>
                     <li>decrypt mobile devices for foreign government officials</li>
                     <li>have mobile devices taken out of sight by foreign government officials</li>
                     <li>have mobile devices or removable media stolen that are later returned</li>
                     <li>lose mobile devices or removable media that are later found</li>
                     <li>observe unusual behaviour of mobile devices.</li>
                  </ul>
               </part>
            </control>
         </group>
         <group>
            <title>After travelling overseas with mobile devices</title>
            <prop name="sort-id" value="catalog[1].group[11].group[2].group[9]"/>
            <part name="overview">
               <p>Following overseas travel with mobile devices, personnel should take appropriate precautions to ensure that they do not pose an undue security risk to their organisation’s systems and data. In most cases, sanitising and resetting mobile devices, including all removable media, will be sufficient. However, upon returning from high or extreme risk countries, additional precautions will likely be needed.</p>
            </part>
            <control id="ism-1300" class="ISM-control">
               <title>Control: ism-1300</title>
               <prop name="sort-id"
                      value="catalog[1].group[11].group[2].group[9].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="6"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1300_smt">
                  <p>Upon returning from travelling overseas with mobile devices, personnel take the following actions:</p>
                  <ul>
                     <li>sanitise and reset mobile devices, including all removable media</li>
                     <li>decommission any credentials that left their possession during their travel</li>
                     <li>report if significant doubt exists as to the integrity of any mobile devices or removable media.</li>
                  </ul>
               </part>
            </control>
            <control id="ism-1556" class="ISM-control">
               <title>Control: ism-1556</title>
               <prop name="sort-id"
                      value="catalog[1].group[11].group[2].group[9].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1556_smt">
                  <p>If returning from travelling overseas with mobile devices to high or extreme risk countries, personnel take the following additional actions:</p>
                  <ul>
                     <li>reset credentials used with mobile devices, including those used for remote access to their organisation’s systems</li>
                     <li>monitor accounts for any indicators of compromise, such as failed logon attempts.</li>
                  </ul>
               </part>
            </control>
         </group>
      </group>
   </group>
   <group>
      <title>Guidelines for Evaluated Products</title>
      <prop name="sort-id" value="catalog[1].group[12]"/>
      <group>
         <title>Evaluated product procurement</title>
         <prop name="sort-id" value="catalog[1].group[12].group[1]"/>
         <part name="overview">
            <h1>Evaluated products</h1>
            <p>An evaluated product provides a level of assurance in its security functionality that an unevaluated product does not. To assist in providing this assurance, the Australian Cyber Security Centre (ACSC) performs product evaluations through the following programs:</p>
            <ul>
               <li>
                  <strong>Enterprise Mobility Evaluation Program:</strong> For enterprise mobility products used to protect sensitive or classified data.</li>
               <li>
                  <strong>High Assurance Evaluation Program:</strong> For products used to protect SECRET and TOP SECRET data.</li>
            </ul>
            <p>The ACSC can be contacted for information on products that are in-evaluation via either program as well as those that have completed evaluation.</p>
            <h1>Common Criteria evaluations</h1>
            <p>The Australian Certification Authority within the ACSC also certifies product evaluations conducted by licensed commercial facilities, in accordance with the Common Criteria (i.e. the International Organization for Standardization/International Electrotechnical Commission 15408 series), as part of the Australian Information Security Evaluation Program (AISEP).</p>
            <p>For an organisation seeking to procure evaluated products, the Common Criteria’s <a href="#29b04eaf-5f57-4ea1-a453-8047826dccf5">Certified Products List</a> contains a list of products that have been evaluated, certified and mutually-recognised in accordance with the Common Criteria and the Common Criteria Recognition Arrangement (CCRA).</p>
            <h1>Cryptographic evaluations</h1>
            <p>Some CCRA schemes leverage the <a href="#42e7d99d-9709-4355-a54d-98959c552aa1">Cryptographic Algorithm Validation Program</a> for the evaluation of cryptographic algorithms used by cryptographic modules within evaluated products. In such cases, cryptographic evaluations are performed by Cryptographic and Security Testing laboratories that are accredited by the United States’ National Voluntary Laboratory Accreditation Program to International Organization for Standardization/International Electrotechnical Commission 17025:2017, <a href="#edd67903-94ef-4edd-9789-73e0141cd77c">General requirements for the competence of testing and calibration laboratories</a>.</p>
            <h1>Protection Profiles</h1>
            <p>A Protection Profile (PP) is a technology-specific document that defines the security functionality that must be included in a Common Criteria evaluated product to mitigate specific cyber threats. PPs can be published by a recognised CCRA scheme or by the CCRA body itself. PPs published by the CCRA body are referred to as collaborative PPs.</p>
            <p>The ACSC recognises all collaborative PPs listed on the Common Criteria website, and will consider national PPs listed on the United States’ National Information Assurance Partnership website, in addition to those listed on the ACSC’s website. Where a PP does not exist, an evaluation based on an Evaluation Assurance Level (EAL) may be accepted. Such evaluations are capped at EAL2+ as this represents the best balance between completion time and meaningful security assurance gains.</p>
            <h1>Evaluation documentation</h1>
            <p>An organisation choosing to use Common Criteria evaluated products can determine their suitability by reviewing their evaluation documentation. This includes the security target and certification report.</p>
            <p>Products that are undergoing a Common Criteria evaluation will not have published evaluation documentation. However, documentation can be obtained from the ACSC if a product is being evaluated through the AISEP. For a product that is in evaluation through a foreign scheme, the product’s vendor can be contacted directly for further information.</p>
            <h1>Further information</h1>
            <p>Further information on the <a href="#e4ef23da-2683-4356-93c4-a2412c9d52ee">High Assurance Evaluation Program</a> is available from the ACSC.</p>
            <p>Further information on the <a href="#57c58870-2ebb-4fce-b995-0c86cb64002f">AISEP</a> is available from the ACSC.</p>
            <p>Further information on Common Criteria evaluated products can be found on the Common Criteria’s <a href="#29b04eaf-5f57-4ea1-a453-8047826dccf5">Certified Products List</a>.</p>
            <p>Further information on cyber supply chain risk management can be found in the cyber supply chain risk management section of the <a href="#f37a4848-0791-4870-b316-5536c2681c28">Guidelines for Procurement and Outsourcing</a>.</p>
         </part>
         <group>
            <title>Evaluated product selection</title>
            <prop name="sort-id" value="catalog[1].group[12].group[1].group[1]"/>
            <part name="overview">
               <p>A Common Criteria evaluation is traditionally conducted at a specified EAL. However, evaluations against a PP exist outside of this scale. Notably, while products evaluated against a PP will fulfil the Common Criteria EAL requirements, the EAL number will not be published. In addition, PP modules contain additional requirements that are complementary to or extend upon collaborative PPs. For example, a stateful traffic filtering PP module for a firewall evaluated against a network device collaborative PP. Note, when procuring an evaluated product that has completed a PP-based evaluation, it is important to ensure that all applicable PP modules were included as part of the product’s evaluation.</p>
            </part>
            <control id="ism-0280" class="ISM-control">
               <title>Control: ism-0280</title>
               <prop name="sort-id"
                      value="catalog[1].group[12].group[1].group[1].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="8"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-23"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0280_smt">
                  <p>If procuring an evaluated product, a product that has completed a PP-based evaluation, including against all applicable PP modules, is selected in preference to one that has completed an EAL-based evaluation.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Delivery of evaluated products</title>
            <prop name="sort-id" value="catalog[1].group[12].group[1].group[2]"/>
            <part name="overview">
               <p>It is important that an organisation ensures that products they source are the actual products that are delivered. In the case of evaluated products, if the product delivered differs from an evaluated version then the assurance gained from the evaluation may not necessarily apply.</p>
               <p>Packaging and delivery practices can vary greatly from product to product. For most evaluated products, standard commercial packaging and delivery practices are likely to be sufficient. However, in some cases more secure packaging and delivery practices, including tamper-evident seals and secure transportation, may be required. In the case of the digital delivery of evaluated products, digital signatures or cryptographic checksums can often be used to ensure the integrity of software that was delivered.</p>
            </part>
            <control id="ism-0285" class="ISM-control">
               <title>Control: ism-0285</title>
               <prop name="sort-id"
                      value="catalog[1].group[12].group[1].group[2].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-18"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0285_smt">
                  <p>Evaluated products are delivered in a manner consistent with any delivery procedures defined in associated evaluation documentation.</p>
               </part>
            </control>
            <control id="ism-0286" class="ISM-control">
               <title>Control: ism-0286</title>
               <prop name="sort-id"
                      value="catalog[1].group[12].group[1].group[2].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="6"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-0286_smt">
                  <p>When procuring high assurance ICT equipment, the ACSC is contacted for any equipment-specific delivery procedures.</p>
               </part>
            </control>
         </group>
      </group>
      <group>
         <title>Evaluated product usage</title>
         <prop name="sort-id" value="catalog[1].group[12].group[2]"/>
         <part name="overview">
            <h1>Evaluated configuration</h1>
            <p>An evaluated product is considered to be operating in an evaluated configuration if:</p>
            <ul>
               <li>functionality that it uses was in the scope of the evaluation and it is implemented in the specified manner</li>
               <li>only product updates that have been assessed through maintenance and re-evaluation activities (known as assurance continuity) have been applied</li>
               <li>the environment complies with assumptions or organisational security policies stated in the evaluation documentation.</li>
            </ul>
            <h1>Unevaluated configuration</h1>
            <p>An evaluated product is considered to be operating in an unevaluated configuration when it does not meet the requirements of the evaluated configuration and guidance provided in its certification report.</p>
            <h1>Patching evaluated products</h1>
            <p>In the majority of cases, the latest patched version of an evaluated product will be more secure than an older unpatched version. While the application of patches will not normally place an evaluated product into an unevaluated configuration, some vendors may include new functionality which has not been evaluated with their patches. In such cases, an organisation should use their judgement to determine whether this deviation from the evaluated configuration constitutes additional security risk or not.</p>
            <h1>Further information</h1>
            <p>Further information on patching or updating ICT equipment can be found in the system patching section of the <a href="#c6ca6620-ccd5-4c5d-b97c-9d92f1162948">Guidelines for System Management</a>.</p>
            <p>Further information on the installation, configuration, administration and operation of Common Criteria products is available from vendors and can be found in evaluation documentation on the Common Criteria’s <a href="#29b04eaf-5f57-4ea1-a453-8047826dccf5">Certified Products List</a>.</p>
            <p>For information on the installation, configuration, administration and operation of high assurance ICT equipment is available from the ACSC.</p>
         </part>
         <group>
            <title>Installation and configuration of evaluated products</title>
            <prop name="sort-id" value="catalog[1].group[12].group[2].group[1]"/>
            <part name="overview">
               <p>Product evaluation provides assurance that a product’s security functionality will work as expected when operating in a clearly defined configuration. The scope of the evaluation specifies the security functionality that can be used and how a product is to be configured and operated. Using an evaluated product in an unevaluated configuration could result in the introduction of security risks that were not considered as part of the product’s evaluation.</p>
            </part>
            <control id="ism-0289" class="ISM-control">
               <title>Control: ism-0289</title>
               <prop name="sort-id"
                      value="catalog[1].group[12].group[2].group[1].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-18"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0289_smt">
                  <p>Evaluated products are installed, configured, administered and operated in accordance with vendor guidance and evaluation documentation.</p>
               </part>
            </control>
            <control id="ism-0290" class="ISM-control">
               <title>Control: ism-0290</title>
               <prop name="sort-id"
                      value="catalog[1].group[12].group[2].group[1].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="6"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-0290_smt">
                  <p>High assurance ICT equipment is installed, configured, administered and operated in accordance with guidance produced by the ACSC.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Use of high assurance ICT equipment in unevaluated configurations</title>
            <prop name="sort-id" value="catalog[1].group[12].group[2].group[2]"/>
            <part name="overview">
               <p>Given the value of data being protected by high assurance ICT equipment, it should always be operated in an evaluated configuration.</p>
            </part>
            <control id="ism-0292" class="ISM-control">
               <title>Control: ism-0292</title>
               <prop name="sort-id"
                      value="catalog[1].group[12].group[2].group[2].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="6"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-0292_smt">
                  <p>High assurance ICT equipment is always operated in an evaluated configuration.</p>
               </part>
            </control>
         </group>
      </group>
   </group>
   <group>
      <title>Guidelines for ICT Equipment</title>
      <prop name="sort-id" value="catalog[1].group[13]"/>
      <group>
         <title>ICT equipment usage</title>
         <prop name="sort-id" value="catalog[1].group[13].group[1]"/>
         <part name="overview">
            <h1>Further information</h1>
            <p>Further information on cyber supply chain risk management can be found in the cyber supply chain risk management section of the <a href="#f37a4848-0791-4870-b316-5536c2681c28">Guidelines for Procurement and Outsourcing</a>.</p>
            <p>Further information on securing ICT equipment when not in use can be found in the ICT equipment and media section of the <a href="#4deea7ea-18a2-4fd7-8b25-0b3603215df2">Guidelines for Physical Security</a>.</p>
            <p>Further information on encrypting media within ICT equipment can be found in the cryptographic fundamentals section of the <a href="#195abe87-bb1e-4006-8b42-eaecca4d51f1">Guidelines for Cryptography</a>.</p>
            <p>Further information on the protection of ICT equipment can be found in the Attorney-General’s Department’s <a href="#92679127-f61d-486a-a93e-df2a26dfb07a">Protective Security Policy Framework</a>, <a href="#6e456a92-f405-4151-88ca-5621aa23519b">Physical security for entity resources</a> policy.</p>
         </part>
         <group>
            <title>ICT equipment management policy</title>
            <prop name="sort-id" value="catalog[1].group[13].group[1].group[1]"/>
            <part name="overview">
               <p>Since ICT equipment is capable of processing, storing or communicating sensitive or classified data, it is important that an ICT equipment management policy is developed, implemented and maintained to ensure that ICT equipment, and the data it processes, stores or communicates, is protected in an appropriate manner.</p>
            </part>
            <control id="ism-1551" class="ISM-control">
               <title>Control: ism-1551</title>
               <prop name="sort-id"
                      value="catalog[1].group[13].group[1].group[1].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1551_smt">
                  <p>An ICT equipment management policy is developed, implemented and maintained.</p>
               </part>
            </control>
         </group>
         <group>
            <title>ICT equipment register</title>
            <prop name="sort-id" value="catalog[1].group[13].group[1].group[2]"/>
            <part name="overview">
               <p>Developing, implementing, maintaining and regularly verifying a register of authorised ICT equipment can assist an organisation in tracking legitimate ICT equipment as well as determining whether unauthorised ICT equipment, such as workstations, servers and network devices, have been introduced into their organisation.</p>
            </part>
            <control id="ism-0336" class="ISM-control">
               <title>Control: ism-0336</title>
               <prop name="sort-id"
                      value="catalog[1].group[13].group[1].group[2].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="7"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0336_smt">
                  <p>An ICT equipment register is developed, implemented, maintained and verified on a regular basis.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Labelling ICT equipment</title>
            <prop name="sort-id" value="catalog[1].group[13].group[1].group[3]"/>
            <part name="overview">
               <p>Applying protective markings to ICT equipment assists to reduce the likelihood that a user will accidentally input data into it that it is not approved for processing, storing or communicating.</p>
               <p>While text-based protective markings are typically used for labelling ICT equipment, there may be circumstances where colour-based protective markings or other marking schemes need to be used instead. In such cases, the marking scheme will need to be documented and personnel will need to be trained in its use.</p>
            </part>
            <control id="ism-0294" class="ISM-control">
               <title>Control: ism-0294</title>
               <prop name="sort-id"
                      value="catalog[1].group[13].group[1].group[3].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-18"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0294_smt">
                  <p>ICT equipment, with the exception of high assurance ICT equipment, is labelled with protective markings reflecting its sensitivity or classification.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Labelling high assurance ICT equipment</title>
            <prop name="sort-id" value="catalog[1].group[13].group[1].group[4]"/>
            <part name="overview">
               <p>High assurance ICT equipment often has tamper-evident seals placed on its external surfaces. To assist users in noticing changes to these seals, and to prevent functionality being degraded, an organisation should limit the use of labels on high assurance ICT equipment.</p>
            </part>
            <control id="ism-0296" class="ISM-control">
               <title>Control: ism-0296</title>
               <prop name="sort-id"
                      value="catalog[1].group[13].group[1].group[4].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="5"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-0296_smt">
                  <p>The Australian Cyber Security Centre (ACSC)’s approval is sought before applying labels to external surfaces of high assurance ICT equipment.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Classifying ICT equipment</title>
            <prop name="sort-id" value="catalog[1].group[13].group[1].group[5]"/>
            <part name="overview">
               <p>The purpose of classifying ICT equipment is to acknowledge the sensitivity or classification of data that it is approved for processing, storing or communicating.</p>
               <p>Classifying ICT equipment also assists in ensuring that the appropriate sanitisation, destruction and disposal processes are followed at the end of its life.</p>
            </part>
            <control id="ism-0293" class="ISM-control">
               <title>Control: ism-0293</title>
               <prop name="sort-id"
                      value="catalog[1].group[13].group[1].group[5].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="5"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Jun-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0293_smt">
                  <p>ICT equipment is classified based on the highest sensitivity or classification of data that it is approved for processing, storing or communicating.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Handling ICT equipment</title>
            <prop name="sort-id" value="catalog[1].group[13].group[1].group[6]"/>
            <part name="overview">
               <p>When ICT equipment displays, processes, stores or communicates sensitive or classified data, it will need to be handled as per the sensitivity or classification of that data. However, applying encryption to media within the ICT equipment may change the manner in which it needs to be handled. Any change in handling needs to be based on the original sensitivity or classification of data residing on media within the ICT equipment and the level of assurance in the cryptographic equipment or software being used to encrypt it.</p>
            </part>
            <control id="ism-1599" class="ISM-control">
               <title>Control: ism-1599</title>
               <prop name="sort-id"
                      value="catalog[1].group[13].group[1].group[6].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Aug-20"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1599_smt">
                  <p>ICT equipment is handled in a manner suitable for its sensitivity or classification.</p>
               </part>
            </control>
         </group>
      </group>
      <group>
         <title>ICT equipment maintenance and repairs</title>
         <prop name="sort-id" value="catalog[1].group[13].group[2]"/>
         <part name="overview">
            <h1>Further information</h1>
            <p>Further information on cyber supply chain risk management can be found in the cyber supply chain risk management section of the <a href="#f37a4848-0791-4870-b316-5536c2681c28">Guidelines for Procurement and Outsourcing</a>.</p>
            <p>Further information on the sanitisation of media can be found in the media sanitisation section of the <a href="#b594c9c0-b42f-4f06-b643-38023275a5c7">Guidelines for Media</a>.</p>
         </part>
         <group>
            <title>Maintenance and repairs of high assurance ICT equipment</title>
            <prop name="sort-id" value="catalog[1].group[13].group[2].group[1]"/>
            <part name="overview">
               <p>Due to the nature of high assurance ICT equipment, it is important that that ACSC’s approval is sought before any maintenance or repairs are undertaken.</p>
            </part>
            <control id="ism-1079" class="ISM-control">
               <title>Control: ism-1079</title>
               <prop name="sort-id"
                      value="catalog[1].group[13].group[2].group[1].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="5"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-1079_smt">
                  <p>The ACSC’s approval is sought before undertaking any maintenance or repairs to high assurance ICT equipment.</p>
               </part>
            </control>
         </group>
         <group>
            <title>On-site maintenance and repairs</title>
            <prop name="sort-id" value="catalog[1].group[13].group[2].group[2]"/>
            <part name="overview">
               <p>Undertaking unauthorised maintenance or repairs to ICT equipment could impact its integrity. As such, using appropriately cleared technicians to maintain and repair ICT equipment on site is considered the most secure approach. This ensures that if data is disclosed during the course of maintenance or repairs, the technicians are aware of the requirements to protect such data.</p>
               <p>An organisation choosing to use uncleared technicians to maintain or repair ICT equipment should be aware of the requirement for cleared personnel to escort uncleared technicians during maintenance or repair activities.</p>
            </part>
            <control id="ism-0305" class="ISM-control">
               <title>Control: ism-0305</title>
               <prop name="sort-id"
                      value="catalog[1].group[13].group[2].group[2].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="6"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0305_smt">
                  <p>Maintenance and repairs of ICT equipment is carried out on site by an appropriately cleared technician.</p>
               </part>
            </control>
            <control id="ism-0307" class="ISM-control">
               <title>Control: ism-0307</title>
               <prop name="sort-id"
                      value="catalog[1].group[13].group[2].group[2].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-18"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0307_smt">
                  <p>If an uncleared technician is used to undertake maintenance or repairs of ICT equipment, the ICT equipment and associated media is sanitised before maintenance or repair work is undertaken.</p>
               </part>
            </control>
            <control id="ism-0306" class="ISM-control">
               <title>Control: ism-0306</title>
               <prop name="sort-id"
                      value="catalog[1].group[13].group[2].group[2].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="5"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Jun-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0306_smt">
                  <p>If an uncleared technician is used to undertake maintenance or repairs of ICT equipment, the technician is escorted by someone who:</p>
                  <ul>
                     <li>is appropriately cleared and briefed</li>
                     <li>takes due care to ensure that data is not disclosed</li>
                     <li>takes all responsible measures to ensure the integrity of the ICT equipment</li>
                     <li>has the authority to direct the technician</li>
                     <li>is sufficiently familiar with the ICT equipment to understand the work being performed.</li>
                  </ul>
               </part>
            </control>
         </group>
         <group>
            <title>Off-site maintenance and repairs</title>
            <prop name="sort-id" value="catalog[1].group[13].group[2].group[3]"/>
            <part name="overview">
               <p>An organisation choosing to have ICT equipment maintained or repaired off site should do so at facilities approved for handling the sensitivity or classification of the ICT equipment. However, an organisation may be able to sanitise the ICT equipment prior to transport, and subsequent maintenance or repair activities, to change how it needs to be handled.</p>
            </part>
            <control id="ism-0310" class="ISM-control">
               <title>Control: ism-0310</title>
               <prop name="sort-id"
                      value="catalog[1].group[13].group[2].group[3].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="7"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0310_smt">
                  <p>ICT equipment maintained or repaired off site is done so at facilities approved for handling the sensitivity or classification of the ICT equipment.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Inspection of ICT equipment following maintenance and repairs</title>
            <prop name="sort-id" value="catalog[1].group[13].group[2].group[4]"/>
            <part name="overview">
               <p>Following the maintenance or repair of ICT equipment, it is important that the ICT equipment is inspected to ensure that it retains its approved software configuration and that no unauthorised modifications have been made by technicians.</p>
            </part>
            <control id="ism-1598" class="ISM-control">
               <title>Control: ism-1598</title>
               <prop name="sort-id"
                      value="catalog[1].group[13].group[2].group[4].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Aug-20"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1598_smt">
                  <p>Following maintenance or repair activities for ICT equipment, the ICT equipment is inspected to confirm it retains its approved software configuration and that no unauthorised modifications have taken place.</p>
               </part>
            </control>
         </group>
      </group>
      <group>
         <title>ICT equipment sanitisation and destruction</title>
         <prop name="sort-id" value="catalog[1].group[13].group[3]"/>
         <part name="overview">
            <h1>Further information</h1>
            <p>Further information on the sanitisation of media can be found in the media sanitisation section of the <a href="#b594c9c0-b42f-4f06-b643-38023275a5c7">Guidelines for Media</a>.</p>
            <p>Further information on the destruction of media can be found in the media destruction section of the <a href="#b594c9c0-b42f-4f06-b643-38023275a5c7">Guidelines for Media</a>.</p>
            <p>Further information on the sanitisation of network devices is available from vendors and can be found in evaluation documentation on the Common Criteria’s <a href="#29b04eaf-5f57-4ea1-a453-8047826dccf5">Certified Products List</a>.</p>
         </part>
         <group>
            <title>ICT equipment sanitisation processes and procedures</title>
            <prop name="sort-id" value="catalog[1].group[13].group[3].group[1]"/>
            <part name="overview">
               <p>Developing, implementing and maintaining processes and procedures for ICT equipment sanitisation will ensure that an organisation carries out ICT equipment sanitisation in an appropriate and consistent manner.</p>
            </part>
            <control id="ism-0313" class="ISM-control">
               <title>Control: ism-0313</title>
               <prop name="sort-id"
                      value="catalog[1].group[13].group[3].group[1].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="6"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0313_smt">
                  <p>ICT equipment sanitisation processes, and supporting ICT equipment sanitisation procedures, are developed, implemented and maintained.</p>
               </part>
            </control>
         </group>
         <group>
            <title>ICT equipment destruction processes and procedures</title>
            <prop name="sort-id" value="catalog[1].group[13].group[3].group[2]"/>
            <part name="overview">
               <p>Developing, implementing and maintaining processes and procedures for ICT equipment destruction will ensure that an organisation carries out ICT equipment destruction in an appropriate and consistent manner.</p>
            </part>
            <control id="ism-1741" class="ISM-control">
               <title>Control: ism-1741</title>
               <prop name="sort-id"
                      value="catalog[1].group[13].group[3].group[2].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1741_smt">
                  <p>ICT equipment destruction processes, and supporting ICT equipment destruction procedures, are developed, implemented and maintained.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Sanitising ICT equipment</title>
            <prop name="sort-id" value="catalog[1].group[13].group[3].group[3]"/>
            <part name="overview">
               <p>When sanitising ICT equipment, any media within the ICT equipment should be removed or sanitised. Once any media has been removed or sanitised, ICT equipment can be considered sanitised. However, if media cannot be removed or sanitised, the ICT equipment should be destroyed as per media destruction requirements.</p>
               <p>Media typically found in ICT equipment includes:</p>
               <ul>
                  <li>electrostatic memory devices, such as laser printer cartridges used in multifunction devices (MFDs)</li>
                  <li>non-volatile magnetic memory, such as hard disks</li>
                  <li>non-volatile semiconductor memory, such as flash cards and solid state drives</li>
                  <li>volatile memory, such as random-access memory sticks.</li>
               </ul>
            </part>
            <control id="ism-0311" class="ISM-control">
               <title>Control: ism-0311</title>
               <prop name="sort-id"
                      value="catalog[1].group[13].group[3].group[3].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="6"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0311_smt">
                  <p>ICT equipment containing media is sanitised by removing the media from the ICT equipment or by sanitising the media in situ.</p>
               </part>
            </control>
            <control id="ism-1742" class="ISM-control">
               <title>Control: ism-1742</title>
               <prop name="sort-id"
                      value="catalog[1].group[13].group[3].group[3].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1742_smt">
                  <p>ICT equipment that cannot be sanitised is destroyed.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Sanitising highly sensitive ICT equipment</title>
            <prop name="sort-id" value="catalog[1].group[13].group[3].group[4]"/>
            <part name="overview">
               <p>ICT equipment located overseas that has processed, stored or communicated Australian Eyes Only (AUSTEO) or Australian Government Access Only (AGAO) data can have more severe consequences for Australian interests if not sanitised appropriately.</p>
            </part>
            <control id="ism-1218" class="ISM-control">
               <title>Control: ism-1218</title>
               <prop name="sort-id"
                      value="catalog[1].group[13].group[3].group[4].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-1218_smt">
                  <p>ICT equipment, including associated media, that is located overseas and has processed, stored or communicated AUSTEO or AGAO data, is sanitised in situ.</p>
               </part>
            </control>
            <control id="ism-0312" class="ISM-control">
               <title>Control: ism-0312</title>
               <prop name="sort-id"
                      value="catalog[1].group[13].group[3].group[4].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="6"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-0312_smt">
                  <p>ICT equipment, including associated media, that is located overseas and has processed, stored or communicated AUSTEO or AGAO data that cannot be sanitised in situ, is returned to Australia for destruction.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Destroying high assurance ICT equipment</title>
            <prop name="sort-id" value="catalog[1].group[13].group[3].group[5]"/>
            <part name="overview">
               <p>Due to the nature of high assurance ICT equipment, and many of the protective mechanisms it employs, sanitisation alone is not sufficient prior to its disposal. As such, all high assurance ICT equipment should be destroyed prior to its disposal.</p>
            </part>
            <control id="ism-0315" class="ISM-control">
               <title>Control: ism-0315</title>
               <prop name="sort-id"
                      value="catalog[1].group[13].group[3].group[5].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="8"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-0315_smt">
                  <p>High assurance ICT equipment is destroyed prior to its disposal.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Sanitising printers and multifunction devices</title>
            <prop name="sort-id" value="catalog[1].group[13].group[3].group[6]"/>
            <part name="overview">
               <p>When sanitising printers and MFDs, the printer cartridge or MFD print drum should be sanitised in addition to the removal or sanitisation of any media. This can be achieved by printing random text with no blank areas on each colour printer cartridge or MFD print drum. In addition, image transfer rollers and platens can become imprinted with text and images over time and should be destroyed if any text or images have been retained. Finally, any paper jammed in the paper path should be removed.</p>
               <p>When printer cartridges and MFD print drums cannot be sanitised due to a hardware failure, or when they are empty, there is no other option available but to destroy them. Printer ribbons cannot be sanitised and should be destroyed.</p>
            </part>
            <control id="ism-0317" class="ISM-control">
               <title>Control: ism-0317</title>
               <prop name="sort-id"
                      value="catalog[1].group[13].group[3].group[6].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-18"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0317_smt">
                  <p>At least three pages of random text with no blank areas are printed on each colour printer cartridge or MFD print drum.</p>
               </part>
            </control>
            <control id="ism-1219" class="ISM-control">
               <title>Control: ism-1219</title>
               <prop name="sort-id"
                      value="catalog[1].group[13].group[3].group[6].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1219_smt">
                  <p>MFD print drums and image transfer rollers are inspected and destroyed if there is remnant toner which cannot be removed or a print is visible on the image transfer roller.</p>
               </part>
            </control>
            <control id="ism-1220" class="ISM-control">
               <title>Control: ism-1220</title>
               <prop name="sort-id"
                      value="catalog[1].group[13].group[3].group[6].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1220_smt">
                  <p>Printer and MFD platens are inspected and destroyed if any text or images are retained on the platen.</p>
               </part>
            </control>
            <control id="ism-1221" class="ISM-control">
               <title>Control: ism-1221</title>
               <prop name="sort-id"
                      value="catalog[1].group[13].group[3].group[6].control[4]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-18"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1221_smt">
                  <p>Printers and MFDs are checked to ensure no pages are trapped in the paper path due to a paper jam.</p>
               </part>
            </control>
            <control id="ism-0318" class="ISM-control">
               <title>Control: ism-0318</title>
               <prop name="sort-id"
                      value="catalog[1].group[13].group[3].group[6].control[5]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-18"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0318_smt">
                  <p>When unable to sanitise printer cartridges or MFD print drums, they are destroyed as per electrostatic memory devices.</p>
               </part>
            </control>
            <control id="ism-1534" class="ISM-control">
               <title>Control: ism-1534</title>
               <prop name="sort-id"
                      value="catalog[1].group[13].group[3].group[6].control[6]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-18"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1534_smt">
                  <p>Printer ribbons in printers and MFDs are removed and destroyed.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Sanitising televisions and computer monitors</title>
            <prop name="sort-id" value="catalog[1].group[13].group[3].group[7]"/>
            <part name="overview">
               <p>All types of televisions and computer monitors are capable of retaining data if mitigating measures are not taken during their lifetime. Cathode Ray Tube monitors and plasma screens can be affected by burn-in while Liquid Crystal Display and Organic Light Emitting Diode screens can be affected by image persistence.</p>
               <p>Televisions and computer monitors can be visually inspected by turning up the brightness and contrast to their maximum level to determine if any data has been burnt into or persists on the screen. If burn-in or image persistence is removed by this activity, televisions and computer monitors can be considered sanitised. However, if burn-in or persistence is not removed through these measures, televisions and computer monitors cannot be sanitised and should be destroyed.</p>
               <p>If televisions or computer monitors cannot be powered on, such as due to a faulty power supply, they cannot be sanitised and should be destroyed.</p>
            </part>
            <control id="ism-1076" class="ISM-control">
               <title>Control: ism-1076</title>
               <prop name="sort-id"
                      value="catalog[1].group[13].group[3].group[7].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-18"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1076_smt">
                  <p>Televisions and computer monitors with minor burn-in or image persistence are sanitised by displaying a solid white image on the screen for an extended period of time.</p>
               </part>
            </control>
            <control id="ism-1222" class="ISM-control">
               <title>Control: ism-1222</title>
               <prop name="sort-id"
                      value="catalog[1].group[13].group[3].group[7].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-18"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1222_smt">
                  <p>Televisions and computer monitors that cannot be sanitised are destroyed.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Sanitising network devices</title>
            <prop name="sort-id" value="catalog[1].group[13].group[3].group[8]"/>
            <part name="overview">
               <p>As network devices can store network configuration data or credentials in their memory, the memory should be sanitised prior to the disposal of the network devices. The correct method to sanitise network devices will depend on their configuration and the type of memory they use. As such, device-specific guidance provided in evaluation documentation, or vendor sanitisation guidance, should be consulted to determine the most appropriate method to sanitise memory in network devices.</p>
            </part>
            <control id="ism-1223" class="ISM-control">
               <title>Control: ism-1223</title>
               <prop name="sort-id"
                      value="catalog[1].group[13].group[3].group[8].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="6"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1223_smt">
                  <p>Memory in network devices is sanitised using the following processes, in order of preference:</p>
                  <ul>
                     <li>following device-specific guidance provided in evaluation documentation</li>
                     <li>following vendor sanitisation guidance</li>
                     <li>loading a dummy configuration file, performing a factory reset and then reinstalling firmware.</li>
                  </ul>
               </part>
            </control>
         </group>
         <group>
            <title>Sanitising fax machines</title>
            <prop name="sort-id" value="catalog[1].group[13].group[3].group[9]"/>
            <part name="overview">
               <p>As fax machines can store pages that are ready for transmission in their memory, the memory should be sanitised prior to the disposal of the fax machines. This can be achieved by removing the paper tray, transmitting a fax message with a minimum length of four pages, then re-installing the paper tray and allowing a fax summary page to be printed. In addition, any paper that becomes trapped in the paper path should be removed prior to disposal.</p>
            </part>
            <control id="ism-1225" class="ISM-control">
               <title>Control: ism-1225</title>
               <prop name="sort-id"
                      value="catalog[1].group[13].group[3].group[9].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-18"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1225_smt">
                  <p>The paper tray of the fax machine is removed, and a fax message with a minimum length of four pages is transmitted, before the paper tray is re-installed to allow a fax summary page to be printed.</p>
               </part>
            </control>
            <control id="ism-1226" class="ISM-control">
               <title>Control: ism-1226</title>
               <prop name="sort-id"
                      value="catalog[1].group[13].group[3].group[9].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-18"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1226_smt">
                  <p>Fax machines are checked to ensure no pages are trapped in the paper path due to a paper jam.</p>
               </part>
            </control>
         </group>
      </group>
      <group>
         <title>ICT equipment disposal</title>
         <prop name="sort-id" value="catalog[1].group[13].group[4]"/>
         <group>
            <title>ICT equipment disposal processes and procedures</title>
            <prop name="sort-id" value="catalog[1].group[13].group[4].group[1]"/>
            <part name="overview">
               <p>Developing, implementing and maintaining processes and procedures for ICT equipment disposal will ensure that an organisation carries out ICT equipment disposal in an appropriate and consistent manner.</p>
            </part>
            <control id="ism-1550" class="ISM-control">
               <title>Control: ism-1550</title>
               <prop name="sort-id"
                      value="catalog[1].group[13].group[4].group[1].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1550_smt">
                  <p>ICT equipment disposal processes, and supporting ICT equipment disposal procedures, are developed, implemented and maintained.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Disposal of ICT equipment</title>
            <prop name="sort-id" value="catalog[1].group[13].group[4].group[2]"/>
            <part name="overview">
               <p>Before ICT equipment can be released into the public domain, it needs to be sanitised, destroyed or declassified. As sanitised, destroyed or declassified ICT equipment still presents a security risk, albeit very minor, an appropriate authority needs to formally authorise its release into the public domain. Furthermore, as part of disposal processes, removing labels and markings indicating the owner, sensitivity, classification or any other marking that can associate ICT equipment with its prior use will ensure it does not draw undue attention following its disposal.</p>
            </part>
            <control id="ism-1217" class="ISM-control">
               <title>Control: ism-1217</title>
               <prop name="sort-id"
                      value="catalog[1].group[13].group[4].group[2].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1217_smt">
                  <p>Labels and markings indicating the owner, sensitivity, classification or any other marking that can associate ICT equipment with its prior use are removed prior to its disposal.</p>
               </part>
            </control>
            <control id="ism-0321" class="ISM-control">
               <title>Control: ism-0321</title>
               <prop name="sort-id"
                      value="catalog[1].group[13].group[4].group[2].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-0321_smt">
                  <p>When disposing of ICT equipment that has been designed or modified to meet emanation security standards, the ACSC is contacted for requirements relating to its disposal.</p>
               </part>
            </control>
            <control id="ism-0316" class="ISM-control">
               <title>Control: ism-0316</title>
               <prop name="sort-id"
                      value="catalog[1].group[13].group[4].group[2].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0316_smt">
                  <p>Following sanitisation, destruction or declassification, a formal administrative decision is made to release ICT equipment, or its waste, into the public domain.</p>
               </part>
            </control>
         </group>
      </group>
   </group>
   <group>
      <title>Guidelines for Media</title>
      <prop name="sort-id" value="catalog[1].group[14]"/>
      <group>
         <title>Media usage</title>
         <prop name="sort-id" value="catalog[1].group[14].group[1]"/>
         <part name="overview">
            <h1>Further information</h1>
            <p>Further information on cyber supply chain risk management can be found in the cyber supply chain risk management section of the <a href="#f37a4848-0791-4870-b316-5536c2681c28">Guidelines for Procurement and Outsourcing</a>.</p>
            <p>Further information on the protection of media can be found in the Attorney-General’s Department’s <a href="#92679127-f61d-486a-a93e-df2a26dfb07a">Protective Security Policy Framework</a>, <a href="#6e456a92-f405-4151-88ca-5621aa23519b">Physical security for entity resources</a> policy.</p>
            <p>Further information on securing media when not in use can be found in the ICT equipment and media section of the <a href="#4deea7ea-18a2-4fd7-8b25-0b3603215df2">Guidelines for Physical Security</a>.</p>
            <p>Further information on encrypting media can be found in the cryptographic fundamentals section of the <a href="#195abe87-bb1e-4006-8b42-eaecca4d51f1">Guidelines for Cryptography</a>.</p>
            <p>Further information on using media to transfer data between systems can be found in the data transfers section of the <a href="#1eefdaf7-3991-4ba2-9439-79565f508c44">Guidelines for Data Transfers</a>.</p>
         </part>
         <group>
            <title>Media management policy</title>
            <prop name="sort-id" value="catalog[1].group[14].group[1].group[1]"/>
            <part name="overview">
               <p>Since media is capable of storing sensitive or classified data, it is important that a media management policy is developed, implemented and maintained to ensure that all types of media, and the data it stores, is protected in an appropriate manner. In many cases, an organisation’s media management policy will be closely tied to their removable media usage policy.</p>
            </part>
            <control id="ism-1549" class="ISM-control">
               <title>Control: ism-1549</title>
               <prop name="sort-id"
                      value="catalog[1].group[14].group[1].group[1].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1549_smt">
                  <p>A media management policy is developed, implemented and maintained.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Removable media usage policy</title>
            <prop name="sort-id" value="catalog[1].group[14].group[1].group[2]"/>
            <part name="overview">
               <p>Establishing a removable media usage policy can decrease the likelihood and consequence of data spills, data loss and data theft. In doing so, a removable media usage policy will likely cover the following:</p>
               <ul>
                  <li>permitted types and uses of removable media</li>
                  <li>registration and labelling of removable media</li>
                  <li>handling and protection of removable media</li>
                  <li>reporting of lost or stolen removable media</li>
                  <li>sanitisation or destruction of removable media at the end of its life.</li>
               </ul>
            </part>
            <control id="ism-1359" class="ISM-control">
               <title>Control: ism-1359</title>
               <prop name="sort-id"
                      value="catalog[1].group[14].group[1].group[2].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1359_smt">
                  <p>A removable media usage policy is developed, implemented and maintained.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Removable media register</title>
            <prop name="sort-id" value="catalog[1].group[14].group[1].group[3]"/>
            <part name="overview">
               <p>Developing, implementing, maintaining and regularly verifying a register of removable media can assist an organisation in tracking and accounting for authorised removable media as well as identifying any non-authorised removal media in use within their organisation.</p>
            </part>
            <control id="ism-1713" class="ISM-control">
               <title>Control: ism-1713</title>
               <prop name="sort-id"
                      value="catalog[1].group[14].group[1].group[3].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1713_smt">
                  <p>A removable media register is developed, implemented, maintained and verified on a regular basis.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Labelling media</title>
            <prop name="sort-id" value="catalog[1].group[14].group[1].group[4]"/>
            <part name="overview">
               <p>Labelling media helps personnel to identify its sensitivity or classification and ensure that appropriate measures are applied to its storage, handling and use.</p>
               <p>While text-based protective markings are typically used for labelling media, there may be circumstances where colour-based protective markings or other marking schemes need to be used instead. In such cases, the marking scheme will need to be documented and personnel will need to be trained in its use.</p>
            </part>
            <control id="ism-0332" class="ISM-control">
               <title>Control: ism-0332</title>
               <prop name="sort-id"
                      value="catalog[1].group[14].group[1].group[4].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-18"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0332_smt">
                  <p>Media, with the exception of internally mounted fixed media within ICT equipment, is labelled with protective markings reflecting its sensitivity or classification.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Classifying media</title>
            <prop name="sort-id" value="catalog[1].group[14].group[1].group[5]"/>
            <part name="overview">
               <p>Media that is not correctly classified could be stored and handled inappropriately, accessed by personnel who do not have an appropriate security clearance or used with systems it is not authorised to be used with.</p>
            </part>
            <control id="ism-0323" class="ISM-control">
               <title>Control: ism-0323</title>
               <prop name="sort-id"
                      value="catalog[1].group[14].group[1].group[5].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="8"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0323_smt">
                  <p>Media is classified to the highest sensitivity or classification of data it stores, unless the media has been classified to a higher sensitivity or classification.</p>
               </part>
            </control>
            <control id="ism-0337" class="ISM-control">
               <title>Control: ism-0337</title>
               <prop name="sort-id"
                      value="catalog[1].group[14].group[1].group[5].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="6"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0337_smt">
                  <p>Media is only used with systems that are authorised to process, store or communicate its sensitivity or classification.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Reclassifying media</title>
            <prop name="sort-id" value="catalog[1].group[14].group[1].group[6]"/>
            <part name="overview">
               <p>Some activities may necessitate or allow for a change to the sensitivity or classification of media. For example, when media is connected to a system that lacks a mechanism through which read-only access can be ensured, when media is sanitised or destroyed, or when data stored on media is subject to a sensitivity or classification change.</p>
            </part>
            <control id="ism-0325" class="ISM-control">
               <title>Control: ism-0325</title>
               <prop name="sort-id"
                      value="catalog[1].group[14].group[1].group[6].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="6"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Apr-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0325_smt">
                  <p>Any media connected to a system with a higher sensitivity or classification than the media is reclassified to the higher sensitivity or classification, unless the media is read-only or the system has a mechanism through which read-only access can be ensured.</p>
               </part>
            </control>
            <control id="ism-0330" class="ISM-control">
               <title>Control: ism-0330</title>
               <prop name="sort-id"
                      value="catalog[1].group[14].group[1].group[6].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="7"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0330_smt">
                  <p>Before reclassifying media to a lower sensitivity or classification, the media is sanitised or destroyed, and a formal administrative decision is made to reclassify it.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Handling media</title>
            <prop name="sort-id" value="catalog[1].group[14].group[1].group[7]"/>
            <part name="overview">
               <p>As media can be easily misplaced or stolen, measures should be put in place to protect data stored on it. In some cases, applying encryption to media may change the manner in which it needs to be handled. Any change in handling needs to be based on the original sensitivity or classification of the media and the level of assurance in the cryptographic equipment or software being used to encrypt it.</p>
            </part>
            <control id="ism-0831" class="ISM-control">
               <title>Control: ism-0831</title>
               <prop name="sort-id"
                      value="catalog[1].group[14].group[1].group[7].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="5"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-18"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0831_smt">
                  <p>Media is handled in a manner suitable for its sensitivity or classification.</p>
               </part>
            </control>
            <control id="ism-1059" class="ISM-control">
               <title>Control: ism-1059</title>
               <prop name="sort-id"
                      value="catalog[1].group[14].group[1].group[7].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1059_smt">
                  <p>All data stored on media is encrypted.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Sanitising media before first use</title>
            <prop name="sort-id" value="catalog[1].group[14].group[1].group[8]"/>
            <part name="overview">
               <p>Sanitising media before first use can assist in reducing cyber supply chain risks, such as new media containing malicious code. In addition, sanitising media before first use in a different security domain can prevent potential data spills from occurring.</p>
            </part>
            <control id="ism-1600" class="ISM-control">
               <title>Control: ism-1600</title>
               <prop name="sort-id"
                      value="catalog[1].group[14].group[1].group[8].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Apr-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1600_smt">
                  <p>Media is sanitised before it is used for the first time.</p>
               </part>
            </control>
            <control id="ism-1642" class="ISM-control">
               <title>Control: ism-1642</title>
               <prop name="sort-id"
                      value="catalog[1].group[14].group[1].group[8].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Apr-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1642_smt">
                  <p>Media is sanitised before it is reused in a different security domain.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Using media for data transfers</title>
            <prop name="sort-id" value="catalog[1].group[14].group[1].group[9]"/>
            <part name="overview">
               <p>An organisation transferring data between systems belonging to different security domains is strongly encouraged to use write-once media. When done properly, such as using non-rewritable compact discs that have been finalised, this will ensure that data from the destination system cannot be accidently transferred, or maliciously exfiltrated, onto the media used for the data transfer and then onto another system, such as the original source system. Alternatively, if suitable write-once media is not used, the destination system should have a mechanism through which read-only access can be ensured, such as via a read-only device or hardware write-blocker. However, the use of read-only mechanisms is not immune to failure or compromise, therefore, rewritable media should still be sanitised following each data transfer.</p>
               <p>It is important to note that for most non-volatile flash memory media, it will be possible to sanitise and reclassify it following a data transfer in order to allow it to be connected to other systems again. This is not possible for SECRET and TOP SECRET non-volatile flash memory media as it cannot be reclassified following sanitisation.</p>
            </part>
            <control id="ism-0347" class="ISM-control">
               <title>Control: ism-0347</title>
               <prop name="sort-id"
                      value="catalog[1].group[14].group[1].group[9].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="5"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Apr-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0347_smt">
                  <p>When transferring data manually between two systems belonging to different security domains, write-once media is used unless the destination system has a mechanism through which read-only access can be ensured.</p>
               </part>
            </control>
            <control id="ism-0947" class="ISM-control">
               <title>Control: ism-0947</title>
               <prop name="sort-id"
                      value="catalog[1].group[14].group[1].group[9].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="6"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Apr-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0947_smt">
                  <p>When transferring data manually between two systems belonging to different security domains, rewritable media is sanitised after each data transfer.</p>
               </part>
            </control>
         </group>
      </group>
      <group>
         <title>Media sanitisation</title>
         <prop name="sort-id" value="catalog[1].group[14].group[2]"/>
         <part name="overview">
            <h1>Hybrid hard drives</h1>
            <p>When sanitising hybrid hard drives, separate the non-volatile magnetic media from the circuit board containing non-volatile flash memory media and sanitise each separately.</p>
            <h1>Solid state drives</h1>
            <p>When sanitising solid state drives, the method for sanitising non-volatile flash memory media applies.</p>
            <h1>Further information</h1>
            <p>Further information on recoverability of data from volatile media can be found in the <a href="#eb0009ec-5481-41cd-91e3-aee354042712">Data Remanence in Semiconductor Devices</a> paper.</p>
            <p>Further information on the random-access memory testing tool <a href="#629818d8-430c-4125-8fd2-5e3f988fce21">MemTest86</a> can be obtained from PassMark Software.</p>
            <p>Further information on the graphics card random-access memory testing tools <a href="#39e186f3-d175-4eed-afe6-2b9a7a936a91">MemtestG80</a> and <a href="#9d38f42d-eeff-4124-93db-4b29abaafb67">MemtestCL</a> can be obtained from their GitHub projects.</p>
            <p>Further information on HDDerase is available from the <a href="#401ed034-e2bd-43b4-9fde-05d07618039a">Center for Memory and Recording Research</a> at the University of California San Diego. HDDerase is capable of calling the ATA secure erase command as well as resetting the host-protected area and device configuration overlay table on non-volatile magnetic media.</p>
            <p>Further information on reliably erasing data from solid state drives can be found in the <a href="#0c912487-72f0-4532-ba68-705590a63258">Reliably Erasing Data From Flash-Based Solid State Drives</a> paper.</p>
         </part>
         <group>
            <title>Media sanitisation processes and procedures</title>
            <prop name="sort-id" value="catalog[1].group[14].group[2].group[01]"/>
            <part name="overview">
               <p>Using approved methods to sanitise media provides a level of assurance that, to the extent possible, no data will be left following sanitisation. The methods described in these guidelines are designed not only to prevent common data recovery practices but also to protect from those that could emerge in the future.</p>
            </part>
            <control id="ism-0348" class="ISM-control">
               <title>Control: ism-0348</title>
               <prop name="sort-id"
                      value="catalog[1].group[14].group[2].group[01].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="5"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0348_smt">
                  <p>Media sanitisation processes, and supporting media sanitisation procedures, are developed, implemented and maintained.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Volatile media sanitisation</title>
            <prop name="sort-id" value="catalog[1].group[14].group[2].group[02]"/>
            <part name="overview">
               <p>When sanitising volatile media, the specified time to wait following the removal of power is based on applying a safety factor to the time recommended by research into preventing the recovery of data. If read back cannot be achieved following the overwriting of volatile media, or data persists, it will need to be destroyed.</p>
            </part>
            <control id="ism-0351" class="ISM-control">
               <title>Control: ism-0351</title>
               <prop name="sort-id"
                      value="catalog[1].group[14].group[2].group[02].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="6"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0351_smt">
                  <p>Volatile media is sanitised by removing its power for at least 10 minutes.</p>
               </part>
            </control>
            <control id="ism-0352" class="ISM-control">
               <title>Control: ism-0352</title>
               <prop name="sort-id"
                      value="catalog[1].group[14].group[2].group[02].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-0352_smt">
                  <p>SECRET and TOP SECRET volatile media is sanitised by overwriting it at least once in its entirety with a random pattern followed by a read back for verification.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Treatment of volatile media following sanitisation</title>
            <prop name="sort-id" value="catalog[1].group[14].group[2].group[03]"/>
            <part name="overview">
               <p>Research suggests that short-term remanence effects are likely in volatile media. For example, up to minutes at normal room temperatures and up to hours in extremely cold temperatures. Furthermore, some volatile media can suffer from long-term remanence effects resulting from physical changes due to the continuous storage of static data for extended periods of time. It is for these reasons that under certain circumstances TOP SECRET volatile media retains its classification following sanitisation.</p>
               <p>Typical circumstances preventing the reclassification of TOP SECRET volatile media include a static cryptographic key being stored in the same memory location during every boot of a device, or a static image being displayed on a device and stored in volatile media for a period of months.</p>
            </part>
            <control id="ism-0835" class="ISM-control">
               <title>Control: ism-0835</title>
               <prop name="sort-id"
                      value="catalog[1].group[14].group[2].group[03].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-0835_smt">
                  <p>Following sanitisation, TOP SECRET volatile media retains its classification if it stored static data for an extended period of time, or had data repeatedly stored on or written to the same memory location for an extended period of time.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Non-volatile magnetic media sanitisation</title>
            <prop name="sort-id" value="catalog[1].group[14].group[2].group[04]"/>
            <part name="overview">
               <p>Non-volatile magnetic media encompasses non-volatile magnetic hard drives, tape drives and floppy disks. While non-volatile magnetic tape drives and floppy disks can be sanitised by overwriting them at least once (or three times if pre-2001 or under 15 GB) in their entirety with a random pattern followed by a read back for verification, additional considerations apply to non-volatile magnetic hard drives due to their use of a host-protected area, device configuration overlay table and growth defects table.</p>
               <p>Both the host-protected area and device configuration overlay table of non-volatile magnetic hard drives are normally not visible to a computer’s Unified Extensible Firmware Interface or operating system. Therefore, any sanitisation of the readable sectors of non-volatile magnetic hard drives will leave any data contained in sectors listed in the host-protected area and device configuration overlay table untouched. Some sanitisation programs include the ability to reset non-volatile magnetic hard drives to their default state, thereby removing any host-protected areas or device configuration overlays. This allows the sanitisation program to see the entire contents of non-volatile magnetic hard drives during subsequent sanitisation processes.</p>
               <p>Modern non-volatile magnetic hard drives automatically reallocate space for bad sectors at a hardware level. These bad sectors are maintained in what is known as the growth defects table or ‘g-list’. If data was stored in a sector that was subsequently added to the growth defects table, sanitising the non-volatile magnetic hard drive will not overwrite such data. While these sectors may be considered bad by non-volatile magnetic hard drives, quite often this is due to the sectors no longer meeting expected performance norms and not due to an inability to read or write to them. The Advanced Technology Attachment (ATA) secure erase command was built into the firmware of post-2001 non-volatile magnetic hard drives and is able to access sectors that have been added to the growth defects table.</p>
               <p>Modern non-volatile magnetic hard drives also contain a primary defects table or ‘p-list’. The primary defects table contains a list of bad sectors found during post-production processes. No data is ever stored in sectors listed in the primary defects table as they are marked as inaccessible before non-volatile magnetic hard drives are used for the first time.</p>
            </part>
            <control id="ism-0354" class="ISM-control">
               <title>Control: ism-0354</title>
               <prop name="sort-id"
                      value="catalog[1].group[14].group[2].group[04].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="6"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0354_smt">
                  <p>Non-volatile magnetic media is sanitised by overwriting it at least once (or three times if pre-2001 or under 15 GB) in its entirety with a random pattern followed by a read back for verification.</p>
               </part>
            </control>
            <control id="ism-1065" class="ISM-control">
               <title>Control: ism-1065</title>
               <prop name="sort-id"
                      value="catalog[1].group[14].group[2].group[04].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1065_smt">
                  <p>The host-protected area and device configuration overlay table are reset prior to the sanitisation of non-volatile magnetic hard drives.</p>
               </part>
            </control>
            <control id="ism-1067" class="ISM-control">
               <title>Control: ism-1067</title>
               <prop name="sort-id"
                      value="catalog[1].group[14].group[2].group[04].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1067_smt">
                  <p>The ATA secure erase command is used, in addition to block overwriting software, to ensure the growth defects table of non-volatile magnetic hard drives is overwritten.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Treatment of non-volatile magnetic media following sanitisation</title>
            <prop name="sort-id" value="catalog[1].group[14].group[2].group[05]"/>
            <part name="overview">
               <p>Due to concerns with the sanitisation processes for non-volatile magnetic media, SECRET and TOP SECRET non-volatile magnetic media retains its classification following sanitisation.</p>
            </part>
            <control id="ism-0356" class="ISM-control">
               <title>Control: ism-0356</title>
               <prop name="sort-id"
                      value="catalog[1].group[14].group[2].group[05].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="6"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-0356_smt">
                  <p>Following sanitisation, SECRET and TOP SECRET non-volatile magnetic media retains its classification.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Non-volatile erasable programmable read-only memory media sanitisation</title>
            <prop name="sort-id" value="catalog[1].group[14].group[2].group[06]"/>
            <part name="overview">
               <p>When sanitising non-volatile erasable programmable read-only memory (EPROM), three times the manufacturer’s specification for ultraviolet erasure time should be applied to provide additional certainty in sanitisation processes.</p>
            </part>
            <control id="ism-0357" class="ISM-control">
               <title>Control: ism-0357</title>
               <prop name="sort-id"
                      value="catalog[1].group[14].group[2].group[06].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="5"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0357_smt">
                  <p>Non-volatile EPROM media is sanitised by applying three times the manufacturer’s specified ultraviolet erasure time and then overwriting it at least once in its entirety with a random pattern followed by a read back for verification.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Non-volatile electrically erasable programmable read-only memory media sanitisation</title>
            <prop name="sort-id" value="catalog[1].group[14].group[2].group[07]"/>
            <part name="overview">
               <p>A single overwrite with a random pattern is considered suitable for sanitising non-volatile electrically erasable programmable read-only memory (EEPROM) media.</p>
            </part>
            <control id="ism-0836" class="ISM-control">
               <title>Control: ism-0836</title>
               <prop name="sort-id"
                      value="catalog[1].group[14].group[2].group[07].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0836_smt">
                  <p>Non-volatile EEPROM media is sanitised by overwriting it at least once in its entirety with a random pattern followed by a read back for verification.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Treatment of non-volatile erasable and electrically erasable programmable read-only memory media following sanitisation</title>
            <prop name="sort-id" value="catalog[1].group[14].group[2].group[08]"/>
            <part name="overview">
               <p>As little research has been conducted into the recovery of data from non-volatile EPROM and EEPROM media, SECRET and TOP SECRET EPROM and EEPROM media retains its classification following sanitisation.</p>
            </part>
            <control id="ism-0358" class="ISM-control">
               <title>Control: ism-0358</title>
               <prop name="sort-id"
                      value="catalog[1].group[14].group[2].group[08].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="6"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-0358_smt">
                  <p>Following sanitisation, SECRET and TOP SECRET non-volatile EPROM and EEPROM media retains its classification.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Non-volatile flash memory media sanitisation</title>
            <prop name="sort-id" value="catalog[1].group[14].group[2].group[09]"/>
            <part name="overview">
               <p>For non-volatile flash memory media, a technique known as wear levelling ensures that writes are distributed evenly across each memory block. This feature necessitates non-volatile flash memory media being overwritten with a random pattern twice as this helps to ensure that all memory blocks are overwritten.</p>
            </part>
            <control id="ism-0359" class="ISM-control">
               <title>Control: ism-0359</title>
               <prop name="sort-id"
                      value="catalog[1].group[14].group[2].group[09].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0359_smt">
                  <p>Non-volatile flash memory media is sanitised by overwriting it at least twice in its entirety with a random pattern followed by a read back for verification.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Treatment of non-volatile flash memory media following sanitisation</title>
            <prop name="sort-id" value="catalog[1].group[14].group[2].group[10]"/>
            <part name="overview">
               <p>Due to the use of wear levelling in non-volatile flash memory media, and the potentially for bad memory blocks, it is possible that not all memory blocks will be overwritten during sanitisation processes. For this reason, SECRET and TOP SECRET non-volatile flash memory media retains its classification following sanitisation.</p>
            </part>
            <control id="ism-0360" class="ISM-control">
               <title>Control: ism-0360</title>
               <prop name="sort-id"
                      value="catalog[1].group[14].group[2].group[10].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="6"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-0360_smt">
                  <p>Following sanitisation, SECRET and TOP SECRET non-volatile flash memory media retains its classification.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Media that cannot be successfully sanitised</title>
            <prop name="sort-id" value="catalog[1].group[14].group[2].group[11]"/>
            <part name="overview">
               <p>In some cases, sanitisation processes will be unsuccessful due to faulty or damaged media. In such cases, the faulty or damage media will need to be destroyed prior to its disposal.</p>
            </part>
            <control id="ism-1735" class="ISM-control">
               <title>Control: ism-1735</title>
               <prop name="sort-id"
                      value="catalog[1].group[14].group[2].group[11].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1735_smt">
                  <p>Faulty or damaged media that cannot be successfully sanitised is destroyed prior to its disposal.</p>
               </part>
            </control>
         </group>
      </group>
      <group>
         <title>Media destruction</title>
         <prop name="sort-id" value="catalog[1].group[14].group[3]"/>
         <part name="overview">
            <h1>Further information</h1>
            <p>Further information on cyber supply chain risk management can be found in the cyber supply chain risk management section of the <a href="#f37a4848-0791-4870-b316-5536c2681c28">Guidelines for Procurement and Outsourcing</a>.</p>
         </part>
         <group>
            <title>Media destruction processes and procedures</title>
            <prop name="sort-id" value="catalog[1].group[14].group[3].group[1]"/>
            <part name="overview">
               <p>Developing, implementing and maintaining processes and procedures for media destruction will ensure that an organisation carries out media destruction in an appropriate and consistent manner.</p>
            </part>
            <control id="ism-0363" class="ISM-control">
               <title>Control: ism-0363</title>
               <prop name="sort-id"
                      value="catalog[1].group[14].group[3].group[1].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0363_smt">
                  <p>Media destruction processes, and supporting media destruction procedures, are developed, implemented and maintained.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Media that cannot be sanitised</title>
            <prop name="sort-id" value="catalog[1].group[14].group[3].group[2]"/>
            <part name="overview">
               <p>Some media types are incapable of being sanitised. As such, they will need to be destroyed prior to their disposal.</p>
            </part>
            <control id="ism-0350" class="ISM-control">
               <title>Control: ism-0350</title>
               <prop name="sort-id"
                      value="catalog[1].group[14].group[3].group[2].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="5"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0350_smt">
                  <p>The following media types are destroyed prior to their disposal:</p>
                  <ul>
                     <li>microfiche and microfilm</li>
                     <li>optical discs</li>
                     <li>programmable read-only memory</li>
                     <li>read-only memory</li>
                     <li>other types of media that cannot be sanitised.</li>
                  </ul>
               </part>
            </control>
         </group>
         <group>
            <title>Media destruction equipment</title>
            <prop name="sort-id" value="catalog[1].group[14].group[3].group[3]"/>
            <part name="overview">
               <p>When physically destroying media, using approved equipment can provide a level of assurance that the data it stores is actually destroyed.</p>
               <p>Approved equipment includes destruction equipment listed on the Security Construction and Equipment Committee’s <a href="#f7e13f7b-eb48-4294-bd01-9c22c756d96b">Security Equipment Evaluated Products List</a>, and in the Australian Security Intelligence Organisation (ASIO)’s Security Equipment Guide-009, Optical Media Shredders and Security Equipment Guide-018, Destructors. ASIO’s Security Equipment Guides are available from the Protective Security Policy GovTEAMS community or ASIO by email.</p>
               <p>If using degaussers to destroy media, the United States’ National Security Agency maintains the <a href="#b0a56885-8484-42d6-af79-4c87237ede30">NSA/CSS Evaluated Products List for Magnetic Degaussers</a> and information on common types of magnetic media and their associated magnetic field strengths and orientations.</p>
            </part>
            <control id="ism-1361" class="ISM-control">
               <title>Control: ism-1361</title>
               <prop name="sort-id"
                      value="catalog[1].group[14].group[3].group[3].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Jun-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1361_smt">
                  <p>Security Construction and Equipment Committee-approved equipment or ASIO-approved equipment is used when destroying media.</p>
               </part>
            </control>
            <control id="ism-1160" class="ISM-control">
               <title>Control: ism-1160</title>
               <prop name="sort-id"
                      value="catalog[1].group[14].group[3].group[3].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Aug-20"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1160_smt">
                  <p>If using degaussers to destroy media, degaussers evaluated by the United States’ National Security Agency are used.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Media destruction methods</title>
            <prop name="sort-id" value="catalog[1].group[14].group[3].group[4]"/>
            <part name="overview">
               <p>The destruction methods identified below are designed to ensure that recovery of data is impossible or impractical.</p>
            </part>
            <control id="ism-1517" class="ISM-control">
               <title>Control: ism-1517</title>
               <prop name="sort-id"
                      value="catalog[1].group[14].group[3].group[4].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-18"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1517_smt">
                  <p>Equipment that is capable of reducing microform to a fine powder, with resultant particles not showing more than five consecutive characters per particle upon microscopic inspection, is used to destroy microfiche and microfilm.</p>
               </part>
            </control>
            <control id="ism-1722" class="ISM-control">
               <title>Control: ism-1722</title>
               <prop name="sort-id"
                      value="catalog[1].group[14].group[3].group[4].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1722_smt">
                  <p>Electrostatic memory devices are destroyed using a furnace/incinerator, hammer mill, disintegrator or grinder/sander.</p>
               </part>
            </control>
            <control id="ism-1723" class="ISM-control">
               <title>Control: ism-1723</title>
               <prop name="sort-id"
                      value="catalog[1].group[14].group[3].group[4].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1723_smt">
                  <p>Magnetic floppy disks are destroyed using a furnace/incinerator, hammer mill, disintegrator, degausser or by cutting.</p>
               </part>
            </control>
            <control id="ism-1724" class="ISM-control">
               <title>Control: ism-1724</title>
               <prop name="sort-id"
                      value="catalog[1].group[14].group[3].group[4].control[4]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1724_smt">
                  <p>Magnetic hard disks are destroyed using a furnace/incinerator, hammer mill, disintegrator, grinder/sander or degausser.</p>
               </part>
            </control>
            <control id="ism-1725" class="ISM-control">
               <title>Control: ism-1725</title>
               <prop name="sort-id"
                      value="catalog[1].group[14].group[3].group[4].control[5]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1725_smt">
                  <p>Magnetic tapes are destroyed using a furnace/incinerator, hammer mill, disintegrator, degausser or by cutting.</p>
               </part>
            </control>
            <control id="ism-1726" class="ISM-control">
               <title>Control: ism-1726</title>
               <prop name="sort-id"
                      value="catalog[1].group[14].group[3].group[4].control[6]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1726_smt">
                  <p>Optical disks are destroyed using a furnace/incinerator, hammer mill, disintegrator, grinder/sander or by cutting.</p>
               </part>
            </control>
            <control id="ism-1727" class="ISM-control">
               <title>Control: ism-1727</title>
               <prop name="sort-id"
                      value="catalog[1].group[14].group[3].group[4].control[7]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1727_smt">
                  <p>Semiconductor memory is destroyed using a furnace/incinerator, hammer mill or disintegrator.</p>
               </part>
            </control>
            <control id="ism-0368" class="ISM-control">
               <title>Control: ism-0368</title>
               <prop name="sort-id"
                      value="catalog[1].group[14].group[3].group[4].control[8]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="8"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0368_smt">
                  <p>Media destroyed using a hammer mill, disintegrator, grinder/sander or by cutting results in media waste particles no larger than 9 mm.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Treatment of media waste particles</title>
            <prop name="sort-id" value="catalog[1].group[14].group[3].group[5]"/>
            <part name="overview">
               <p>Following the destruction of SECRET and TOP SECRET media, normal accounting and verification processes and procedures do not apply. However, depending on the destruction method used, and the resulting media waste particle size, it may still need to be stored and handled as classified waste.</p>
            </part>
            <control id="ism-1728" class="ISM-control">
               <title>Control: ism-1728</title>
               <prop name="sort-id"
                      value="catalog[1].group[14].group[3].group[5].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <part name="statement" id="ism-1728_smt">
                  <p>The resulting media waste particles from the destruction of SECRET media is stored and handled as OFFICIAL if less than or equal to 3 mm, PROTECTED if greater than 3 mm and less than or equal to 6 mm, or SECRET if greater than 6 mm and less than or equal to 9 mm.</p>
               </part>
            </control>
            <control id="ism-1729" class="ISM-control">
               <title>Control: ism-1729</title>
               <prop name="sort-id"
                      value="catalog[1].group[14].group[3].group[5].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-1729_smt">
                  <p>The resulting media waste particles from the destruction of TOP SECRET media is stored and handled as OFFICIAL if less than or equal to 3 mm, or SECRET if greater than 3 mm and less than or equal to 9 mm.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Degaussing magnetic media</title>
            <prop name="sort-id" value="catalog[1].group[14].group[3].group[6]"/>
            <part name="overview">
               <p>Degaussing magnetic media changes its magnetic properties, thereby, permanently corrupting data. When degaussing magnetic media, care needs to be taken as a degausser of insufficient magnetic field strength will not be effective. In addition, since 2006 perpendicular magnetic media has progressively replaced longitudinal magnetic media. As some older degaussers are only capable of destroying longitudinal magnetic media, care needs to be taken to ensure that a degausser with a suitable magnetic orientation is also used. Furthermore, to ensure that degaussers are being used in the correct manner to effectively destroy magnetic media, product-specific directions provided by degausser manufacturers should be followed. Finally, to provide an additional level of assurance following the use of a degausser, magnetic media should be physically damaged by deforming any internal platters.</p>
            </part>
            <control id="ism-0361" class="ISM-control">
               <title>Control: ism-0361</title>
               <prop name="sort-id"
                      value="catalog[1].group[14].group[3].group[6].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0361_smt">
                  <p>Magnetic media is destroyed using a degausser with a suitable magnetic field strength and magnetic orientation.</p>
               </part>
            </control>
            <control id="ism-0362" class="ISM-control">
               <title>Control: ism-0362</title>
               <prop name="sort-id"
                      value="catalog[1].group[14].group[3].group[6].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0362_smt">
                  <p>Product-specific directions provided by degausser manufacturers are followed.</p>
               </part>
            </control>
            <control id="ism-1641" class="ISM-control">
               <title>Control: ism-1641</title>
               <prop name="sort-id"
                      value="catalog[1].group[14].group[3].group[6].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1641_smt">
                  <p>Following the use of a degausser, magnetic media is physically damaged by deforming any internal platters.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Supervision of destruction</title>
            <prop name="sort-id" value="catalog[1].group[14].group[3].group[7]"/>
            <part name="overview">
               <p>To verify that media is appropriately destroyed, destruction processes need to be supervised by at least one person cleared to the sensitivity or classification of the media being destroyed.</p>
            </part>
            <control id="ism-0370" class="ISM-control">
               <title>Control: ism-0370</title>
               <prop name="sort-id"
                      value="catalog[1].group[14].group[3].group[7].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="5"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0370_smt">
                  <p>The destruction of media is performed under the supervision of at least one person cleared to its sensitivity or classification.</p>
               </part>
            </control>
            <control id="ism-0371" class="ISM-control">
               <title>Control: ism-0371</title>
               <prop name="sort-id"
                      value="catalog[1].group[14].group[3].group[7].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0371_smt">
                  <p>Personnel supervising the destruction of media supervise its handling to the point of destruction and ensure that the destruction is completed successfully.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Supervision of accountable material destruction</title>
            <prop name="sort-id" value="catalog[1].group[14].group[3].group[8]"/>
            <part name="overview">
               <p>The successful destruction of media storing accountable material is more important than for other media. As such, its destruction should be supervised by at least two personnel who sign a destruction certificate afterwards.</p>
            </part>
            <control id="ism-0372" class="ISM-control">
               <title>Control: ism-0372</title>
               <prop name="sort-id"
                      value="catalog[1].group[14].group[3].group[8].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="5"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="O"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="P"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-0372_smt">
                  <p>The destruction of media storing accountable material is performed under the supervision of at least two personnel cleared to its sensitivity or classification.</p>
               </part>
            </control>
            <control id="ism-0373" class="ISM-control">
               <title>Control: ism-0373</title>
               <prop name="sort-id"
                      value="catalog[1].group[14].group[3].group[8].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="O"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="P"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-0373_smt">
                  <p>Personnel supervising the destruction of media storing accountable material supervise its handling to the point of destruction, ensure that the destruction is completed successfully and sign a destruction certificate afterwards.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Outsourcing media destruction</title>
            <prop name="sort-id" value="catalog[1].group[14].group[3].group[9]"/>
            <part name="overview">
               <p>While media storing accountable material cannot be outsourced, media storing non-accountable material can be outsourced when using a National Association for Information Destruction AAA certified destruction service with endorsements, as specified in ASIO’s Protective Security Circular-167, External destruction of security classified information. This publication is available from the Protective Security Policy GovTEAMS community or ASIO by email.</p>
            </part>
            <control id="ism-0839" class="ISM-control">
               <title>Control: ism-0839</title>
               <prop name="sort-id"
                      value="catalog[1].group[14].group[3].group[9].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="O"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="P"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-0839_smt">
                  <p>The destruction of media storing accountable material is not outsourced.</p>
               </part>
            </control>
            <control id="ism-0840" class="ISM-control">
               <title>Control: ism-0840</title>
               <prop name="sort-id"
                      value="catalog[1].group[14].group[3].group[9].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Jun-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="O"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="P"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <part name="statement" id="ism-0840_smt">
                  <p>When outsourcing the destruction of media storing non-accountable material, a National Association for Information Destruction AAA certified destruction service with endorsements, as specified in ASIO’s Protective Security Circular-167, is used.</p>
               </part>
            </control>
         </group>
      </group>
      <group>
         <title>Media disposal</title>
         <prop name="sort-id" value="catalog[1].group[14].group[4]"/>
         <group>
            <title>Media disposal processes and procedures</title>
            <prop name="sort-id" value="catalog[1].group[14].group[4].group[1]"/>
            <part name="overview">
               <p>Developing, implementing and maintaining processes and procedures for media disposal will ensure that an organisation carries out media disposal in an appropriate and consistent manner.</p>
            </part>
            <control id="ism-0374" class="ISM-control">
               <title>Control: ism-0374</title>
               <prop name="sort-id"
                      value="catalog[1].group[14].group[4].group[1].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0374_smt">
                  <p>Media disposal processes, and supporting media disposal procedures, are developed, implemented and maintained.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Disposal of media</title>
            <prop name="sort-id" value="catalog[1].group[14].group[4].group[2]"/>
            <part name="overview">
               <p>Before media can be released into the public domain, it needs to be sanitised, destroyed or declassified. As sanitised, destroyed or declassified media still presents a security risk, albeit very minor, an appropriate authority needs to formally authorise its release into the public domain. Furthermore, as part of disposal processes, removing labels and markings indicating the owner, sensitivity, classification or any other marking that can associate media with its prior use will ensure it does not draw undue attention following its disposal.</p>
            </part>
            <control id="ism-0378" class="ISM-control">
               <title>Control: ism-0378</title>
               <prop name="sort-id"
                      value="catalog[1].group[14].group[4].group[2].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0378_smt">
                  <p>Labels and markings indicating the owner, sensitivity, classification or any other marking that can associate media with its prior use are removed prior to its disposal.</p>
               </part>
            </control>
            <control id="ism-0375" class="ISM-control">
               <title>Control: ism-0375</title>
               <prop name="sort-id"
                      value="catalog[1].group[14].group[4].group[2].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="6"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0375_smt">
                  <p>Following sanitisation, destruction or declassification, a formal administrative decision is made to release media, or its waste, into the public domain.</p>
               </part>
            </control>
         </group>
      </group>
   </group>
   <group>
      <title>Guidelines for System Hardening</title>
      <prop name="sort-id" value="catalog[1].group[15]"/>
      <group>
         <title>Operating system hardening</title>
         <prop name="sort-id" value="catalog[1].group[15].group[1]"/>
         <part name="overview">
            <h1>Further information</h1>
            <p>Further information on cyber supply chain risk management can be found in the cyber supply chain risk management section of the <a href="#f37a4848-0791-4870-b316-5536c2681c28">Guidelines for Procurement and Outsourcing</a>.</p>
            <p>Further information on patching or updating operating systems can be found in the system patching section of the <a href="#c6ca6620-ccd5-4c5d-b97c-9d92f1162948">Guidelines for System Management</a>.</p>
            <p>Further information on securely configuring Microsoft Windows operating systems can be found in the ACSC’s <a href="#6e801c68-61f6-4c28-bf72-df91f7e232cc">Hardening Microsoft Windows 10 version 21H1 Workstations</a> publication.</p>
            <p>Further information on securely configuring Linux workstations and servers can be found in the ACSC’s <a href="#8132c47e-a2dc-4dd9-81d6-38db96e5cec6">Hardening Linux Workstations and Servers</a> publication.</p>
            <p>Further information on <a href="#d0df96bb-7236-4784-8f54-2cb6335ad228">exploit protection functionality</a> within Microsoft Windows is available from Microsoft.</p>
            <p>Further information on implementing application control can be found in the ACSC’s <a href="#4eeff329-cea0-4baf-a80b-8b0b76436075">Implementing Application Control</a> publication.</p>
            <p>Further information on Microsoft’s ‘<a href="#5a2ed3ef-afcc-485e-8014-5107e9ed97e3">recommended block rules</a>’ and ‘<a href="#4a3a265f-7772-433b-9906-7f784052f28b">recommended driver block rules</a>’ are available from Microsoft.</p>
            <p>Further information on the use of PowerShell can be found in the ACSC’s <a href="#8ffea524-0974-4b53-a8f5-41166073ede5">Securing PowerShell in the Enterprise</a> publication.</p>
            <p>Further information on <a href="#7d22400c-ddef-4cbb-90f1-7502dc569e5b">the use of PowerShell by blue teams</a> is available from Microsoft while further information on obtaining <a href="#af0810aa-3486-4ca6-a48a-fad8ce9ac193">greater visibility through PowerShell logging</a> is available from FireEye.</p>
            <p>Further information on independent testing of security products’ ability to <a href="#3a1a00f6-2f56-4d04-b99d-6f1682b95a98">detect or prevent various stages of network intrusions</a> is available from The MITRE Corporation.</p>
            <p>Further information on independent testing of antivirus software is available from <a href="#c852e735-4920-4616-8e34-2fddfb49eea8">AV-Comparatives</a> and <a href="#18203e18-2aca-492e-be44-770b2f47242f">AV-TEST</a>.</p>
            <p>Further information on the use of removable media can be found in the media usage section of the <a href="#b594c9c0-b42f-4f06-b643-38023275a5c7">Guidelines for Media</a>.</p>
            <p>Further information on event logging can be found in the event logging and monitoring section of the <a href="#edc24216-f52b-4513-bcda-5fa564661999">Guidelines for System Monitoring</a>.</p>
         </part>
         <group>
            <title>Operating system selection</title>
            <prop name="sort-id" value="catalog[1].group[15].group[1].group[01]"/>
            <part name="overview">
               <p>When selecting operating systems, it is important that an organisation preferences vendors that have demonstrated a commitment to secure-by-design and secure-by-default principles, use of memory-safe programming languages where possible (such as C#, Go, Java, Ruby, Rust and Swift), secure programming practices, and maintaining the security of their products. This will assist not only with reducing the potential number of security vulnerabilities in operating systems, but also increasing the likelihood that timely patches, updates or vendor mitigations will be released to remediate any security vulnerabilities that are found.</p>
            </part>
            <control id="ism-1743" class="ISM-control">
               <title>Control: ism-1743</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[1].group[01].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-23"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1743_smt">
                  <p>Operating systems are chosen from vendors that have demonstrated a commitment to secure-by-design and secure-by-default principles, use of memory-safe programming languages where possible, secure programming practices, and maintaining the security of their products.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Operating system releases and versions</title>
            <prop name="sort-id" value="catalog[1].group[15].group[1].group[02]"/>
            <part name="overview">
               <p>Newer releases of operating systems often introduce improvements in security functionality. This can make it more difficult for an adversary to craft reliable exploits for security vulnerabilities they discover. Using older releases of operating systems, especially those no longer supported by vendors, may expose an organisation to security vulnerabilities or exploitation techniques that have since been mitigated. In addition, 64-bit versions of operating systems support additional security functionality that 32-bit versions do not.</p>
            </part>
            <control id="ism-1407" class="ISM-control">
               <title>Control: ism-1407</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[1].group[02].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="5"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1407_smt">
                  <p>The latest release, or the previous release, of operating systems are used.</p>
               </part>
            </control>
            <control id="ism-1408" class="ISM-control">
               <title>Control: ism-1408</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[1].group[02].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="5"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1408_smt">
                  <p>Where supported, 64-bit versions of operating systems are used.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Standard Operating Environments</title>
            <prop name="sort-id" value="catalog[1].group[15].group[1].group[03]"/>
            <part name="overview">
               <p>Allowing users to setup, configure and maintain their own workstations and servers can result in an inconsistent operating environment. Such operating environments may assist an adversary in gaining an initial foothold on networks due to the higher likelihood of poorly configured or maintained workstations and servers. Conversely, a Standard Operating Environment (SOE), provided via an automated build process or a golden image, is designed to facilitate a standardised and consistent operating environment within an organisation.</p>
               <p>When SOEs are obtained from third parties, such as service providers, there are additional cyber supply chain risks that should be considered, such as the accidental or deliberate inclusion of malicious code or configurations. To reduce the likelihood of such occurrences, an organisation should endeavour to obtain their SOEs from trusted third parties while also scanning them for malicious code and configurations.</p>
               <p>As operating environments naturally change over time, such as patches or updates are applied, configurations are changed, and applications are added or removed, it is essential that SOEs are reviewed and updated at least annually to ensure that an up-to-date baseline is maintained.</p>
            </part>
            <control id="ism-1406" class="ISM-control">
               <title>Control: ism-1406</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[1].group[03].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Aug-20"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1406_smt">
                  <p>SOEs are used for workstations and servers.</p>
               </part>
            </control>
            <control id="ism-1608" class="ISM-control">
               <title>Control: ism-1608</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[1].group[03].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1608_smt">
                  <p>SOEs provided by third parties are scanned for malicious code and configurations.</p>
               </part>
            </control>
            <control id="ism-1588" class="ISM-control">
               <title>Control: ism-1588</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[1].group[03].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Aug-20"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1588_smt">
                  <p>SOEs are reviewed and updated at least annually.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Hardening operating system configurations</title>
            <prop name="sort-id" value="catalog[1].group[15].group[1].group[04]"/>
            <part name="overview">
               <p>When operating systems are deployed in their default state it can lead to an insecure operating environment that may allow an adversary to gain an initial foothold on networks. Many configuration settings exist within operating systems to allow them to be configured in a secure state in order to minimise this security risk. As such, the Australian Cyber Security Centre (ACSC) and vendors often produce guidance to assist in hardening the configuration of operating systems. Note, however, in situations where ACSC and vendor guidance conflicts, preference should be given to implementing ACSC hardening guidance.</p>
            </part>
            <control id="ism-1409" class="ISM-control">
               <title>Control: ism-1409</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[1].group[04].control[01]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-18"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1409_smt">
                  <p>ACSC and vendor guidance is implemented to assist in hardening the configuration of operating systems.</p>
               </part>
            </control>
            <control id="ism-0380" class="ISM-control">
               <title>Control: ism-0380</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[1].group[04].control[02]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="9"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0380_smt">
                  <p>Unneeded accounts, components, services and functionality of operating systems are disabled or removed.</p>
               </part>
            </control>
            <control id="ism-0383" class="ISM-control">
               <title>Control: ism-0383</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[1].group[04].control[03]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="8"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0383_smt">
                  <p>Default accounts or credentials for operating systems, including for any pre-configured accounts, are changed.</p>
               </part>
            </control>
            <control id="ism-0341" class="ISM-control">
               <title>Control: ism-0341</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[1].group[04].control[04]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0341_smt">
                  <p>Automatic execution features for removable media are disabled.</p>
               </part>
            </control>
            <control id="ism-1654" class="ISM-control">
               <title>Control: ism-1654</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[1].group[04].control[05]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1654_smt">
                  <p>Internet Explorer 11 is disabled or removed.</p>
               </part>
            </control>
            <control id="ism-1655" class="ISM-control">
               <title>Control: ism-1655</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[1].group[04].control[06]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1655_smt">
                  <p>.NET Framework 3.5 (includes .NET 2.0 and 3.0) is disabled or removed.</p>
               </part>
            </control>
            <control id="ism-1492" class="ISM-control">
               <title>Control: ism-1492</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[1].group[04].control[07]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1492_smt">
                  <p>Operating system exploit protection functionality is enabled.</p>
               </part>
            </control>
            <control id="ism-1745" class="ISM-control">
               <title>Control: ism-1745</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[1].group[04].control[08]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1745_smt">
                  <p>Early Launch Antimalware, Secure Boot, Trusted Boot and Measured Boot functionality is enabled.</p>
               </part>
            </control>
            <control id="ism-1584" class="ISM-control">
               <title>Control: ism-1584</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[1].group[04].control[09]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1584_smt">
                  <p>Unprivileged users are prevented from bypassing, disabling or modifying security functionality of operating systems.</p>
               </part>
            </control>
            <control id="ism-1491" class="ISM-control">
               <title>Control: ism-1491</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[1].group[04].control[10]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1491_smt">
                  <p>Unprivileged users are prevented from running script execution engines, including:</p>
                  <ul>
                     <li>Windows Script Host (cscript.exe and wscript.exe)</li>
                     <li>PowerShell (powershell.exe, powershell_ise.exe and pwsh.exe)</li>
                     <li>Command Prompt (cmd.exe)</li>
                     <li>Windows Management Instrumentation (wmic.exe)</li>
                     <li>Microsoft Hypertext Markup Language (HTML) Application Host (mshta.exe).</li>
                  </ul>
               </part>
            </control>
         </group>
         <group>
            <title>Application management</title>
            <prop name="sort-id" value="catalog[1].group[15].group[1].group[05]"/>
            <part name="overview">
               <p>Unprivileged users’ ability to install any application can be exploited by an adversary using social engineering in order to convince them to install a malicious application. One way to mitigate this security risk, while also removing burden from system administrators, is to allow unprivileged users the ability to install approved applications from organisation-managed software repositories or from trusted application marketplaces. Furthermore, to prevent unprivileged users from removing security functionality, or breaking system functionality, unprivileged users should not have the ability to uninstall or disable approved software.</p>
            </part>
            <control id="ism-1592" class="ISM-control">
               <title>Control: ism-1592</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[1].group[05].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1592_smt">
                  <p>Unprivileged users do not have the ability to install unapproved software.</p>
               </part>
            </control>
            <control id="ism-0382" class="ISM-control">
               <title>Control: ism-0382</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[1].group[05].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="7"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0382_smt">
                  <p>Unprivileged users do not have the ability to uninstall or disable approved software.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Application control</title>
            <prop name="sort-id" value="catalog[1].group[15].group[1].group[06]"/>
            <part name="overview">
               <p>Application control can be an effective way to not only prevent malicious code from executing on workstations and servers, but also to ensure only approved applications can execute. When developing application control rulesets, determining approved executables (e.g. .exe and .com files), software libraries (e.g. .dll and.ocx files), scripts (e.g. .ps1, .bat, .cmd, .vbs and .js files), installers (e.g. .msi, .msp and .mst files), compiled HTML (e.g. .chm), HTML applications (e.g. .hta), control panel applets (e.g. .cpl) and drivers based on business requirements is a more secure method than simply approving those already residing on a workstation or server. Furthermore, it is preferable that an organisation defines their own application control rulesets, rather than relying on those from application control vendors, and validate them on an annual or more frequent basis.</p>
               <p>In implementing application control, an organisation should use a reliable method, or combination of methods, such as cryptographic hash rules, publisher certificate rules or path rules. Depending on the method chosen, further hardening may be required to ensure that application control mechanisms and application control rulesets cannot be bypassed by an adversary.</p>
               <p>Finally, application control event logs can assist in monitoring the security posture of systems, detecting malicious behaviour and contributing to investigations following cyber security incidents. To facilitate such activities, application control event logs should be captured and stored centrally.</p>
            </part>
            <control id="ism-0843" class="ISM-control">
               <title>Control: ism-0843</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[1].group[06].control[01]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="9"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML2"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-0843_smt">
                  <p>Application control is implemented on workstations.</p>
               </part>
            </control>
            <control id="ism-1490" class="ISM-control">
               <title>Control: ism-1490</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[1].group[06].control[02]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML2"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1490_smt">
                  <p>Application control is implemented on internet-facing servers.</p>
               </part>
            </control>
            <control id="ism-1656" class="ISM-control">
               <title>Control: ism-1656</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[1].group[06].control[03]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1656_smt">
                  <p>Application control is implemented on non-internet-facing servers.</p>
               </part>
            </control>
            <control id="ism-1657" class="ISM-control">
               <title>Control: ism-1657</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[1].group[06].control[04]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML2"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1657_smt">
                  <p>Application control restricts the execution of executables, software libraries, scripts, installers, compiled HTML, HTML applications and control panel applets to an organisation-approved set.</p>
               </part>
            </control>
            <control id="ism-1658" class="ISM-control">
               <title>Control: ism-1658</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[1].group[06].control[05]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1658_smt">
                  <p>Application control restricts the execution of drivers to an organisation-approved set.</p>
               </part>
            </control>
            <control id="ism-0955" class="ISM-control">
               <title>Control: ism-0955</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[1].group[06].control[06]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="6"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Apr-20"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0955_smt">
                  <p>Application control is implemented using cryptographic hash rules, publisher certificate rules or path rules.</p>
               </part>
            </control>
            <control id="ism-1582" class="ISM-control">
               <title>Control: ism-1582</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[1].group[06].control[07]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1582_smt">
                  <p>Application control rulesets are validated on an annual or more frequent basis.</p>
               </part>
            </control>
            <control id="ism-1471" class="ISM-control">
               <title>Control: ism-1471</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[1].group[06].control[08]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Apr-20"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1471_smt">
                  <p>When implementing application control using publisher certificate rules, both publisher names and product names are used.</p>
               </part>
            </control>
            <control id="ism-1392" class="ISM-control">
               <title>Control: ism-1392</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[1].group[06].control[09]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-23"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1392_smt">
                  <p>When implementing application control using path rules, only approved users can modify approved files and write to approved folders.</p>
               </part>
            </control>
            <control id="ism-1746" class="ISM-control">
               <title>Control: ism-1746</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[1].group[06].control[10]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-23"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1746_smt">
                  <p>When implementing application control using path rules, only approved users can change file system permissions for approved files and folders.</p>
               </part>
            </control>
            <control id="ism-1544" class="ISM-control">
               <title>Control: ism-1544</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[1].group[06].control[11]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1544_smt">
                  <p>Microsoft’s ‘recommended block rules’ are implemented.</p>
               </part>
            </control>
            <control id="ism-1659" class="ISM-control">
               <title>Control: ism-1659</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[1].group[06].control[12]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1659_smt">
                  <p>Microsoft’s ‘recommended driver block rules’ are implemented.</p>
               </part>
            </control>
            <control id="ism-0846" class="ISM-control">
               <title>Control: ism-0846</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[1].group[06].control[13]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="8"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0846_smt">
                  <p>All users (with the exception of local administrator accounts and break glass accounts) cannot disable, bypass or be exempted from application control.</p>
               </part>
            </control>
            <control id="ism-1660" class="ISM-control">
               <title>Control: ism-1660</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[1].group[06].control[14]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML2"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1660_smt">
                  <p>Allowed and blocked execution events on workstations are logged.</p>
               </part>
            </control>
            <control id="ism-1661" class="ISM-control">
               <title>Control: ism-1661</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[1].group[06].control[15]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML2"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1661_smt">
                  <p>Allowed and blocked execution events on internet-facing servers are logged.</p>
               </part>
            </control>
            <control id="ism-1662" class="ISM-control">
               <title>Control: ism-1662</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[1].group[06].control[16]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1662_smt">
                  <p>Allowed and blocked execution events on non-internet-facing servers are logged.</p>
               </part>
            </control>
            <control id="ism-1663" class="ISM-control">
               <title>Control: ism-1663</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[1].group[06].control[17]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1663_smt">
                  <p>Application control event logs are stored centrally.</p>
               </part>
            </control>
         </group>
         <group>
            <title>PowerShell</title>
            <prop name="sort-id" value="catalog[1].group[15].group[1].group[07]"/>
            <part name="overview">
               <p>PowerShell is a powerful scripting language developed by Microsoft and, due to its ubiquity and ease with which it can be used to fully control operating systems, is an important part of system administrator toolkits. However, PowerShell can also be a dangerous exploitation tool in the hands of an adversary.</p>
               <p>In order to prevent attacks leveraging security vulnerabilities in earlier PowerShell versions, Windows PowerShell 2.0 should be disabled or removed from operating systems. Additionally, PowerShell’s language mode should be set to Constrained Language Mode to achieve a balance between security and functionality.</p>
               <p>Finally, PowerShell event logs can assist in monitoring the security posture of systems, detecting malicious behaviour and contributing to investigations following cyber security incidents. To facilitate such activities, PowerShell event logs should be captured and stored centrally.</p>
            </part>
            <control id="ism-1621" class="ISM-control">
               <title>Control: ism-1621</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[1].group[07].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1621_smt">
                  <p>Windows PowerShell 2.0 is disabled or removed.</p>
               </part>
            </control>
            <control id="ism-1622" class="ISM-control">
               <title>Control: ism-1622</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[1].group[07].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Oct-20"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1622_smt">
                  <p>PowerShell is configured to use Constrained Language Mode.</p>
               </part>
            </control>
            <control id="ism-1623" class="ISM-control">
               <title>Control: ism-1623</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[1].group[07].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Oct-20"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1623_smt">
                  <p>PowerShell is configured to use module logging, script block logging and transcription functionality.</p>
               </part>
            </control>
            <control id="ism-1624" class="ISM-control">
               <title>Control: ism-1624</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[1].group[07].control[4]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Oct-20"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1624_smt">
                  <p>PowerShell script block logs are protected by Protected Event Logging functionality.</p>
               </part>
            </control>
            <control id="ism-1664" class="ISM-control">
               <title>Control: ism-1664</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[1].group[07].control[5]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML2"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1664_smt">
                  <p>Blocked PowerShell script execution events are logged.</p>
               </part>
            </control>
            <control id="ism-1665" class="ISM-control">
               <title>Control: ism-1665</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[1].group[07].control[6]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1665_smt">
                  <p>PowerShell event logs are stored centrally.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Host-based Intrusion Prevention System</title>
            <prop name="sort-id" value="catalog[1].group[15].group[1].group[08]"/>
            <part name="overview">
               <p>Many security products rely on signatures to detect malicious code. This approach is only effective when malicious code has already been profiled and signatures are available from security vendors. Unfortunately, an adversary can easily create variants of known malicious code in order to bypass traditional signature-based detection. A Host-based Intrusion Prevention System (HIPS) can use behaviour-based detection to assist in identifying and blocking anomalous behaviour as well as detecting malicious code that has yet to be identified by security vendors. As such, it is important that a HIPS is implemented on workstations, critical servers and high-value servers.</p>
            </part>
            <control id="ism-1341" class="ISM-control">
               <title>Control: ism-1341</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[1].group[08].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-18"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1341_smt">
                  <p>A HIPS is implemented on workstations.</p>
               </part>
            </control>
            <control id="ism-1034" class="ISM-control">
               <title>Control: ism-1034</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[1].group[08].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="7"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1034_smt">
                  <p>A HIPS is implemented on critical servers and high-value servers.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Software firewall</title>
            <prop name="sort-id" value="catalog[1].group[15].group[1].group[09]"/>
            <part name="overview">
               <p>Traditional network firewalls often fail to prevent the propagation of malicious code on networks, or an adversary from exfiltrating data from networks, as they only control which ports or protocols can be used between different network segments. Many forms of malicious code are designed specifically to take advantage of this by using common protocols, such as Hypertext Transfer Protocol, Hypertext Transfer Protocol Secure, Simple Mail Transfer Protocol or Domain Name System. Software firewalls are more effective than traditional network firewalls as they can control which applications and services can communicate to and from workstations and servers. As such, a software firewall should be implemented on workstations and servers to restrict inbound and outbound network connections to an organisation-approved set of applications and services.</p>
            </part>
            <control id="ism-1416" class="ISM-control">
               <title>Control: ism-1416</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[1].group[09].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1416_smt">
                  <p>A software firewall is implemented on workstations and servers to restrict inbound and outbound network connections to an organisation-approved set of applications and services.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Antivirus software</title>
            <prop name="sort-id" value="catalog[1].group[15].group[1].group[10]"/>
            <part name="overview">
               <p>When vendors develop software they may make coding mistakes that lead to security vulnerabilities. An adversary can take advantage of this by developing malicious code to exploit any security vulnerabilities that have not been detected and remedied by vendors. As significant time and effort is often involved in developing functioning and reliable exploits, an adversary will often attempt to reuse their exploits as much as possible. While exploits may have been previously identified by security vendors, they often remain viable against an organisation that does not have antivirus software in place.</p>
            </part>
            <control id="ism-1417" class="ISM-control">
               <title>Control: ism-1417</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[1].group[10].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1417_smt">
                  <p>Antivirus software is implemented on workstations and servers with:</p>
                  <ul>
                     <li>signature-based detection functionality enabled and set to a high level</li>
                     <li>heuristic-based detection functionality enabled and set to a high level</li>
                     <li>reputation rating functionality enabled</li>
                     <li>ransomware protection functionality enabled</li>
                     <li>detection signatures configured to update on at least a daily basis</li>
                     <li>regular scanning configured for all fixed disks and removable media.</li>
                  </ul>
               </part>
            </control>
         </group>
         <group>
            <title>Device access control software</title>
            <prop name="sort-id" value="catalog[1].group[15].group[1].group[11]"/>
            <part name="overview">
               <p>Device access control software can be used to prevent removable media and mobile devices from being connected to workstations and servers via external communication interfaces. This can assist in preventing the introduction of malicious code or the exfiltration of data by an adversary.</p>
               <p>In addition, an adversary can connect to locked workstations and servers via external communication interfaces that allow Direct Memory Access (DMA). In doing so, the adversary can gain access to encryption keys in memory or write malicious code to memory. The best defence against this security risk is to disable access to external communication interfaces that allow DMA, such as FireWire, ExpressCard and Thunderbolt.</p>
            </part>
            <control id="ism-1418" class="ISM-control">
               <title>Control: ism-1418</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[1].group[11].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1418_smt">
                  <p>If there is no business requirement for reading from removable media and devices, such functionality is disabled via the use of device access control software or by disabling external communication interfaces.</p>
               </part>
            </control>
            <control id="ism-0343" class="ISM-control">
               <title>Control: ism-0343</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[1].group[11].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="6"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0343_smt">
                  <p>If there is no business requirement for writing to removable media and devices, such functionality is disabled via the use of device access control software or by disabling external communication interfaces.</p>
               </part>
            </control>
            <control id="ism-0345" class="ISM-control">
               <title>Control: ism-0345</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[1].group[11].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="6"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0345_smt">
                  <p>External communication interfaces that allow DMA are disabled.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Operating system event logging</title>
            <prop name="sort-id" value="catalog[1].group[15].group[1].group[12]"/>
            <part name="overview">
               <p>Operating system events can assist in monitoring the security posture of systems, detecting malicious behaviour and contributing to investigations following cyber security incidents. To facilitate such activities, operating system event logs should be captured and stored centrally.</p>
            </part>
            <control id="ism-0582" class="ISM-control">
               <title>Control: ism-0582</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[1].group[12].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="7"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0582_smt">
                  <p>The following events are logged for operating systems:</p>
                  <ul>
                     <li>application and operating system crashes and error messages</li>
                     <li>changes to security policies and system configurations</li>
                     <li>successful user logons and logoffs, failed user logons and account lockouts</li>
                     <li>failures, restarts and changes to important processes and services</li>
                     <li>requests to access internet resources</li>
                     <li>security product-related events</li>
                     <li>system startups and shutdowns.</li>
                  </ul>
               </part>
            </control>
            <control id="ism-1747" class="ISM-control">
               <title>Control: ism-1747</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[1].group[12].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1747_smt">
                  <p>Operating system event logs are stored centrally.</p>
               </part>
            </control>
         </group>
      </group>
      <group>
         <title>User application hardening</title>
         <prop name="sort-id" value="catalog[1].group[15].group[2]"/>
         <part name="overview">
            <h1>User applications</h1>
            <p>This section is applicable to applications typically installed on user workstations, such as office productivity suites, web browsers and their extensions, email clients, Portable Document Format (PDF) software, and security products (e.g. antivirus software, device access control software, HIPS and software firewalls). Information on server applications can be found in the server application hardening section of these guidelines.</p>
            <h1>Further information</h1>
            <p>Further information on cyber supply chain risk management can be found in the cyber supply chain risk management section of the <a href="#f37a4848-0791-4870-b316-5536c2681c28">Guidelines for Procurement and Outsourcing</a>.</p>
            <p>Further information on patching or updating user applications can be found in the system patching section of the <a href="#c6ca6620-ccd5-4c5d-b97c-9d92f1162948">Guidelines for System Management</a>.</p>
            <p>Further information on the implementation and configuration of security products can be found in the operating system hardening section of these guidelines.</p>
            <p>Further information on securely configuring Microsoft Office can be found in the ACSC’s <a href="#58c9abfb-58fe-416e-a279-dfbfe123c99f">Hardening Microsoft 365, Office 2021, Office 2019 and Office 2016</a> publication.</p>
            <p>Further information on configuring Microsoft Office macro settings can be found in the ACSC’s <a href="#dfb52998-0e7e-420d-97e1-d1313c8f919a">Microsoft Office Macro Security</a> publication.</p>
            <p>Further information on event logging can be found in the event logging and monitoring section of the <a href="#edc24216-f52b-4513-bcda-5fa564661999">Guidelines for System Monitoring</a>.</p>
         </part>
         <group>
            <title>User application selection</title>
            <prop name="sort-id" value="catalog[1].group[15].group[2].group[1]"/>
            <part name="overview">
               <p>When selecting user applications, it is important that an organisation preferences vendors that have demonstrated a commitment to secure-by-design and secure-by-default principles, use of memory-safe programming languages where possible (such as C#, Go, Java, Ruby, Rust and Swift), secure programming practices, and maintaining the security of their products. This will assist not only with reducing the potential number of security vulnerabilities in user applications, but also increasing the likelihood that timely patches, updates or vendor mitigations will be released to remediate any security vulnerabilities that are found.</p>
            </part>
            <control id="ism-0938" class="ISM-control">
               <title>Control: ism-0938</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[2].group[1].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="6"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-23"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0938_smt">
                  <p>User applications are chosen from vendors that have demonstrated a commitment to secure-by-design and secure-by-default principles, use of memory-safe programming languages where possible, secure programming practices, and maintaining the security of their products.</p>
               </part>
            </control>
         </group>
         <group>
            <title>User application releases</title>
            <prop name="sort-id" value="catalog[1].group[15].group[2].group[2]"/>
            <part name="overview">
               <p>Newer releases of user applications often introduce improvements in security functionality. This can make it more difficult for an adversary to craft reliable exploits for security vulnerabilities they discover. Using older releases of user applications, especially those no longer supported by vendors, may expose an organisation to security vulnerabilities or exploitation techniques that have since been mitigated. This is particularly important for office productivity suites, web browsers and their extensions, email clients, PDF software, and security products.</p>
            </part>
            <control id="ism-1467" class="ISM-control">
               <title>Control: ism-1467</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[2].group[2].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1467_smt">
                  <p>The latest release of office productivity suites, web browsers and their extensions, email clients, PDF software, and security products are used.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Hardening user application configurations</title>
            <prop name="sort-id" value="catalog[1].group[15].group[2].group[3]"/>
            <part name="overview">
               <p>When user applications are deployed in their default state it can lead to an insecure operating environment that may allow an adversary to gain an initial foothold on networks. This can be especially risky for office productivity suites, web browsers and their extensions, email clients, PDF software, and security products as such applications are routinely targeted for exploitation. Many configuration settings exist within such applications to allow them to be configured in a secure state in order to minimise this security risk. As such, the ACSC and vendors often produce guidance to assist in hardening the configuration of these applications. Note, however, in situations where ACSC and vendor guidance conflicts, preference should be given to implementing ACSC hardening guidance.</p>
            </part>
            <control id="ism-1806" class="ISM-control">
               <title>Control: ism-1806</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[2].group[3].control[01]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-23"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1806_smt">
                  <p>Default accounts or credentials for user applications, including for any pre-configured accounts, are changed.</p>
               </part>
            </control>
            <control id="ism-1412" class="ISM-control">
               <title>Control: ism-1412</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[2].group[3].control[02]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML2"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1412_smt">
                  <p>ACSC or vendor hardening guidance for web browsers, Microsoft Office and PDF software is implemented.</p>
               </part>
            </control>
            <control id="ism-1470" class="ISM-control">
               <title>Control: ism-1470</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[2].group[3].control[03]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="5"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1470_smt">
                  <p>Unneeded components, services and functionality of office productivity suites, web browsers, email clients, PDF software and security products are disabled or removed.</p>
               </part>
            </control>
            <control id="ism-1235" class="ISM-control">
               <title>Control: ism-1235</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[2].group[3].control[04]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1235_smt">
                  <p>Add-ons, extensions and plug-ins for office productivity suites, web browsers, email clients, PDF software and security products are restricted to an organisation-approved set.</p>
               </part>
            </control>
            <control id="ism-1667" class="ISM-control">
               <title>Control: ism-1667</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[2].group[3].control[05]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML2"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1667_smt">
                  <p>Microsoft Office is blocked from creating child processes.</p>
               </part>
            </control>
            <control id="ism-1668" class="ISM-control">
               <title>Control: ism-1668</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[2].group[3].control[06]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML2"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1668_smt">
                  <p>Microsoft Office is blocked from creating executable content.</p>
               </part>
            </control>
            <control id="ism-1669" class="ISM-control">
               <title>Control: ism-1669</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[2].group[3].control[07]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML2"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1669_smt">
                  <p>Microsoft Office is blocked from injecting code into other processes.</p>
               </part>
            </control>
            <control id="ism-1542" class="ISM-control">
               <title>Control: ism-1542</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[2].group[3].control[08]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Jan-19"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML2"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1542_smt">
                  <p>Microsoft Office is configured to prevent activation of Object Linking and Embedding packages.</p>
               </part>
            </control>
            <control id="ism-1823" class="ISM-control">
               <title>Control: ism-1823</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[2].group[3].control[09]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-23"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML2"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1823_smt">
                  <p>Office productivity suite security settings cannot be changed by users.</p>
               </part>
            </control>
            <control id="ism-1486" class="ISM-control">
               <title>Control: ism-1486</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[2].group[3].control[10]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML2"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1486_smt">
                  <p>Web browsers do not process Java from the internet.</p>
               </part>
            </control>
            <control id="ism-1485" class="ISM-control">
               <title>Control: ism-1485</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[2].group[3].control[11]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML2"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1485_smt">
                  <p>Web browsers do not process web advertisements from the internet.</p>
               </part>
            </control>
            <control id="ism-1666" class="ISM-control">
               <title>Control: ism-1666</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[2].group[3].control[12]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML2"/>
               <part name="statement" id="ism-1666_smt">
                  <p>Internet Explorer 11 does not process content from the internet.</p>
               </part>
            </control>
            <control id="ism-1585" class="ISM-control">
               <title>Control: ism-1585</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[2].group[3].control[13]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-23"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML2"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1585_smt">
                  <p>Web browser security settings cannot be changed by users.</p>
               </part>
            </control>
            <control id="ism-1670" class="ISM-control">
               <title>Control: ism-1670</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[2].group[3].control[14]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML2"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1670_smt">
                  <p>PDF software is blocked from creating child processes.</p>
               </part>
            </control>
            <control id="ism-1824" class="ISM-control">
               <title>Control: ism-1824</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[2].group[3].control[15]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-23"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML2"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1824_smt">
                  <p>PDF software security settings cannot be changed by users.</p>
               </part>
            </control>
            <control id="ism-1601" class="ISM-control">
               <title>Control: ism-1601</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[2].group[3].control[16]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1601_smt">
                  <p>Microsoft’s Attack Surface Reduction rules are implemented.</p>
               </part>
            </control>
            <control id="ism-1748" class="ISM-control">
               <title>Control: ism-1748</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[2].group[3].control[17]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-23"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1748_smt">
                  <p>Email client security settings cannot be changed by users.</p>
               </part>
            </control>
            <control id="ism-1825" class="ISM-control">
               <title>Control: ism-1825</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[2].group[3].control[18]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-23"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1825_smt">
                  <p>Security product security settings cannot be changed by users.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Microsoft Office macros</title>
            <prop name="sort-id" value="catalog[1].group[15].group[2].group[4]"/>
            <part name="overview">
               <p>Microsoft Office files can contain embedded code, known as a macro, written in the Visual Basic for Applications programming language. A macro can contain a series of commands that can be coded or recorded and replayed at a later time to automate repetitive tasks. Macros are powerful tools that can be easily created by users to greatly improve their productivity. However, an adversary can also create macros to perform a variety of malicious activities, such as assisting to compromise workstations in order to exfiltrate or deny access to data. To reduce this security risk, an organisation should disable Microsoft Office macros for users that do not have a demonstrated business requirement and secure their use for the remaining users that do.</p>
               <p>Finally, Microsoft Office macro event logs can assist in monitoring the security posture of systems, detecting malicious behaviour and contributing to investigations following cyber security incidents. To facilitate such activities, Microsoft Office macro event logs should be captured and stored centrally.</p>
            </part>
            <control id="ism-1671" class="ISM-control">
               <title>Control: ism-1671</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[2].group[4].control[01]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML2"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1671_smt">
                  <p>Microsoft Office macros are disabled for users that do not have a demonstrated business requirement.</p>
               </part>
            </control>
            <control id="ism-1488" class="ISM-control">
               <title>Control: ism-1488</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[2].group[4].control[02]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML2"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1488_smt">
                  <p>Microsoft Office macros in files originating from the internet are blocked.</p>
               </part>
            </control>
            <control id="ism-1672" class="ISM-control">
               <title>Control: ism-1672</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[2].group[4].control[03]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML2"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1672_smt">
                  <p>Microsoft Office macro antivirus scanning is enabled.</p>
               </part>
            </control>
            <control id="ism-1673" class="ISM-control">
               <title>Control: ism-1673</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[2].group[4].control[04]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML2"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1673_smt">
                  <p>Microsoft Office macros are blocked from making Win32 API calls.</p>
               </part>
            </control>
            <control id="ism-1674" class="ISM-control">
               <title>Control: ism-1674</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[2].group[4].control[05]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1674_smt">
                  <p>Only Microsoft Office macros running from within a sandboxed environment, a Trusted Location or that are digitally signed by a trusted publisher are allowed to execute.</p>
               </part>
            </control>
            <control id="ism-1487" class="ISM-control">
               <title>Control: ism-1487</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[2].group[4].control[06]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1487_smt">
                  <p>Only privileged users responsible for validating that Microsoft Office macros are free of malicious code can write to and modify content within Trusted Locations.</p>
               </part>
            </control>
            <control id="ism-1675" class="ISM-control">
               <title>Control: ism-1675</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[2].group[4].control[07]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1675_smt">
                  <p>Microsoft Office macros digitally signed by an untrusted publisher cannot be enabled via the Message Bar or Backstage View.</p>
               </part>
            </control>
            <control id="ism-1676" class="ISM-control">
               <title>Control: ism-1676</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[2].group[4].control[08]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1676_smt">
                  <p>Microsoft Office’s list of trusted publishers is validated on an annual or more frequent basis.</p>
               </part>
            </control>
            <control id="ism-1489" class="ISM-control">
               <title>Control: ism-1489</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[2].group[4].control[09]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-18"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML2"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1489_smt">
                  <p>Microsoft Office macro security settings cannot be changed by users.</p>
               </part>
            </control>
            <control id="ism-1677" class="ISM-control">
               <title>Control: ism-1677</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[2].group[4].control[10]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML2"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1677_smt">
                  <p>Allowed and blocked Microsoft Office macro execution events are logged.</p>
               </part>
            </control>
            <control id="ism-1678" class="ISM-control">
               <title>Control: ism-1678</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[2].group[4].control[11]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1678_smt">
                  <p>Microsoft Office macro event logs are stored centrally.</p>
               </part>
            </control>
         </group>
      </group>
      <group>
         <title>Server application hardening</title>
         <prop name="sort-id" value="catalog[1].group[15].group[3]"/>
         <part name="overview">
            <h1>Server applications</h1>
            <p>This section is applicable to applications associated with specific server functionality, such as Microsoft Active Directory Domain Services (AD DS), database management system software, email server software and web hosting software. Information on user applications can be found in the user application hardening section of these guidelines.</p>
            <h1>Further information</h1>
            <p>Further information on cyber supply chain risk management can be found in the cyber supply chain risk management section of the <a href="#f37a4848-0791-4870-b316-5536c2681c28">Guidelines for Procurement and Outsourcing</a>.</p>
            <p>Further information on patching or updating server applications can be found in the system patching section of the <a href="#c6ca6620-ccd5-4c5d-b97c-9d92f1162948">Guidelines for System Management</a>.</p>
            <p>Further information on the use of privileged accounts can be found in the access to systems and their resources section of the <a href="#7d16ae67-87a7-4861-b939-e13ec279b5a2">Guidelines for Personnel Security</a>.</p>
            <p>Further information on securely configuring Microsoft AD DS can be found in Microsoft’s <a href="#b151e338-c42f-41ef-9f99-2cb98f368637">Best Practices for Securing Active Directory</a> publication.</p>
            <p>Further information on recommended security-related events to monitor for Microsoft AD DS can be found in Microsoft’s <a href="#022fcd70-df8b-45ee-ae19-fb9cfe7b6cb6">Events to monitor</a> publication.</p>
            <p>Further information on event logging can be found in the event logging and monitoring section of the <a href="#edc24216-f52b-4513-bcda-5fa564661999">Guidelines for System Monitoring</a>.</p>
            <p>Further information on database servers can be found in the database servers section of the <a href="#3f349d16-11a1-459a-a299-c9446aea7597">Guidelines for Database Systems</a>.</p>
            <p>Further information on email servers can be found in the email gateways and servers section of the <a href="#ab73fa95-f213-4041-915e-a8ccbdf74331">Guidelines for Email</a>.</p>
         </part>
         <group>
            <title>Server application selection</title>
            <prop name="sort-id" value="catalog[1].group[15].group[3].group[1]"/>
            <part name="overview">
               <p>When selecting server applications, it is important that an organisation preferences vendors that have demonstrated a commitment to secure-by-design and secure-by-default principles, use of memory-safe programming languages where possible (such as C#, Go, Java, Ruby, Rust and Swift), secure programming practices, and maintaining the security of their products. This will assist not only with reducing the potential number of security vulnerabilities in server applications, but also increasing the likelihood that timely patches, updates or vendor mitigations will be released to remediate any security vulnerabilities that are found.</p>
            </part>
            <control id="ism-1826" class="ISM-control">
               <title>Control: ism-1826</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[3].group[1].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-23"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1826_smt">
                  <p>Server applications are chosen from vendors that have demonstrated a commitment to secure-by-design and secure-by-default principles, use of memory-safe programming languages where possible, secure programming practices, and maintaining the security of their products.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Server application releases</title>
            <prop name="sort-id" value="catalog[1].group[15].group[3].group[2]"/>
            <part name="overview">
               <p>Newer releases of server applications often introduce improvements in security functionality. This can make it more difficult for an adversary to craft reliable exploits for security vulnerabilities they discover. Using older releases of server applications, especially those no longer supported by vendors, may expose an organisation to security vulnerabilities or exploitation techniques that have since been mitigated. This is particularly important for internet-facing server applications, such as web hosting software.</p>
            </part>
            <control id="ism-1483" class="ISM-control">
               <title>Control: ism-1483</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[3].group[2].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-23"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1483_smt">
                  <p>The latest release of internet-facing server applications are used.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Hardening server application configurations</title>
            <prop name="sort-id" value="catalog[1].group[15].group[3].group[3]"/>
            <part name="overview">
               <p>Poorly configured server applications could provide an opportunity for an adversary to gain unauthorised access to the underlying server. To assist an organisation in deploying server applications, vendors often provide guidance on how to securely configure their products. In addition, server applications will often leave behind temporary installation files and logs during their installation process in case an administrator needs to troubleshoot a failed installation. These files, which can include credentials, could be valuable to an adversary and should be removed following the installation of server applications.</p>
            </part>
            <control id="ism-1246" class="ISM-control">
               <title>Control: ism-1246</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[3].group[3].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-23"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1246_smt">
                  <p>ACSC or vendor hardening guidance for server applications is implemented.</p>
               </part>
            </control>
            <control id="ism-1260" class="ISM-control">
               <title>Control: ism-1260</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[3].group[3].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-23"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1260_smt">
                  <p>Default accounts or credentials for server applications, including for any pre-configured accounts, are changed.</p>
               </part>
            </control>
            <control id="ism-1247" class="ISM-control">
               <title>Control: ism-1247</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[3].group[3].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-23"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1247_smt">
                  <p>Unneeded accounts, components, services and functionality of server applications are disabled or removed.</p>
               </part>
            </control>
            <control id="ism-1245" class="ISM-control">
               <title>Control: ism-1245</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[3].group[3].control[4]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-23"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1245_smt">
                  <p>All temporary installation files and logs created during server application installation processes are removed after server applications have been installed.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Restricting privileges for server applications</title>
            <prop name="sort-id" value="catalog[1].group[15].group[3].group[4]"/>
            <part name="overview">
               <p>If a server application operating as a local administrator or root account is compromised by an adversary, it can present a significant security risk to the underlying server. In addition, server applications by default are often capable of widely accessing their underlying server’s file system. Therefore, restricting the ability of server applications to access their underlying server’s file system can limit damage should an adversary compromise the server application.</p>
            </part>
            <control id="ism-1249" class="ISM-control">
               <title>Control: ism-1249</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[3].group[4].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-23"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1249_smt">
                  <p>Server applications are configured to run as a separate account with the minimum privileges needed to perform their functions.</p>
               </part>
            </control>
            <control id="ism-1250" class="ISM-control">
               <title>Control: ism-1250</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[3].group[4].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-23"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1250_smt">
                  <p>The accounts under which server applications run have limited access to their underlying server’s file system.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Microsoft Active Directory Domain Services domain controllers</title>
            <prop name="sort-id" value="catalog[1].group[15].group[3].group[5]"/>
            <part name="overview">
               <p>Microsoft AD DS domain controllers hold sensitive data for systems, such as hashed credentials for all user accounts. As such, particular care should be taken to secure these servers. This can be achieved by hardening their configuration while using dedicated domain administrator user accounts exclusively for their administration. In doing so, technical controls should ensure these dedicated domain administrator user accounts cannot be used to connect to or administer other systems.</p>
               <p>Finally, security-related events for Microsoft AD DS can assist in monitoring the security posture of systems, detecting malicious behaviour and contributing to investigations following cyber security incidents. To facilitate such activities, Microsoft AD DS event logs should be captured and stored centrally.</p>
            </part>
            <control id="ism-1827" class="ISM-control">
               <title>Control: ism-1827</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[3].group[5].control[1]"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-23"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1827_smt">
                  <p>Microsoft AD DS domain controllers are administered using dedicated domain administrator user accounts that are not used to administer other systems.</p>
               </part>
            </control>
            <control id="ism-1828" class="ISM-control">
               <title>Control: ism-1828</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[3].group[5].control[2]"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-23"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1828_smt">
                  <p>The Print Spooler service is disabled on Microsoft AD DS domain controllers.</p>
               </part>
            </control>
            <control id="ism-1829" class="ISM-control">
               <title>Control: ism-1829</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[3].group[5].control[3]"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-23"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1829_smt">
                  <p>Passwords and cpasswords are not used in Group Policy Preferences.</p>
               </part>
            </control>
            <control id="ism-1830" class="ISM-control">
               <title>Control: ism-1830</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[3].group[5].control[4]"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-23"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1830_smt">
                  <p>Security-related events for Microsoft AD DS are logged.</p>
               </part>
            </control>
            <control id="ism-1831" class="ISM-control">
               <title>Control: ism-1831</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[3].group[5].control[5]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-23"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1831_smt">
                  <p>Microsoft AD DS event logs are stored centrally.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Microsoft Active Directory Domain Services account hardening</title>
            <prop name="sort-id" value="catalog[1].group[15].group[3].group[6]"/>
            <part name="overview">
               <p>Misconfigured user accounts within Microsoft AD DS can pose a significant threat to the security of a system. For example, when an adversary is able to obtain credentials for a user account, along with associated system access, they may further compromise the system by querying Microsoft AD DS in order to assist with gaining an understanding of the environment, moving laterally through the network and escalating privileges by compromising privileged accounts. Furthermore, an adversary with this level of access can become difficult to detect and remove, as they may not need to use exploits for security vulnerabilities to achieve their goals. Malicious activities performed by compromised user accounts may also appear very similar to legitimate system activities.</p>
            </part>
            <control id="ism-1832" class="ISM-control">
               <title>Control: ism-1832</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[3].group[6].control[01]"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-23"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1832_smt">
                  <p>Only service accounts and computer accounts are configured with Service Principal Names (SPNs).</p>
               </part>
            </control>
            <control id="ism-1833" class="ISM-control">
               <title>Control: ism-1833</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[3].group[6].control[02]"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-23"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1833_smt">
                  <p>Service accounts are provisioned with the minimum privileges required and are not members of the domain administrators group or similar highly privileged groups.</p>
               </part>
            </control>
            <control id="ism-1834" class="ISM-control">
               <title>Control: ism-1834</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[3].group[6].control[03]"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-23"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1834_smt">
                  <p>Duplicate SPNs do not exist within the domain.</p>
               </part>
            </control>
            <control id="ism-1835" class="ISM-control">
               <title>Control: ism-1835</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[3].group[6].control[04]"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-23"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1835_smt">
                  <p>Privileged user accounts are configured as sensitive and cannot be delegated.</p>
               </part>
            </control>
            <control id="ism-1836" class="ISM-control">
               <title>Control: ism-1836</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[3].group[6].control[05]"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-23"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1836_smt">
                  <p>User accounts require Kerberos pre-authentication.</p>
               </part>
            </control>
            <control id="ism-1837" class="ISM-control">
               <title>Control: ism-1837</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[3].group[6].control[06]"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-23"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1837_smt">
                  <p>User accounts are not configured with password never expires or password not required.</p>
               </part>
            </control>
            <control id="ism-1838" class="ISM-control">
               <title>Control: ism-1838</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[3].group[6].control[07]"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-23"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1838_smt">
                  <p>The UserPassword attribute for user accounts is not used.</p>
               </part>
            </control>
            <control id="ism-1839" class="ISM-control">
               <title>Control: ism-1839</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[3].group[6].control[08]"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-23"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1839_smt">
                  <p>Account properties accessible by unprivileged users are not used to store passwords.</p>
               </part>
            </control>
            <control id="ism-1840" class="ISM-control">
               <title>Control: ism-1840</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[3].group[6].control[09]"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-23"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1840_smt">
                  <p>User account passwords do not use reversible encryption.</p>
               </part>
            </control>
            <control id="ism-1841" class="ISM-control">
               <title>Control: ism-1841</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[3].group[6].control[10]"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-23"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1841_smt">
                  <p>Unprivileged user accounts cannot add machines to the domain.</p>
               </part>
            </control>
            <control id="ism-1842" class="ISM-control">
               <title>Control: ism-1842</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[3].group[6].control[11]"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-23"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1842_smt">
                  <p>Dedicated service accounts are used to add machines to the domain.</p>
               </part>
            </control>
            <control id="ism-1843" class="ISM-control">
               <title>Control: ism-1843</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[3].group[6].control[12]"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-23"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1843_smt">
                  <p>User accounts with unconstrained delegation are reviewed at least annually, and those without an associated Kerberos SPN or demonstrated business requirement are removed.</p>
               </part>
            </control>
            <control id="ism-1844" class="ISM-control">
               <title>Control: ism-1844</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[3].group[6].control[13]"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-23"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1844_smt">
                  <p>Computer accounts that are not Microsoft AD SD domain controllers are not trusted for delegation to services.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Microsoft Active Directory Domain Services security group memberships</title>
            <prop name="sort-id" value="catalog[1].group[15].group[3].group[7]"/>
            <part name="overview">
               <p>Microsoft AD DS contains a number of built-in security groups that have elevated permissions or deliberately relaxed security policies. These security groups are often required for a specific purpose, however, overuse or inappropriate use may allow an adversary to more easily move laterally throughout a network, or escalate their privileges. Privileged security groups in particular should be limited to the smallest set of possible users to limit an adversary’s opportunities for privilege escalation.</p>
            </part>
            <control id="ism-1620" class="ISM-control">
               <title>Control: ism-1620</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[3].group[7].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-23"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1620_smt">
                  <p>Privileged user accounts are members of the Protected Users security group.</p>
               </part>
            </control>
            <control id="ism-1845" class="ISM-control">
               <title>Control: ism-1845</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[3].group[7].control[2]"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-23"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1845_smt">
                  <p>When a user account is disabled, it is removed from all security group memberships.</p>
               </part>
            </control>
            <control id="ism-1846" class="ISM-control">
               <title>Control: ism-1846</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[3].group[7].control[3]"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-23"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1846_smt">
                  <p>The Pre-Windows 2000 Compatible Access security group does not contain user accounts.</p>
               </part>
            </control>
         </group>
      </group>
      <group>
         <title>Authentication hardening</title>
         <prop name="sort-id" value="catalog[1].group[15].group[4]"/>
         <part name="overview">
            <h1>Account and authentication types</h1>
            <p>The guidance within this section is equally applicable to all account types. This includes unprivileged accounts, privileged accounts, break glass accounts and service accounts. In addition, the guidance is equally applicable to interactive authentication and non-interactive authentication.</p>
            <h1>Further information</h1>
            <p>Further information on cyber supply chain risk management can be found in the cyber supply chain risk management section of the <a href="#f37a4848-0791-4870-b316-5536c2681c28">Guidelines for Procurement and Outsourcing</a>.</p>
            <p>Further information on implementing multi-factor authentication can be found in the ACSC’s <a href="#83e3a9b1-5057-4531-91dd-03c8d92634b0">Implementing Multi-Factor Authentication</a> publication.</p>
            <p>Further information on event logging can be found in the event logging and monitoring section of the <a href="#edc24216-f52b-4513-bcda-5fa564661999">Guidelines for System Monitoring</a>.</p>
            <p>Further information on <a href="#58282062-5c17-476a-98b1-105a627cd28d">randomly generating passphrases</a> (preferably using five dice rolls and a long word list) is available from the Electronic Frontier Foundation while a <a href="#0508be6f-cb97-44da-b212-42416a0048b0">random dice roller</a> is available from RANDOM.ORG.</p>
            <p>Further information on changing credentials for the Kerberos Key Distribution Center’s service account can be found in Microsoft’s <a href="#ae426d0a-adb6-43b8-a463-faa33e83b679">Active Directory accounts</a>, <a href="#3e5a98e5-9219-46c8-81c2-e3a4d13407ce">AD Forest Recovery - Resetting the krbtgt password</a> publications. A script for <a href="#f74ba095-a7f7-4b8c-9e60-5fe84f2a2d0b">changing credentials for this service account</a> is also available from Microsoft.</p>
            <p>Further information on <a href="#91b92563-d991-40fa-9adc-548df9f6c496">group Managed Service Accounts</a> in Microsoft Windows Server is available from Microsoft.</p>
            <p>Further information on mitigating the use of stolen credentials can be found in the ACSC’s <a href="#824e4353-a9ae-4869-88fb-cb0675dc5d1c">Mitigating the Use of Stolen Credentials</a> publication.</p>
            <p>Further information on mitigating the use of stolen credentials can also be found in Microsoft’s <a href="#f9fb4c57-8c12-4edf-9e34-cb422664aae9">Mitigating Pass-the-Hash (PtH) Attacks and Other Credential Theft Techniques, Version 1 and 2</a> publication.</p>
         </part>
         <group>
            <title>Authenticating to systems</title>
            <prop name="sort-id" value="catalog[1].group[15].group[4].group[01]"/>
            <part name="overview">
               <p>Before access to a system and its resources is granted to a user, it is essential that they are authenticated. This can be achieved via multi-factor authentication, such as a username along with a passphrase and security key, or via single-factor authentication, such as a username and a passphrase.</p>
            </part>
            <control id="ism-1546" class="ISM-control">
               <title>Control: ism-1546</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[4].group[01].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Aug-19"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1546_smt">
                  <p>Users are authenticated before they are granted access to a system and its resources.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Insecure authentication methods</title>
            <prop name="sort-id" value="catalog[1].group[15].group[4].group[02]"/>
            <part name="overview">
               <p>Authentication methods need to resist theft, interception, duplication, forgery, unauthorised access and unauthorised modification. For example, Local Area Network (LAN) Manager and NT LAN Manager authentication methods use weak hashing algorithms. As such, credentials used as part of LAN Manager authentication and NT LAN Manager authentication (i.e. NTLMv1, NTLMv2 and NTLM2) can easily be compromised. Instead, an organisation should use Kerberos for authentication within Microsoft Windows environments.</p>
            </part>
            <control id="ism-1603" class="ISM-control">
               <title>Control: ism-1603</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[4].group[02].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Aug-20"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1603_smt">
                  <p>Authentication methods susceptible to replay attacks are disabled.</p>
               </part>
            </control>
            <control id="ism-1055" class="ISM-control">
               <title>Control: ism-1055</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[4].group[02].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Oct-20"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1055_smt">
                  <p>LAN Manager and NT LAN Manager authentication methods are disabled.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Multi-factor authentication</title>
            <prop name="sort-id" value="catalog[1].group[15].group[4].group[03]"/>
            <part name="overview">
               <p>Multi-factor authentication uses two or more authentication factors. This may include:</p>
               <ul>
                  <li>something a user knows, such as a memorised secret (i.e. personal identification number, password or passphrase)</li>
                  <li>something a user has, such as a security key, smart card, smartphone or one-time password token</li>
                  <li>something a user is, such as a fingerprint pattern or their facial geometry.</li>
               </ul>
               <p>Note, however, that if a memorised secret is written down, or stored in a document on a system, this becomes something that a user has rather than something a user knows.</p>
               <p>Privileged users, users of remote access solutions and users with access to important data repositories are more likely to be targeted by an adversary due to their access. For this reason, it is especially important that multi-factor authentication is used for these accounts. In addition, multi-factor authentication is vital to any administrative activities as it can limit the consequences of a compromise by preventing or slowing an adversary’s ability to gain unrestricted access to assets. In this regard, multi-factor authentication can be implemented as part of jump server authentication where assets being administered do not support multi-factor authentication themselves.</p>
               <p>When implementing multi-factor authentication, several different authentication factors can be implemented. Unfortunately, some authentication factors, such as biometrics or codes sent via Short Message Service, Voice over Internet Protocol or email, are more susceptible to compromise than others. For this reason, authentication factors that involve something a user has should be used as part of multi-factor authentication. Furthermore, for increased security, the use of phishing-resistant (also known as verifier impersonation resistant) multi-factor authentication is recommended to protect against real-time phishing attacks.</p>
               <p>Finally, multi-factor authentication event logs can assist in monitoring the security posture of systems, detecting malicious behaviour and contributing to investigations following cyber security incidents. To facilitate such activities, multi-factor authentication event logs should be captured and stored centrally.</p>
            </part>
            <control id="ism-0974" class="ISM-control">
               <title>Control: ism-0974</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[4].group[03].control[01]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="6"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0974_smt">
                  <p>Multi-factor authentication is used to authenticate unprivileged users of systems.</p>
               </part>
            </control>
            <control id="ism-1173" class="ISM-control">
               <title>Control: ism-1173</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[4].group[03].control[02]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML2"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1173_smt">
                  <p>Multi-factor authentication is used to authenticate privileged users of systems.</p>
               </part>
            </control>
            <control id="ism-1504" class="ISM-control">
               <title>Control: ism-1504</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[4].group[03].control[03]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML2"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1504_smt">
                  <p>Multi-factor authentication is used by an organisation’s users if they authenticate to their organisation’s internet-facing services.</p>
               </part>
            </control>
            <control id="ism-1679" class="ISM-control">
               <title>Control: ism-1679</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[4].group[03].control[04]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML2"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1679_smt">
                  <p>Multi-factor authentication is used by an organisation’s users if they authenticate to third-party internet-facing services that process, store or communicate their organisation's sensitive data.</p>
               </part>
            </control>
            <control id="ism-1680" class="ISM-control">
               <title>Control: ism-1680</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[4].group[03].control[05]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML2"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1680_smt">
                  <p>Multi-factor authentication (where available) is used by an organisation’s users if they authenticate to third-party internet-facing services that process, store or communicate their organisation's non-sensitive data.</p>
               </part>
            </control>
            <control id="ism-1681" class="ISM-control">
               <title>Control: ism-1681</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[4].group[03].control[06]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML2"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1681_smt">
                  <p>Multi-factor authentication is enabled by default for non-organisational users (but users can choose to opt out) if they authenticate to an organisation’s internet-facing services.</p>
               </part>
            </control>
            <control id="ism-1505" class="ISM-control">
               <title>Control: ism-1505</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[4].group[03].control[07]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1505_smt">
                  <p>Multi-factor authentication is used to authenticate users accessing important data repositories.</p>
               </part>
            </control>
            <control id="ism-1401" class="ISM-control">
               <title>Control: ism-1401</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[4].group[03].control[08]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="5"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML2"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1401_smt">
                  <p>Multi-factor authentication uses either: something users have and something users know, or something users have that is unlocked by something users know or are.</p>
               </part>
            </control>
            <control id="ism-1682" class="ISM-control">
               <title>Control: ism-1682</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[4].group[03].control[09]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-23"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1682_smt">
                  <p>Multi-factor authentication is phishing-resistant.</p>
               </part>
            </control>
            <control id="ism-1559" class="ISM-control">
               <title>Control: ism-1559</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[4].group[03].control[10]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1559_smt">
                  <p>Memorised secrets used for multi-factor authentication are a minimum of 6 characters, unless more stringent requirements apply.</p>
               </part>
            </control>
            <control id="ism-1560" class="ISM-control">
               <title>Control: ism-1560</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[4].group[03].control[11]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <part name="statement" id="ism-1560_smt">
                  <p>Memorised secrets used for multi-factor authentication on SECRET systems are a minimum of 8 characters.</p>
               </part>
            </control>
            <control id="ism-1561" class="ISM-control">
               <title>Control: ism-1561</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[4].group[03].control[12]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-1561_smt">
                  <p>Memorised secrets used for multi-factor authentication on TOP SECRET systems are a minimum of 10 characters.</p>
               </part>
            </control>
            <control id="ism-1683" class="ISM-control">
               <title>Control: ism-1683</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[4].group[03].control[13]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML2"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1683_smt">
                  <p>Successful and unsuccessful multi-factor authentication events are logged.</p>
               </part>
            </control>
            <control id="ism-1684" class="ISM-control">
               <title>Control: ism-1684</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[4].group[03].control[14]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1684_smt">
                  <p>Multi-factor authentication event logs are stored centrally.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Single-factor authentication</title>
            <prop name="sort-id" value="catalog[1].group[15].group[4].group[04]"/>
            <part name="overview">
               <p>A significant threat to the compromise of accounts is credential cracking tools. When an adversary gains access to a list of usernames and hashed credentials from a system they can attempt to recover username and credential pairs by comparing the hashes of known credentials with the hashed credentials they have gained access to. By finding a match an adversary will know the credential associated with a given username.</p>
               <p>In order to reduce this security risk, an organisation should implement multi-factor authentication. Note, while single-factor authentication is no longer considered suitable for protecting sensitive or classified data, it may not be possible to implement multi-factor authentication on some systems. In such cases, an organisation will need to increase the time on average it takes an adversary to compromise a credential by continuing to increase its length over time. Such increases in length can be balanced against useability through the use of passphrases rather than passwords. In cases where systems do not support passphrases, and as an absolute last resort, the strongest password length and complexity supported by a system will need to be implemented.</p>
            </part>
            <control id="ism-0417" class="ISM-control">
               <title>Control: ism-0417</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[4].group[04].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="5"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Oct-19"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0417_smt">
                  <p>When systems cannot support multi-factor authentication, single-factor authentication using passphrases is implemented instead.</p>
               </part>
            </control>
            <control id="ism-0421" class="ISM-control">
               <title>Control: ism-0421</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[4].group[04].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="8"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0421_smt">
                  <p>Passphrases used for single-factor authentication are at least 4 random words with a total minimum length of 14 characters, unless more stringent requirements apply.</p>
               </part>
            </control>
            <control id="ism-1557" class="ISM-control">
               <title>Control: ism-1557</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[4].group[04].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <part name="statement" id="ism-1557_smt">
                  <p>Passphrases used for single-factor authentication on SECRET systems are at least 5 random words with a total minimum length of 17 characters.</p>
               </part>
            </control>
            <control id="ism-0422" class="ISM-control">
               <title>Control: ism-0422</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[4].group[04].control[4]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="8"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-0422_smt">
                  <p>Passphrases used for single-factor authentication on TOP SECRET systems are at least 6 random words with a total minimum length of 20 characters.</p>
               </part>
            </control>
            <control id="ism-1558" class="ISM-control">
               <title>Control: ism-1558</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[4].group[04].control[5]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1558_smt">
                  <p>Passphrases used for single-factor authentication are not a list of categorised words; do not form a real sentence in a natural language; and are not constructed from song lyrics, movies, literature or any other publicly available material.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Setting credentials for user accounts</title>
            <prop name="sort-id" value="catalog[1].group[15].group[4].group[05]"/>
            <part name="overview">
               <p>Before new credentials are issued for user accounts, it is important that users’ provide sufficient evidence to verify their identity, such as by users physically presenting themselves and their pass to a service desk or by answering a set of challenge-response questions. Following the verification of user identity, credentials should be randomly generated and provided to users via a secure communications channel or, if not possible, split into two parts with one part provided to users and the other part provided to supervisors. Subsequently, users should reset their credentials on first use to ensure that they are not known by other parties.</p>
            </part>
            <control id="ism-1593" class="ISM-control">
               <title>Control: ism-1593</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[4].group[05].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1593_smt">
                  <p>Users provide sufficient evidence to verify their identity when requesting new credentials.</p>
               </part>
            </control>
            <control id="ism-1227" class="ISM-control">
               <title>Control: ism-1227</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[4].group[05].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="5"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1227_smt">
                  <p>Credentials set for user accounts are randomly generated.</p>
               </part>
            </control>
            <control id="ism-1594" class="ISM-control">
               <title>Control: ism-1594</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[4].group[05].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1594_smt">
                  <p>Credentials are provided to users via a secure communications channel or, if not possible, split into two parts with one part provided to users and the other part provided to supervisors.</p>
               </part>
            </control>
            <control id="ism-1595" class="ISM-control">
               <title>Control: ism-1595</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[4].group[05].control[4]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1595_smt">
                  <p>Credentials provided to users are changed on first use.</p>
               </part>
            </control>
            <control id="ism-1596" class="ISM-control">
               <title>Control: ism-1596</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[4].group[05].control[5]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1596_smt">
                  <p>Credentials, in the form of memorised secrets, are not reused by users across different systems.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Setting credentials for local administrator accounts and service accounts</title>
            <prop name="sort-id" value="catalog[1].group[15].group[4].group[06]"/>
            <part name="overview">
               <p>When local administrator accounts and service accounts use common usernames and credentials, it can allow an adversary that compromises credentials on one workstation or server to easily compromise other workstations and servers. As such, it is critical that credentials for local administrator accounts and service accounts are long, unique, unpredictable and managed.</p>
               <p>To provide additional security and credential management functionality for service accounts, Microsoft introduced group Managed Service Accounts to Microsoft Windows Server. In doing so, service accounts that are created as group Managed Service Accounts do not require manual credential management by system administrators, as the operating system automatically ensures that they are long, unique, unpredictable and managed. This ensures that service account credentials are secure, not misplaced or forgotten, and that they are automatically changed on a regular basis. However, in cases where the use of group Managed Service Accounts is not possible, credentials for service accounts should still be unique and unpredictable with a minimum length of 30 characters.</p>
            </part>
            <control id="ism-1685" class="ISM-control">
               <title>Control: ism-1685</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[4].group[06].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML2"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1685_smt">
                  <p>Credentials for local administrator accounts and service accounts are long, unique, unpredictable and managed.</p>
               </part>
            </control>
            <control id="ism-1619" class="ISM-control">
               <title>Control: ism-1619</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[4].group[06].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Oct-20"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1619_smt">
                  <p>Service accounts are created as group Managed Service Accounts.</p>
               </part>
            </control>
            <control id="ism-1795" class="ISM-control">
               <title>Control: ism-1795</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[4].group[06].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1795_smt">
                  <p>Credentials for local administrator accounts and service accounts are a minimum of 30 characters.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Changing credentials</title>
            <prop name="sort-id" value="catalog[1].group[15].group[4].group[07]"/>
            <part name="overview">
               <p>Generally, credentials should not need to be changed on a frequent basis. However, some events may necessitate the requirement for individual accounts, or groups of accounts, to change their credentials. This can include direct or suspected compromises of credentials, credentials appearing in online data breach databases, credentials being discovered stored on networks in the clear, credentials being transferred across networks in the clear, when membership of shared accounts change, and if credentials haven’t been changed in the past 12 months.</p>
            </part>
            <control id="ism-1590" class="ISM-control">
               <title>Control: ism-1590</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[4].group[07].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1590_smt">
                  <p>Credentials are changed if:</p>
                  <ul>
                     <li>they are directly compromised</li>
                     <li>they are suspected of being compromised</li>
                     <li>they appear in an online data breach database</li>
                     <li>they are discovered stored on networks in the clear</li>
                     <li>they are discovered being transferred across networks in the clear</li>
                     <li>membership of a shared account changes</li>
                     <li>they have not been changed in the past 12 months.</li>
                  </ul>
               </part>
            </control>
            <control id="ism-1847" class="ISM-control">
               <title>Control: ism-1847</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[4].group[07].control[2]"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-23"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1847_smt">
                  <p>Credentials for the Kerberos Key Distribution Center’s service account (KRBTGT) are changed twice, allowing for replication to all Microsoft Active Directory Domain Services domain controllers in-between each change, if:</p>
                  <ul>
                     <li>the domain has been directly compromised</li>
                     <li>the domain is suspected of being compromised</li>
                     <li>they have not been changed in the past 12 months.</li>
                  </ul>
               </part>
            </control>
         </group>
         <group>
            <title>Protecting credentials</title>
            <prop name="sort-id" value="catalog[1].group[15].group[4].group[08]"/>
            <part name="overview">
               <p>Written down credentials (e.g. memorised secrets), and dedicated devices that store or generate credentials (e.g. security keys, smart cards and one-time password tokens), when kept together with systems they are used to authenticate to can increase the likelihood of an adversary gaining unauthorised access to systems. For example, when smart cards are left on desks, one-time password tokens are left in laptop bags, security keys are left connected to computers or passphrases are written down and stuck to computer monitors. Furthermore, obscuring credentials as they are entered into systems can assist in protecting them against screen scrapers and shoulder surfers.</p>
               <p>If storing credentials on systems, sufficient protection should be implemented to prevent them from being compromised. For example, credentials can be stored in a password manager or hardware security module, while credentials stored in a database should be hashed, salted and stretched. In addition, Windows Defender Credential Guard and Windows Defender Remote Credential Guard can be enabled to provide additional protection for credentials.</p>
               <p>When using Microsoft Windows systems, cached credentials are stored in the Security Accounts Manager database and can allow a user to logon to a workstation they have previously logged onto even if the domain is not available. Whilst this functionality may be desirable from an availability perspective, this functionality can be abused by an adversary who can retrieve these cached credentials. To reduce this security risk, cached credentials should be limited to only one previous logon.</p>
            </part>
            <control id="ism-0418" class="ISM-control">
               <title>Control: ism-0418</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[4].group[08].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="6"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0418_smt">
                  <p>Credentials are kept separate from systems they are used to authenticate to, except for when performing authentication activities.</p>
               </part>
            </control>
            <control id="ism-1597" class="ISM-control">
               <title>Control: ism-1597</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[4].group[08].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Aug-20"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1597_smt">
                  <p>Credentials are obscured as they are entered into systems.</p>
               </part>
            </control>
            <control id="ism-1402" class="ISM-control">
               <title>Control: ism-1402</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[4].group[08].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="6"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1402_smt">
                  <p>Credentials stored on systems are protected by a password manager; a hardware security module; or by salting, hashing and stretching them before storage within a database.</p>
               </part>
            </control>
            <control id="ism-1686" class="ISM-control">
               <title>Control: ism-1686</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[4].group[08].control[4]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1686_smt">
                  <p>Windows Defender Credential Guard and Windows Defender Remote Credential Guard are enabled.</p>
               </part>
            </control>
            <control id="ism-1749" class="ISM-control">
               <title>Control: ism-1749</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[4].group[08].control[5]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1749_smt">
                  <p>Cached credentials are limited to one previous logon.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Account lockouts</title>
            <prop name="sort-id" value="catalog[1].group[15].group[4].group[09]"/>
            <part name="overview">
               <p>Locking an account after a specified number of failed logon attempts reduces the likelihood of successful credential spraying attacks by an adversary. However, care should be taken as implementing account lockout functionality can increase the likelihood of a denial of service. Alternatively, some systems can be configured to automatically slowdown repeated failed logon attempts (known as rate limiting) rather than locking accounts. Implementing multi-factor authentication is also an effective way of reducing the likelihood of successful credential spraying attacks.</p>
            </part>
            <control id="ism-1403" class="ISM-control">
               <title>Control: ism-1403</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[4].group[09].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Oct-19"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1403_smt">
                  <p>Accounts are locked out after a maximum of five failed logon attempts.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Session termination</title>
            <prop name="sort-id" value="catalog[1].group[15].group[4].group[10]"/>
            <part name="overview">
               <p>Implementing measures to terminate user sessions and restart workstations on a daily basis, outside of business hours and after an appropriate period of inactivity, can assist in both system maintenance activities as well as removing an adversary that may have compromised a system but failed to gain persistence.</p>
            </part>
            <control id="ism-0853" class="ISM-control">
               <title>Control: ism-0853</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[4].group[10].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0853_smt">
                  <p>On a daily basis, outside of business hours and after an appropriate period of inactivity, user sessions are terminated and workstations are restarted.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Session and screen locking</title>
            <prop name="sort-id" value="catalog[1].group[15].group[4].group[11]"/>
            <part name="overview">
               <p>Session and screen locking prevents unauthorised access to a system which a user has already authenticated to.</p>
            </part>
            <control id="ism-0428" class="ISM-control">
               <title>Control: ism-0428</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[4].group[11].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="9"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0428_smt">
                  <p>Systems are configured with a session or screen lock that:</p>
                  <ul>
                     <li>activates after a maximum of 15 minutes of user inactivity, or if manually activated by users</li>
                     <li>conceals all session content on the screen</li>
                     <li>ensures that the screen does not enter a power saving state before the session or screen lock is activated</li>
                     <li>requires users to authenticate to unlock the session</li>
                     <li>denies users the ability to disable the session or screen locking mechanism.</li>
                  </ul>
               </part>
            </control>
         </group>
         <group>
            <title>Logon banner</title>
            <prop name="sort-id" value="catalog[1].group[15].group[4].group[12]"/>
            <part name="overview">
               <p>Displaying a logon banner to users before access is granted to a system reminds them of their security responsibilities. Logon banners may cover topics such as:</p>
               <ul>
                  <li>the sensitivity or classification of the system</li>
                  <li>access to the system being restricted to authorised users</li>
                  <li>acceptable usage and security policies for the system</li>
                  <li>an agreement to abide by acceptable usage and security policies for the system</li>
                  <li>legal ramifications of violating acceptable usage and security policies for the system</li>
                  <li>details of any monitoring activities for the system.</li>
               </ul>
            </part>
            <control id="ism-0408" class="ISM-control">
               <title>Control: ism-0408</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[4].group[12].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-18"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0408_smt">
                  <p>Systems have a logon banner that requires users to acknowledge and accept their security responsibilities before access is granted.</p>
               </part>
            </control>
            <control id="ism-0979" class="ISM-control">
               <title>Control: ism-0979</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[4].group[12].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-18"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0979_smt">
                  <p>Legal advice is sought on the exact wording of logon banners.</p>
               </part>
            </control>
         </group>
      </group>
      <group>
         <title>Virtualisation hardening</title>
         <prop name="sort-id" value="catalog[1].group[15].group[5]"/>
         <part name="overview">
            <h1>Hypervisors</h1>
            <p>This section is applicable to both Type 1 hypervisors (those that run on bare metal) and Type 2 hypervisors (those that run on top of a general purpose operating system). In doing so, Type 1 hypervisors should be treated as operating systems while Type 2 hypervisors should be treated as applications. Note, as Type 1 hypervisors are themselves lightweight operating systems, they can be treated as a combination of both a software-based isolation mechanism and an underlying operating system. Conversely, Type 2 hypervisors will run on top of a general purpose operating system that may be provided by a different vendor to that of the software-isolation mechanism.</p>
            <h1>Containerisation</h1>
            <p>Containers allow for versatile deployment of systems and, in doing so, should be treated the same as any other system. However, controls in a containerised environment may take a different form when compared to other types of systems. For example, patching the operating system of a workstation may be performed differently to ensuring that a patched image is used for a container, however, the principle is the same. In general, the same security risks that apply to non-containerised systems will likely apply to containerised systems.</p>
            <h1>Further information</h1>
            <p>Further information on container security can be found in National Institute of Standards and Technology Special Publication 800-190, <a href="#887c65c3-c853-41c6-89d5-3f297108889e">Application Container Security Guide</a>.</p>
            <p>Further information on cyber supply chain risk management can be found in the cyber supply chain risk management section of the <a href="#f37a4848-0791-4870-b316-5536c2681c28">Guidelines for Procurement and Outsourcing</a>.</p>
            <p>Further information on the use of cloud services can be found in the managed services and cloud services section of the <a href="#f37a4848-0791-4870-b316-5536c2681c28">Guidelines for Procurement and Outsourcing</a>.</p>
            <p>Further information on hardening operating systems can be found in the operating system hardening section of these guidelines.</p>
            <p>Further information on patching or updating operating systems and applications can be found in the system patching section of the <a href="#c6ca6620-ccd5-4c5d-b97c-9d92f1162948">Guidelines for System Management</a>.</p>
            <p>Further information on event logging can be found in the event logging and monitoring section of the <a href="#edc24216-f52b-4513-bcda-5fa564661999">Guidelines for System Monitoring</a>.</p>
            <p>Further information on hypervisor security can be found in National Institute of Standards and Technology Special Publication 800-125A Rev. 1, <a href="#33d26cdd-51fc-45d3-a026-0814d51a4c7e">Security Recommendations for Server-based Hypervisor Platforms</a>.</p>
         </part>
         <group>
            <title>Functional separation between computing environments</title>
            <prop name="sort-id" value="catalog[1].group[15].group[5].group[1]"/>
            <part name="overview">
               <p>Physical servers often use a software-based isolation mechanism to share their hardware among multiple computing environments. In doing so, a computing environment could consist of an entire operating system installed in a virtual machine where the isolation mechanism is a hypervisor, such as cloud services providing Infrastructure as a Service, or alternatively, a computing environment could consist of an application which uses the shared kernel of the underlying operating system of the physical server where the isolation mechanism is an application container or application sandbox, such as cloud services providing Platform as a Service. Note, however, the logical separation of data within a single application, such as cloud services providing Software as a Service, is not considered to be the same as multiple computing environments.</p>
               <p>An adversary who has compromised a single computing environment, or who legitimately controls a single computing environment, might exploit a misconfiguration or security vulnerability in the isolation mechanism to compromise other computing environments on the same physical server or compromise the underlying operating system of the physical server. As such, it is important that additional controls are implemented when a software-based isolation mechanism is used to share a physical server’s hardware.</p>
            </part>
            <control id="ism-1460" class="ISM-control">
               <title>Control: ism-1460</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[5].group[1].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-23"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1460_smt">
                  <p>When using a software-based isolation mechanism to share a physical server’s hardware, the isolation mechanism is from a vendor that has demonstrated a commitment to secure-by-design and secure-by-default principles, use of memory-safe programming languages where possible, secure programming practices, and maintaining the security of their products.</p>
               </part>
            </control>
            <control id="ism-1604" class="ISM-control">
               <title>Control: ism-1604</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[5].group[1].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Aug-20"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1604_smt">
                  <p>When using a software-based isolation mechanism to share a physical server’s hardware, the configuration of the isolation mechanism is hardened by removing unneeded functionality and restricting access to the administrative interface used to manage the isolation mechanism.</p>
               </part>
            </control>
            <control id="ism-1605" class="ISM-control">
               <title>Control: ism-1605</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[5].group[1].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1605_smt">
                  <p>When using a software-based isolation mechanism to share a physical server’s hardware, the underlying operating system is hardened.</p>
               </part>
            </control>
            <control id="ism-1606" class="ISM-control">
               <title>Control: ism-1606</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[5].group[1].control[4]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1606_smt">
                  <p>When using a software-based isolation mechanism to share a physical server’s hardware, patches, updates or vendor mitigations for security vulnerabilities are applied to the isolation mechanism and underlying operating system in a timely manner.</p>
               </part>
            </control>
            <control id="ism-1848" class="ISM-control">
               <title>Control: ism-1848</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[5].group[1].control[5]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-23"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1848_smt">
                  <p>When using a software-based isolation mechanism to share a physical server’s hardware, the isolation mechanism or underlying operating system is replaced when it is no longer supported by a vendor.</p>
               </part>
            </control>
            <control id="ism-1607" class="ISM-control">
               <title>Control: ism-1607</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[5].group[1].control[6]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Aug-20"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1607_smt">
                  <p>When using a software-based isolation mechanism to share a physical server’s hardware, integrity and log monitoring are performed for the isolation mechanism and underlying operating system in a timely manner.</p>
               </part>
            </control>
            <control id="ism-1461" class="ISM-control">
               <title>Control: ism-1461</title>
               <prop name="sort-id"
                      value="catalog[1].group[15].group[5].group[1].control[7]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="5"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-1461_smt">
                  <p>When using a software-based isolation mechanism to share a physical server’s hardware for SECRET or TOP SECRET computing environments, the physical server and all computing environments are of the same classification and belong to the same security domain.</p>
               </part>
            </control>
         </group>
      </group>
   </group>
   <group>
      <title>Guidelines for System Management</title>
      <prop name="sort-id" value="catalog[1].group[16]"/>
      <group>
         <title>System administration</title>
         <prop name="sort-id" value="catalog[1].group[16].group[1]"/>
         <part name="overview">
            <h1>System administration of cloud services</h1>
            <p>System administration of cloud services brings unique challenges when compared to system administration of on-premises assets. Notably, responsibility for system administration of cloud services is often shared between service providers and their customers. As the system administration processes and procedures implemented by service providers are often opaque to their customers, customers should consider a service provider’s control plane to operate within a different security domain.</p>
            <h1>Further information</h1>
            <p>Further information on system administration can be found in the Australian Cyber Security Centre (ACSC)’s <a href="#131048c7-a2e7-4da3-9257-7a058b06c1f8">Secure Administration</a> publication.</p>
            <p>Further information on the use of privileged accounts for system administration activities can be found in the access to systems and their resources section of the <a href="#7d16ae67-87a7-4861-b939-e13ec279b5a2">Guidelines for Personnel Security</a>.</p>
            <p>Further information on multi-factor authentication can be found in the authentication hardening section of the <a href="#de7525f3-a466-40a5-abdd-3ae24a6d1b44">Guidelines for System Hardening</a>.</p>
            <p>Further information on event logging can be found in the event logging and monitoring section of the <a href="#edc24216-f52b-4513-bcda-5fa564661999">Guidelines for System Monitoring</a>.</p>
            <p>Further information on network segmentation and segregation can be found in the network design and configuration section of the <a href="#f145ff5b-d396-4248-8f48-621349d6f0ed">Guidelines for Networking</a>.</p>
         </part>
         <group>
            <title>System administration processes and procedures</title>
            <prop name="sort-id" value="catalog[1].group[16].group[1].group[1]"/>
            <part name="overview">
               <p>A key component of system administration is ensuring that administrative activities are undertaken in a repeatable and accountable manner using system administration processes and procedures. In doing so, requirements for administrative activities may cover:</p>
               <ul>
                  <li>configuring applications, operating systems, network devices or other ICT equipment</li>
                  <li>applying patches, updates or vendor mitigations to applications, drivers, operating systems or firmware</li>
                  <li>installing or removing applications, operating systems, network devices or other ICT equipment</li>
                  <li>implementing system changes or enhancements</li>
                  <li>resolving problems identified by users.</li>
               </ul>
               <p>Furthermore, in support of change management processes and procedures, system administrators should document requirements for administrative activities, consider potential security impacts, obtain any necessary approvals, notify users of any disruptions or outages, and maintain system and security documentation.</p>
            </part>
            <control id="ism-0042" class="ISM-control">
               <title>Control: ism-0042</title>
               <prop name="sort-id"
                      value="catalog[1].group[16].group[1].group[1].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="6"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0042_smt">
                  <p>System administration processes, and supporting system administration procedures, are developed, implemented and maintained.</p>
               </part>
            </control>
            <control id="ism-1211" class="ISM-control">
               <title>Control: ism-1211</title>
               <prop name="sort-id"
                      value="catalog[1].group[16].group[1].group[1].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="5"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1211_smt">
                  <p>System administrators document requirements for administrative activities, consider potential security impacts, obtain any necessary approvals, notify users of any disruptions or outages, and maintain system and security documentation.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Separate privileged operating environments</title>
            <prop name="sort-id" value="catalog[1].group[16].group[1].group[2]"/>
            <part name="overview">
               <p>One of the greatest threats to the security of networks is the compromise of privileged accounts. Providing a separate privileged operating environment for system administrators, in addition to their unprivileged operating environment, makes it much harder for administrative activities and privileged accounts to be compromised by an adversary.</p>
               <p>Using different physical workstations is the most secure approach to separating privileged and unprivileged operating environments for system administrators. However, a virtualisation-based solution may be sufficient for separating privileged and unprivileged operating environments. In such cases, privileged operating environments should not be virtualised within unprivileged operating environments.</p>
            </part>
            <control id="ism-1380" class="ISM-control">
               <title>Control: ism-1380</title>
               <prop name="sort-id"
                      value="catalog[1].group[16].group[1].group[2].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="5"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML2"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1380_smt">
                  <p>Privileged users use separate privileged and unprivileged operating environments.</p>
               </part>
            </control>
            <control id="ism-1687" class="ISM-control">
               <title>Control: ism-1687</title>
               <prop name="sort-id"
                      value="catalog[1].group[16].group[1].group[2].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML2"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1687_smt">
                  <p>Privileged operating environments are not virtualised within unprivileged operating environments.</p>
               </part>
            </control>
            <control id="ism-1688" class="ISM-control">
               <title>Control: ism-1688</title>
               <prop name="sort-id"
                      value="catalog[1].group[16].group[1].group[2].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML2"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1688_smt">
                  <p>Unprivileged accounts cannot logon to privileged operating environments.</p>
               </part>
            </control>
            <control id="ism-1689" class="ISM-control">
               <title>Control: ism-1689</title>
               <prop name="sort-id"
                      value="catalog[1].group[16].group[1].group[2].control[4]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML2"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1689_smt">
                  <p>Privileged accounts (excluding local administrator accounts) cannot logon to unprivileged operating environments.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Administrative infrastructure</title>
            <prop name="sort-id" value="catalog[1].group[16].group[1].group[3]"/>
            <part name="overview">
               <p>The security of administrative activities can be improved by segregating administrative infrastructure from the wider network. In doing so, the use of a jump server (also known as a jump host or jump box) can be an effective way of simplifying and securing administrative activities. Specifically, a jump server can provide filtering of network management traffic while also acting as a focal point to perform multi-factor authentication; store and manage administrative tools; and perform logging, monitoring and alerting activities. Finally, using separate jump servers for the administration of critical servers, high-value servers and regular servers can further assist in protecting these assets.</p>
            </part>
            <control id="ism-1385" class="ISM-control">
               <title>Control: ism-1385</title>
               <prop name="sort-id"
                      value="catalog[1].group[16].group[1].group[3].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1385_smt">
                  <p>Administrative infrastructure is segregated from the wider network.</p>
               </part>
            </control>
            <control id="ism-1750" class="ISM-control">
               <title>Control: ism-1750</title>
               <prop name="sort-id"
                      value="catalog[1].group[16].group[1].group[3].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1750_smt">
                  <p>Administrative infrastructure for critical servers, high-value servers and regular servers is segregated from each other.</p>
               </part>
            </control>
            <control id="ism-1386" class="ISM-control">
               <title>Control: ism-1386</title>
               <prop name="sort-id"
                      value="catalog[1].group[16].group[1].group[3].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="5"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1386_smt">
                  <p>Network management traffic can only originate from administrative infrastructure.</p>
               </part>
            </control>
            <control id="ism-1387" class="ISM-control">
               <title>Control: ism-1387</title>
               <prop name="sort-id"
                      value="catalog[1].group[16].group[1].group[3].control[4]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML2"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1387_smt">
                  <p>Administrative activities are conducted through jump servers.</p>
               </part>
            </control>
            <control id="ism-1381" class="ISM-control">
               <title>Control: ism-1381</title>
               <prop name="sort-id"
                      value="catalog[1].group[16].group[1].group[3].control[5]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1381_smt">
                  <p>Only privileged operating environments can communicate with jump servers.</p>
               </part>
            </control>
            <control id="ism-1388" class="ISM-control">
               <title>Control: ism-1388</title>
               <prop name="sort-id"
                      value="catalog[1].group[16].group[1].group[3].control[6]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1388_smt">
                  <p>Only jump servers can communicate with assets requiring administrative activities to be performed.</p>
               </part>
            </control>
         </group>
      </group>
      <group>
         <title>System patching</title>
         <prop name="sort-id" value="catalog[1].group[16].group[2]"/>
         <part name="overview">
            <h1>Further information</h1>
            <p>Further information on system patching can be found in the ACSC’s <a href="#02fb4cb5-e4c4-4097-97a2-f1b6aa04131a">Assessing Security Vulnerabilities and Applying Patches</a> publication.</p>
            <p>Further information on patching evaluated products can be found in the evaluated product usage section of the <a href="#a699a3aa-828d-479b-b50b-98127bb19437">Guidelines for Evaluated Products</a>.</p>
            <p>Further information on cessation of support for Microsoft Windows operating systems, including potential compensating controls for use beyond their cessation date for support, can be found in the ACSC’s <a href="#d36ce452-ec21-4b05-89c1-f29a444a3dca">End of Support for Microsoft Windows and Microsoft Windows Server</a> publication.</p>
            <p>Further information on hardening user applications can be found in the user application hardening section of the <a href="#de7525f3-a466-40a5-abdd-3ae24a6d1b44">Guidelines for System Hardening</a>.</p>
            <p>Further information on hardening server applications can be found in the server application hardening section of the <a href="#de7525f3-a466-40a5-abdd-3ae24a6d1b44">Guidelines for System Hardening</a>.</p>
         </part>
         <group>
            <title>Patch management processes and procedures</title>
            <prop name="sort-id" value="catalog[1].group[16].group[2].group[1]"/>
            <part name="overview">
               <p>Applying patches or updates is critical to ensuring the ongoing security of applications, drivers, operating systems and firmware. In doing so, it is important that patches or updates are applied consistently and in a secure manner. For example, by using a centralised and managed approach that maintains the integrity of patches or updates, and confirms that they have been applied successfully.</p>
            </part>
            <control id="ism-1143" class="ISM-control">
               <title>Control: ism-1143</title>
               <prop name="sort-id"
                      value="catalog[1].group[16].group[2].group[1].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="9"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1143_smt">
                  <p>Patch management processes, and supporting patch management procedures, are developed, implemented and maintained.</p>
               </part>
            </control>
            <control id="ism-0298" class="ISM-control">
               <title>Control: ism-0298</title>
               <prop name="sort-id"
                      value="catalog[1].group[16].group[2].group[1].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="8"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0298_smt">
                  <p>A centralised and managed approach that maintains the integrity of patches or updates, and confirms that they have been applied successfully, is used to patch or update applications, operating systems, drivers and firmware.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Software register</title>
            <prop name="sort-id" value="catalog[1].group[16].group[2].group[2]"/>
            <part name="overview">
               <p>To assist with monitoring information sources for details of relevant patches or updates, an organisation should develop, implement, maintain and regularly verify software registers for workstations, servers, network devices and other ICT equipment.</p>
            </part>
            <control id="ism-1493" class="ISM-control">
               <title>Control: ism-1493</title>
               <prop name="sort-id"
                      value="catalog[1].group[16].group[2].group[2].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1493_smt">
                  <p>Software registers for workstations, servers, network devices and other ICT equipment are developed, implemented, maintained and verified on a regular basis.</p>
               </part>
            </control>
            <control id="ism-1643" class="ISM-control">
               <title>Control: ism-1643</title>
               <prop name="sort-id"
                      value="catalog[1].group[16].group[2].group[2].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Jun-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1643_smt">
                  <p>Software registers contain versions and patch histories of applications, drivers, operating systems and firmware.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Scanning for missing patches or updates</title>
            <prop name="sort-id" value="catalog[1].group[16].group[2].group[3]"/>
            <part name="overview">
               <p>To ensure that patches or updates are being applied to applications, operating systems, drivers and firmware, it is essential that an organisation regularly identifies all assets within their environment using an automated method of asset discovery, such as an asset discovery tool or a vulnerability scanner with equivalent functionality. Following asset discovery, identified assets can be scanned for missing patches or updates using a vulnerability scanner with an up-to-date vulnerability database. Ideally, vulnerability scanning should be conducted in an automated manner and take place at half the frequency in which patches or updates need to be applied. For example, if patches or updates are to be applied within two weeks of release then vulnerability scanning should be undertaken at least weekly.</p>
            </part>
            <control id="ism-1807" class="ISM-control">
               <title>Control: ism-1807</title>
               <prop name="sort-id"
                      value="catalog[1].group[16].group[2].group[3].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML2"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1807_smt">
                  <p>An automated method of asset discovery is used at least fortnightly to support the detection of assets for subsequent vulnerability scanning activities.</p>
               </part>
            </control>
            <control id="ism-1808" class="ISM-control">
               <title>Control: ism-1808</title>
               <prop name="sort-id"
                      value="catalog[1].group[16].group[2].group[3].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML2"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1808_smt">
                  <p>A vulnerability scanner with an up-to-date vulnerability database is used for vulnerability scanning activities.</p>
               </part>
            </control>
            <control id="ism-1698" class="ISM-control">
               <title>Control: ism-1698</title>
               <prop name="sort-id"
                      value="catalog[1].group[16].group[2].group[3].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML2"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1698_smt">
                  <p>A vulnerability scanner is used at least daily to identify missing patches or updates for security vulnerabilities in internet-facing services.</p>
               </part>
            </control>
            <control id="ism-1699" class="ISM-control">
               <title>Control: ism-1699</title>
               <prop name="sort-id"
                      value="catalog[1].group[16].group[2].group[3].control[4]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML2"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1699_smt">
                  <p>A vulnerability scanner is used at least weekly to identify missing patches or updates for security vulnerabilities in office productivity suites, web browsers and their extensions, email clients, PDF software, and security products.</p>
               </part>
            </control>
            <control id="ism-1700" class="ISM-control">
               <title>Control: ism-1700</title>
               <prop name="sort-id"
                      value="catalog[1].group[16].group[2].group[3].control[5]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML2"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1700_smt">
                  <p>A vulnerability scanner is used at least fortnightly to identify missing patches or updates for security vulnerabilities in other applications.</p>
               </part>
            </control>
            <control id="ism-1701" class="ISM-control">
               <title>Control: ism-1701</title>
               <prop name="sort-id"
                      value="catalog[1].group[16].group[2].group[3].control[6]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML2"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1701_smt">
                  <p>A vulnerability scanner is used at least daily to identify missing patches or updates for security vulnerabilities in operating systems of internet-facing services.</p>
               </part>
            </control>
            <control id="ism-1702" class="ISM-control">
               <title>Control: ism-1702</title>
               <prop name="sort-id"
                      value="catalog[1].group[16].group[2].group[3].control[7]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML2"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1702_smt">
                  <p>A vulnerability scanner is used at least weekly to identify missing patches or updates for security vulnerabilities in operating systems of workstations, servers and network devices.</p>
               </part>
            </control>
            <control id="ism-1752" class="ISM-control">
               <title>Control: ism-1752</title>
               <prop name="sort-id"
                      value="catalog[1].group[16].group[2].group[3].control[8]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1752_smt">
                  <p>A vulnerability scanner is used at least weekly to identify missing patches or updates for security vulnerabilities in operating systems of other ICT equipment.</p>
               </part>
            </control>
            <control id="ism-1703" class="ISM-control">
               <title>Control: ism-1703</title>
               <prop name="sort-id"
                      value="catalog[1].group[16].group[2].group[3].control[9]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1703_smt">
                  <p>A vulnerability scanner is used at least weekly to identify missing patches or updates for security vulnerabilities in drivers and firmware.</p>
               </part>
            </control>
         </group>
         <group>
            <title>When to patch security vulnerabilities</title>
            <prop name="sort-id" value="catalog[1].group[16].group[2].group[4]"/>
            <part name="overview">
               <p>When patches or updates are released by vendors for security vulnerabilities, an organisation should apply them in a timeframe commensurate with the likelihood of attempted exploitation by an adversary. For example, by prioritising patches or updates for security vulnerabilities in internet-facing services and their operating systems, especially when exploitation code exists or active exploitation is occurring.</p>
               <p>If no patches or updates are available for security vulnerabilities, mitigation advice from vendors, trusted authorities or security researchers may provide some protection until patches or updates are made available. Such mitigation advice may be published in conjunction with, or soon after, announcements made relating to security vulnerabilities. Mitigation advice may cover how to disable or block access to vulnerable functionality, how to reconfigure vulnerable functionality, or how to detect attempted or successful exploitation of vulnerable functionality.</p>
               <p>If a patch or update is released for high assurance ICT equipment, the ACSC will conduct an assessment of the patch or update. Subsequently, if the patch or update is approved for deployment, the ACSC will provide guidance on the methods and timeframes in which it is to be applied.</p>
            </part>
            <control id="ism-1690" class="ISM-control">
               <title>Control: ism-1690</title>
               <prop name="sort-id"
                      value="catalog[1].group[16].group[2].group[4].control[01]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML2"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1690_smt">
                  <p>Patches, updates or vendor mitigations for security vulnerabilities in internet-facing services are applied within two weeks of release, or within 48 hours if an exploit exists.</p>
               </part>
            </control>
            <control id="ism-1691" class="ISM-control">
               <title>Control: ism-1691</title>
               <prop name="sort-id"
                      value="catalog[1].group[16].group[2].group[4].control[02]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML2"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1691_smt">
                  <p>Patches, updates or vendor mitigations for security vulnerabilities in office productivity suites, web browsers and their extensions, email clients, PDF software, and security products are applied within two weeks of release.</p>
               </part>
            </control>
            <control id="ism-1692" class="ISM-control">
               <title>Control: ism-1692</title>
               <prop name="sort-id"
                      value="catalog[1].group[16].group[2].group[4].control[03]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1692_smt">
                  <p>Patches, updates or vendor mitigations for security vulnerabilities in office productivity suites, web browsers and their extensions, email clients, PDF software, and security products are applied within 48 hours if an exploit exists.</p>
               </part>
            </control>
            <control id="ism-1693" class="ISM-control">
               <title>Control: ism-1693</title>
               <prop name="sort-id"
                      value="catalog[1].group[16].group[2].group[4].control[04]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML2"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1693_smt">
                  <p>Patches, updates or vendor mitigations for security vulnerabilities in other applications are applied within one month of release.</p>
               </part>
            </control>
            <control id="ism-1694" class="ISM-control">
               <title>Control: ism-1694</title>
               <prop name="sort-id"
                      value="catalog[1].group[16].group[2].group[4].control[05]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML2"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1694_smt">
                  <p>Patches, updates or vendor mitigations for security vulnerabilities in operating systems of internet-facing services are applied within two weeks of release, or within 48 hours if an exploit exists.</p>
               </part>
            </control>
            <control id="ism-1695" class="ISM-control">
               <title>Control: ism-1695</title>
               <prop name="sort-id"
                      value="catalog[1].group[16].group[2].group[4].control[06]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML2"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1695_smt">
                  <p>Patches, updates or vendor mitigations for security vulnerabilities in operating systems of workstations, servers and network devices are applied within two weeks of release.</p>
               </part>
            </control>
            <control id="ism-1696" class="ISM-control">
               <title>Control: ism-1696</title>
               <prop name="sort-id"
                      value="catalog[1].group[16].group[2].group[4].control[07]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1696_smt">
                  <p>Patches, updates or vendor mitigations for security vulnerabilities in operating systems of workstations, servers and network devices are applied within 48 hours if an exploit exists.</p>
               </part>
            </control>
            <control id="ism-1751" class="ISM-control">
               <title>Control: ism-1751</title>
               <prop name="sort-id"
                      value="catalog[1].group[16].group[2].group[4].control[08]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1751_smt">
                  <p>Patches, updates or vendor mitigations for security vulnerabilities in operating systems of other ICT equipment are applied within two weeks of release, or within 48 hours if an exploit exists.</p>
               </part>
            </control>
            <control id="ism-1697" class="ISM-control">
               <title>Control: ism-1697</title>
               <prop name="sort-id"
                      value="catalog[1].group[16].group[2].group[4].control[09]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1697_smt">
                  <p>Patches, updates or vendor mitigations for security vulnerabilities in drivers and firmware are applied within two weeks of release, or within 48 hours if an exploit exists.</p>
               </part>
            </control>
            <control id="ism-0300" class="ISM-control">
               <title>Control: ism-0300</title>
               <prop name="sort-id"
                      value="catalog[1].group[16].group[2].group[4].control[10]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="8"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-0300_smt">
                  <p>Patches, updates or vendor mitigations for security vulnerabilities in high assurance ICT equipment are applied only when approved by the ACSC, and in doing so, using methods and timeframes prescribed by the ACSC.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Cessation of support</title>
            <prop name="sort-id" value="catalog[1].group[16].group[2].group[5]"/>
            <part name="overview">
               <p>When applications, operating systems, network devices and other ICT equipment reach their cessation date for support, an organisation will find it increasingly difficult to protect them against security vulnerabilities as patches, updates and other forms of support will no longer be made available by vendors. As such, unsupported applications, operating systems, network devices and other ICT equipment should be removed or replaced.</p>
               <p>In planning for cessation of support, it is important to note that while vendors generally advise the cessation date for support of operating systems well in advance, some applications, network devices and other ICT equipment may cease to receive support immediately after newer versions are released.</p>
               <p>Finally, when the immediate removal or replacement of unsupported applications, operating systems, network devices or other ICT equipment is not possible, compensating controls should be implemented until such time that they can be removed or replaced.</p>
            </part>
            <control id="ism-1704" class="ISM-control">
               <title>Control: ism-1704</title>
               <prop name="sort-id"
                      value="catalog[1].group[16].group[2].group[5].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML2"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1704_smt">
                  <p>Internet-facing services, office productivity suites, web browsers and their extensions, email clients, PDF software, Adobe Flash Player, and security products that are no longer supported by vendors are removed.</p>
               </part>
            </control>
            <control id="ism-0304" class="ISM-control">
               <title>Control: ism-0304</title>
               <prop name="sort-id"
                      value="catalog[1].group[16].group[2].group[5].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="6"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-0304_smt">
                  <p>Applications that are no longer supported by vendors are removed.</p>
               </part>
            </control>
            <control id="ism-1501" class="ISM-control">
               <title>Control: ism-1501</title>
               <prop name="sort-id"
                      value="catalog[1].group[16].group[2].group[5].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML2"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1501_smt">
                  <p>Operating systems that are no longer supported by vendors are replaced.</p>
               </part>
            </control>
            <control id="ism-1753" class="ISM-control">
               <title>Control: ism-1753</title>
               <prop name="sort-id"
                      value="catalog[1].group[16].group[2].group[5].control[4]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1753_smt">
                  <p>Network devices and other ICT equipment that are no longer supported by vendors are replaced.</p>
               </part>
            </control>
            <control id="ism-1809" class="ISM-control">
               <title>Control: ism-1809</title>
               <prop name="sort-id"
                      value="catalog[1].group[16].group[2].group[5].control[5]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1809_smt">
                  <p>When applications, operating systems, network devices or other ICT equipment that are no longer supported by vendors cannot be immediately removed or replaced, compensating controls are implemented until such time that they can be removed or replaced.</p>
               </part>
            </control>
         </group>
      </group>
      <group>
         <title>Data backup and restoration</title>
         <prop name="sort-id" value="catalog[1].group[16].group[3]"/>
         <part name="overview">
            <h1>Further information</h1>
            <p>Further information on <a href="#53da8dba-961e-4222-94e0-68cb9510384d">digital preservation planning</a> and <a href="#348be728-4459-4447-990e-1dfb3049c71f">data retention</a> is available from the National Archives of Australia.</p>
            <p>Further information on the collection and retention of personal information can be found in the Office of the Australian Information Commissioner’s <a href="#bac2c6f2-9356-46d2-b7c4-9af7393008df">Australian Privacy Principles</a> and the associated <a href="#1e4a57a2-2832-441d-8ea4-12a98d2be417">Australian Privacy Principles guidelines</a>.</p>
            <p>Further information on business continuity and disaster recovery planning can be found in the Chief Information Security Officer section of the <a href="#626dab35-81ab-45fe-8c12-0faff1c23c07">Guidelines for Cyber Security Roles</a>.</p>
         </part>
         <group>
            <title>Digital preservation policy</title>
            <prop name="sort-id" value="catalog[1].group[16].group[3].group[1]"/>
            <part name="overview">
               <p>Developing, implementing and maintaining a digital preservation policy, as part of digital continuity planning, can assist in ensuring the long term integrity and availability of important data is maintained, especially when taking into account the potential for data degradation and removable media, hardware and software obsolesce.</p>
            </part>
            <control id="ism-1510" class="ISM-control">
               <title>Control: ism-1510</title>
               <prop name="sort-id"
                      value="catalog[1].group[16].group[3].group[1].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1510_smt">
                  <p>A digital preservation policy is developed, implemented and maintained.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Data backup and restoration processes and procedures</title>
            <prop name="sort-id" value="catalog[1].group[16].group[3].group[2]"/>
            <part name="overview">
               <p>Having data backup and restoration processes and procedures is an important part of business continuity and disaster recovery planning. Such activities will also form an integral part of an overarching digital preservation policy.</p>
            </part>
            <control id="ism-1547" class="ISM-control">
               <title>Control: ism-1547</title>
               <prop name="sort-id"
                      value="catalog[1].group[16].group[3].group[2].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1547_smt">
                  <p>Data backup processes, and supporting data backup procedures, are developed, implemented and maintained.</p>
               </part>
            </control>
            <control id="ism-1548" class="ISM-control">
               <title>Control: ism-1548</title>
               <prop name="sort-id"
                      value="catalog[1].group[16].group[3].group[2].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1548_smt">
                  <p>Data restoration processes, and supporting data restoration procedures, are developed, implemented and maintained.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Performing and retaining backups</title>
            <prop name="sort-id" value="catalog[1].group[16].group[3].group[3]"/>
            <part name="overview">
               <p>To mitigate the security risk of losing system availability or important data as part of a ransomware attack, or other form of destructive attack, backups of important data, software and configuration settings should be performed and retained with a frequency and retention timeframe in accordance with an organisation’s business continuity requirements. In doing so, backups of all important data, software and configuration settings should be synchronised to enable restoration to a common point in time. Furthermore, it is essential that all backups are retained in a secure and resilient manner. This will ensure that should a system fall victim to a ransomware attack, or other form of destructive attack, important data will not be lost and, if necessary, systems can be quickly restored.</p>
            </part>
            <control id="ism-1511" class="ISM-control">
               <title>Control: ism-1511</title>
               <prop name="sort-id"
                      value="catalog[1].group[16].group[3].group[3].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML2"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1511_smt">
                  <p>Backups of important data, software and configuration settings are performed and retained with a frequency and retention timeframe in accordance with business continuity requirements.</p>
               </part>
            </control>
            <control id="ism-1810" class="ISM-control">
               <title>Control: ism-1810</title>
               <prop name="sort-id"
                      value="catalog[1].group[16].group[3].group[3].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML2"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1810_smt">
                  <p>Backups of important data, software and configuration settings are synchronised to enable restoration to a common point in time.</p>
               </part>
            </control>
            <control id="ism-1811" class="ISM-control">
               <title>Control: ism-1811</title>
               <prop name="sort-id"
                      value="catalog[1].group[16].group[3].group[3].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML2"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1811_smt">
                  <p>Backups of important data, software and configuration settings are retained in a secure and resilient manner.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Backup access</title>
            <prop name="sort-id" value="catalog[1].group[16].group[3].group[4]"/>
            <part name="overview">
               <p>To mitigate the security risk of unauthorised access to backups, an organisation should ensure that access to backups is controlled through the use of appropriate access controls.</p>
            </part>
            <control id="ism-1812" class="ISM-control">
               <title>Control: ism-1812</title>
               <prop name="sort-id"
                      value="catalog[1].group[16].group[3].group[4].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML2"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1812_smt">
                  <p>Unprivileged accounts cannot access backups belonging to other accounts.</p>
               </part>
            </control>
            <control id="ism-1813" class="ISM-control">
               <title>Control: ism-1813</title>
               <prop name="sort-id"
                      value="catalog[1].group[16].group[3].group[4].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1813_smt">
                  <p>Unprivileged accounts cannot access their own backups.</p>
               </part>
            </control>
            <control id="ism-1705" class="ISM-control">
               <title>Control: ism-1705</title>
               <prop name="sort-id"
                      value="catalog[1].group[16].group[3].group[4].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML2"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1705_smt">
                  <p>Privileged accounts (excluding backup administrator accounts) cannot access backups belonging to other accounts.</p>
               </part>
            </control>
            <control id="ism-1706" class="ISM-control">
               <title>Control: ism-1706</title>
               <prop name="sort-id"
                      value="catalog[1].group[16].group[3].group[4].control[4]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1706_smt">
                  <p>Privileged accounts (excluding backup administrator accounts) cannot access their own backups.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Backup modification and deletion</title>
            <prop name="sort-id" value="catalog[1].group[16].group[3].group[5]"/>
            <part name="overview">
               <p>To mitigate the security risk of backups being accidentally or maliciously modified or deleted, an organisation should ensure that backups are sufficiently protected from unauthorised modification and deletion through the use of appropriate access controls during their retention period.</p>
            </part>
            <control id="ism-1814" class="ISM-control">
               <title>Control: ism-1814</title>
               <prop name="sort-id"
                      value="catalog[1].group[16].group[3].group[5].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML2"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1814_smt">
                  <p>Unprivileged accounts are prevented from modifying and deleting backups.</p>
               </part>
            </control>
            <control id="ism-1707" class="ISM-control">
               <title>Control: ism-1707</title>
               <prop name="sort-id"
                      value="catalog[1].group[16].group[3].group[5].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML2"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1707_smt">
                  <p>Privileged accounts (excluding backup administrator accounts) are prevented from modifying and deleting backups.</p>
               </part>
            </control>
            <control id="ism-1708" class="ISM-control">
               <title>Control: ism-1708</title>
               <prop name="sort-id"
                      value="catalog[1].group[16].group[3].group[5].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1708_smt">
                  <p>Privileged accounts (including backup administrator accounts) are prevented from modifying and deleting backups during their retention period.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Testing restoration of backups</title>
            <prop name="sort-id" value="catalog[1].group[16].group[3].group[6]"/>
            <part name="overview">
               <p>To ensure that backups can be restored when the need arises, and that any dependencies can be identified and managed beforehand, it is important that the restoration of important data, software and configuration settings from backups to a common point in time is tested in a coordinated manner as part of disaster recovery exercises.</p>
            </part>
            <control id="ism-1515" class="ISM-control">
               <title>Control: ism-1515</title>
               <prop name="sort-id"
                      value="catalog[1].group[16].group[3].group[6].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML2"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1515_smt">
                  <p>Restoration of important data, software and configuration settings from backups to a common point of time is tested as part of disaster recovery exercises.</p>
               </part>
            </control>
         </group>
      </group>
   </group>
   <group>
      <title>Guidelines for System Monitoring</title>
      <prop name="sort-id" value="catalog[1].group[17]"/>
      <group>
         <title>Event logging and monitoring</title>
         <prop name="sort-id" value="catalog[1].group[17].group[1]"/>
         <part name="overview">
            <h1>Further information</h1>
            <p>Further information on logging intrusion activity can be found in the managing cyber security incidents section of the <a href="#fe0138db-e83b-4a23-85d3-d84e1c22816f">Guidelines for Cyber Security Incidents</a>.</p>
            <p>Further information on event logging for Cross Domain Solutions can be found in the Cross Domain Solutions section of the <a href="#e8bde527-526c-4a6a-b66f-05228f09dd7b">Guidelines for Gateways</a>.</p>
            <p>Further information on event logging for databases can be found in the databases section of the <a href="#3f349d16-11a1-459a-a299-c9446aea7597">Guidelines for Database Systems</a>.</p>
            <p>Further information on event logging for gateways can be found in the gateways section of the <a href="#e8bde527-526c-4a6a-b66f-05228f09dd7b">Guidelines for Gateways</a>.</p>
            <p>Further information on event logging for operating systems can be found in the operating system hardening and authentication hardening sections of the <a href="#de7525f3-a466-40a5-abdd-3ae24a6d1b44">Guidelines for System Hardening</a>.</p>
            <p>Further information on event logging for application-based security services can be found in the operating system hardening section of the <a href="#de7525f3-a466-40a5-abdd-3ae24a6d1b44">Guidelines for System Hardening</a>.</p>
            <p>Further information on event logging for network-based security services can be found in the network design and configuration section of the <a href="#f145ff5b-d396-4248-8f48-621349d6f0ed">Guidelines for Networking</a>.</p>
            <p>Further information on event logging for server applications can be found in the server application hardening section of the <a href="#de7525f3-a466-40a5-abdd-3ae24a6d1b44">Guidelines for System Hardening</a>.</p>
            <p>Further information on event logging for system access can be found in the access to systems and their resources section of the <a href="#7d16ae67-87a7-4861-b939-e13ec279b5a2">Guidelines for Personnel Security</a>.</p>
            <p>Further information on event logging for user applications can be found in the user application hardening section of the <a href="#de7525f3-a466-40a5-abdd-3ae24a6d1b44">Guidelines for System Hardening</a>.</p>
            <p>Further information on event logging for web applications can be found in the web application development section of the <a href="#506198a8-7ae8-4c95-8b7b-2a4833cfab4b">Guidelines for Software Development</a>.</p>
            <p>Further information on event logging for web proxies can be found in the web proxies section of the <a href="#e8bde527-526c-4a6a-b66f-05228f09dd7b">Guidelines for Gateways</a>.</p>
            <p>Further information on event logging and forwarding can be found in the Australian Cyber Security Centre’s <a href="#de239dae-d1e8-4969-9680-ef3444d32a83">Windows Event Logging and Forwarding</a> publication.</p>
         </part>
         <group>
            <title>Event logging policy</title>
            <prop name="sort-id" value="catalog[1].group[17].group[1].group[1]"/>
            <part name="overview">
               <p>By developing an event logging policy, taking into consideration any shared responsibilities between service providers and their customers, an organisation can improve their chances of detecting malicious behaviour on their systems. In doing so, an event logging policy should cover details of events to be logged, event logging facilities to be used, how event logs will be monitored and how long to retain event logs.</p>
            </part>
            <control id="ism-0580" class="ISM-control">
               <title>Control: ism-0580</title>
               <prop name="sort-id"
                      value="catalog[1].group[17].group[1].group[1].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="7"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0580_smt">
                  <p>An event logging policy is developed, implemented and maintained.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Event log details</title>
            <prop name="sort-id" value="catalog[1].group[17].group[1].group[2]"/>
            <part name="overview">
               <p>For each event logged, sufficient detail needs to be recorded in order for the event log to be useful.</p>
            </part>
            <control id="ism-0585" class="ISM-control">
               <title>Control: ism-0585</title>
               <prop name="sort-id"
                      value="catalog[1].group[17].group[1].group[2].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="5"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0585_smt">
                  <p>For each event logged, the date and time of the event, the relevant user or process, the relevant filename, the event description, and the ICT equipment involved are recorded.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Centralised event logging facility</title>
            <prop name="sort-id" value="catalog[1].group[17].group[1].group[3]"/>
            <part name="overview">
               <p>A centralised event logging facility can be used to capture, protect and manage event logs from multiple sources in a coordinated manner. This may be achieved by using a Security Information and Event Management solution. Furthermore, in support of a centralised event logging facility, it is important that an accurate time source is established and used consistently across systems to assist with identifying connections between events.</p>
            </part>
            <control id="ism-1405" class="ISM-control">
               <title>Control: ism-1405</title>
               <prop name="sort-id"
                      value="catalog[1].group[17].group[1].group[3].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1405_smt">
                  <p>A centralised event logging facility is implemented and event logs are sent to the facility as soon as possible after they occur.</p>
               </part>
            </control>
            <control id="ism-1815" class="ISM-control">
               <title>Control: ism-1815</title>
               <prop name="sort-id"
                      value="catalog[1].group[17].group[1].group[3].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1815_smt">
                  <p>Event logs stored within a centralised event logging facility are protected from unauthorised modification and deletion.</p>
               </part>
            </control>
            <control id="ism-0988" class="ISM-control">
               <title>Control: ism-0988</title>
               <prop name="sort-id"
                      value="catalog[1].group[17].group[1].group[3].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="6"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0988_smt">
                  <p>An accurate time source is established and used consistently across systems to assist with identifying connections between events.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Event log monitoring</title>
            <prop name="sort-id" value="catalog[1].group[17].group[1].group[4]"/>
            <part name="overview">
               <p>Event log monitoring is critical to maintaining the security posture of systems. Notably, such activities involve analysing event logs in a timely manner to detect cyber security events, thereby, leading to the identification of cyber security incidents.</p>
            </part>
            <control id="ism-0109" class="ISM-control">
               <title>Control: ism-0109</title>
               <prop name="sort-id"
                      value="catalog[1].group[17].group[1].group[4].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="8"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-0109_smt">
                  <p>Event logs are analysed in a timely manner to detect cyber security events.</p>
               </part>
            </control>
            <control id="ism-1228" class="ISM-control">
               <title>Control: ism-1228</title>
               <prop name="sort-id"
                      value="catalog[1].group[17].group[1].group[4].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <prop name="essential-eight-applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ML3"/>
               <part name="statement" id="ism-1228_smt">
                  <p>Cyber security events are analysed in a timely manner to identify cyber security incidents.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Event log retention</title>
            <prop name="sort-id" value="catalog[1].group[17].group[1].group[5]"/>
            <part name="overview">
               <p>The retention of event logs is integral to system monitoring, hunt and incident response activities. As such, event logs for Cross Domain Solutions, databases, Domain Name System services, email servers, gateways, operating systems, remote access services, security services, server applications, system access, user applications, web applications and web proxies should be retained for a suitable period of time to facilitate these activities.</p>
            </part>
            <control id="ism-0859" class="ISM-control">
               <title>Control: ism-0859</title>
               <prop name="sort-id"
                      value="catalog[1].group[17].group[1].group[5].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-23"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0859_smt">
                  <p>Event logs, excluding those for Domain Name System services and web proxies, are retained for at least seven years.</p>
               </part>
            </control>
            <control id="ism-0991" class="ISM-control">
               <title>Control: ism-0991</title>
               <prop name="sort-id"
                      value="catalog[1].group[17].group[1].group[5].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="6"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-23"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0991_smt">
                  <p>Event logs for Domain Name System services and web proxies are retained for at least 18 months.</p>
               </part>
            </control>
         </group>
      </group>
   </group>
   <group>
      <title>Guidelines for Software Development</title>
      <prop name="sort-id" value="catalog[1].group[18]"/>
      <group>
         <title>Application development</title>
         <prop name="sort-id" value="catalog[1].group[18].group[1]"/>
         <part name="overview">
            <h1>Types of application development</h1>
            <p>These guidelines are applicable to both traditional application development and mobile application development.</p>
            <h1>Further information</h1>
            <p>Further information on a secure development life cycle model, known as <a href="#3ec0f0b2-5565-46ad-a1e8-e39cb2219bd2">The Trustworthy Computing Security Development Lifecycle</a>, is available from Microsoft.</p>
            <p>Further information on a secure software development framework can be found in National Institute of Standards and Technology Special Publication 800-218, <a href="#6f1f2f2b-abe6-46e4-9c9d-8339f1d9dab7">Secure Software Development Framework (SSDF) Version 1.1: Recommendations for Mitigating the Risk of Software Vulnerabilities</a>.</p>
            <p>Further information on memory-safe programming languages can be found in the United States’ National Security Agency’s <a href="#26137381-dc34-485c-8331-3bc9876ed48c">Software Memory Safety</a> publication.</p>
            <p>Further information on <a href="#672e85cc-2d40-46ba-9e94-c604b9731c75">secure programming practices</a> is available from the Carnegie Mellon University’s Software Engineering Institute.</p>
            <p>Further information on <a href="#d0ace151-3c21-49af-bde7-eda58ab18a82">cyber supply chain transparency</a>, and recommended content for a software bill of materials, can be found in the United States’ National Telecommunications and Information Administration’s <a href="#70371e26-f3fb-4b05-85ea-7f6e1f2ee184">The Minimum Elements For a Software Bill of Materials (SBOM)</a> publication.</p>
            <p>Further information on implementing a vulnerability disclosure program can be found in:</p>
            <ul>
               <li>Google’s <a href="#78a48231-9963-4f78-962a-861c96c58ead">Starting a Vulnerability Disclosure Program</a>
               </li>
               <li>European Union Agency for Cybersecurity’s <a href="#9a69d597-080f-4d03-b32b-d926f0b87e33">Good Practice Guide on Vulnerability Disclosure</a>
               </li>
               <li>Netherland’s National Cyber Security Centre’s <a href="#dbd0372b-b758-46b1-bf05-d9676689d5b0">Coordinated Vulnerability Disclosure: The Guideline</a>
               </li>
               <li>Carnegie Mellon University’s <a href="#7ffd20ed-4f40-43be-a37b-97e7a1b31e2f">The CERT Guide to Coordinated Vulnerability Disclosure</a>
               </li>
               <li>International Organization for Standardization/International Electrotechnical Commission 29147:2018, <a href="#8f1965a9-a6a1-4342-bfb8-797ea358db30">Information technology – Security techniques – Vulnerability disclosure</a>
               </li>
               <li>International Organization for Standardization/International Electrotechnical Commission 30111:2019, <a href="#99c117f0-78e0-4196-adc8-705405d996bc">Information technology – Security techniques – Vulnerability handling processes</a>.</li>
            </ul>
            <p>Further information on <a href="#24eb9af8-fb43-4772-a461-2c36dd0f6d7e">recommended contents for a ‘security.txt’ file</a> is available to assist an organisation with their implementation.</p>
            <p>Further information on <a href="#03f761fa-7014-459c-aa16-02c303d50abb">reporting security vulnerabilities</a> to the ACSC as an independent coordinator is available from the ACSC.</p>
         </part>
         <group>
            <title>Development, testing and production environments</title>
            <prop name="sort-id" value="catalog[1].group[18].group[1].group[1]"/>
            <part name="overview">
               <p>Segregating development, testing and production environments, and associated data, can limit the spread of malicious code and minimises the likelihood of faulty code being introduced into a production environment. Furthermore, protecting the authoritative source for software is critical to preventing malicious code being surreptitiously introduced into software.</p>
            </part>
            <control id="ism-0400" class="ISM-control">
               <title>Control: ism-0400</title>
               <prop name="sort-id"
                      value="catalog[1].group[18].group[1].group[1].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="5"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Aug-20"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0400_smt">
                  <p>Development, testing and production environments are segregated.</p>
               </part>
            </control>
            <control id="ism-1419" class="ISM-control">
               <title>Control: ism-1419</title>
               <prop name="sort-id"
                      value="catalog[1].group[18].group[1].group[1].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-18"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1419_smt">
                  <p>Development and modification of software only takes place in development environments.</p>
               </part>
            </control>
            <control id="ism-1420" class="ISM-control">
               <title>Control: ism-1420</title>
               <prop name="sort-id"
                      value="catalog[1].group[18].group[1].group[1].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1420_smt">
                  <p>Data from production environments is not used in a development or testing environment unless the environment is secured to the same level as the production environment.</p>
               </part>
            </control>
            <control id="ism-1422" class="ISM-control">
               <title>Control: ism-1422</title>
               <prop name="sort-id"
                      value="catalog[1].group[18].group[1].group[1].control[4]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-18"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1422_smt">
                  <p>Unauthorised access to the authoritative source for software is prevented.</p>
               </part>
            </control>
            <control id="ism-1816" class="ISM-control">
               <title>Control: ism-1816</title>
               <prop name="sort-id"
                      value="catalog[1].group[18].group[1].group[1].control[5]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1816_smt">
                  <p>Unauthorised modification of the authoritative source for software is prevented.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Secure software design and development</title>
            <prop name="sort-id" value="catalog[1].group[18].group[1].group[2]"/>
            <part name="overview">
               <p>The use of secure-by-design and secure-by-default principles, memory-safe programming languages (such as C#, Go, Java, Ruby, Rust and Swift), and secure programming practices, that are supported by agile software development practices and threat modelling, are an important part of application development as they can assist with the identification and mitigation of at risk software components and risky programming practices. In addition, providing mechanisms to assist in determining the authenticity and integrity of applications, while configuring them in a secure manner, can assist with software supply chain security activities.</p>
            </part>
            <control id="ism-0401" class="ISM-control">
               <title>Control: ism-0401</title>
               <prop name="sort-id"
                      value="catalog[1].group[18].group[1].group[2].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="6"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-23"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0401_smt">
                  <p>Secure-by-design and secure-by-default principles, use of memory-safe programming languages where possible, and secure programming practices are used as part of application development.</p>
               </part>
            </control>
            <control id="ism-1780" class="ISM-control">
               <title>Control: ism-1780</title>
               <prop name="sort-id"
                      value="catalog[1].group[18].group[1].group[2].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Jun-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1780_smt">
                  <p>SecDevOps practices are used for application development.</p>
               </part>
            </control>
            <control id="ism-1238" class="ISM-control">
               <title>Control: ism-1238</title>
               <prop name="sort-id"
                      value="catalog[1].group[18].group[1].group[2].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1238_smt">
                  <p>Threat modelling is used in support of application development.</p>
               </part>
            </control>
            <control id="ism-1796" class="ISM-control">
               <title>Control: ism-1796</title>
               <prop name="sort-id"
                      value="catalog[1].group[18].group[1].group[2].control[4]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1796_smt">
                  <p>Files containing executable content are digitally signed as part of application development.</p>
               </part>
            </control>
            <control id="ism-1797" class="ISM-control">
               <title>Control: ism-1797</title>
               <prop name="sort-id"
                      value="catalog[1].group[18].group[1].group[2].control[5]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1797_smt">
                  <p>Installers, patches and updates are digitally signed or provided with cryptographic checksums as part of application development.</p>
               </part>
            </control>
            <control id="ism-1798" class="ISM-control">
               <title>Control: ism-1798</title>
               <prop name="sort-id"
                      value="catalog[1].group[18].group[1].group[2].control[6]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1798_smt">
                  <p>Secure configuration guidance is produced as part of application development.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Software bill of materials</title>
            <prop name="sort-id" value="catalog[1].group[18].group[1].group[3]"/>
            <part name="overview">
               <p>A software bill of materials is a list of open source and commercial software components used in application development. This can assist in providing greater cyber supply chain transparency for consumers by allowing for easier identification and management of security risks associated with individual software components used by applications.</p>
            </part>
            <control id="ism-1730" class="ISM-control">
               <title>Control: ism-1730</title>
               <prop name="sort-id"
                      value="catalog[1].group[18].group[1].group[3].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1730_smt">
                  <p>A software bill of materials is produced and made available to consumers of software.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Application security testing</title>
            <prop name="sort-id" value="catalog[1].group[18].group[1].group[4]"/>
            <part name="overview">
               <p>Application security testing can assist software developers in identifying security vulnerabilities in their applications. In doing so, both static application security testing, as well as dynamic application security testing, should be performed in order to achieve comprehensive test coverage. Furthermore, software developers may choose to use an additional independent party to assist with removing any potential for bias that might occur when they test their own applications.</p>
            </part>
            <control id="ism-0402" class="ISM-control">
               <title>Control: ism-0402</title>
               <prop name="sort-id"
                      value="catalog[1].group[18].group[1].group[4].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="5"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-23"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0402_smt">
                  <p>Applications are comprehensively tested for security vulnerabilities, using both static application security testing and dynamic application security testing, prior to their initial release and any subsequent releases.</p>
               </part>
            </control>
            <control id="ism-1754" class="ISM-control">
               <title>Control: ism-1754</title>
               <prop name="sort-id"
                      value="catalog[1].group[18].group[1].group[4].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1754_smt">
                  <p>Security vulnerabilities identified in applications are resolved by software developers.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Vulnerability disclosure program</title>
            <prop name="sort-id" value="catalog[1].group[18].group[1].group[5]"/>
            <part name="overview">
               <p>Implementing a vulnerability disclosure program, based on responsible disclosure, can assist an organisation to improve the security of their products and services as it provides a way for security researchers and other members of the public to responsibly notify them of security vulnerabilities in a coordinated manner. Furthermore, following the verification and resolution of reported security vulnerabilities, it can assist an organisation in notifying their customers of security vulnerabilities that have been discovered in their products and services, and any patches, updates or vendor mitigations that should be applied.</p>
               <p>A vulnerability disclosure program should include processes and procedures for receiving, verifying, resolving and reporting security vulnerabilities disclosed by both internal and external parties. In support of this, a vulnerability disclosure policy should be made publicly available that covers:</p>
               <ul>
                  <li>the purpose of the vulnerability disclosure program</li>
                  <li>types of security research that are and are not allowed</li>
                  <li>how to report any security vulnerabilities</li>
                  <li>actions, and associated timeframes, upon notification of security vulnerabilities</li>
                  <li>expectations regarding the public disclosure of security vulnerabilities</li>
                  <li>any recognition or reward for finders of security vulnerabilities.</li>
               </ul>
               <p>Finally, the Australian Cyber Security Centre (ACSC) encourages security researchers and other members of the public to responsibly report security vulnerabilities directly to an organisation. However, the ACSC recognises that this is not always practical, initial attempts at communication may be unsuccessful or the person making the report may not wish to do so directly. In such cases, security vulnerabilities can be reported to the ACSC as an independent coordinator.</p>
            </part>
            <control id="ism-1616" class="ISM-control">
               <title>Control: ism-1616</title>
               <prop name="sort-id"
                      value="catalog[1].group[18].group[1].group[5].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Aug-20"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1616_smt">
                  <p>A vulnerability disclosure program is implemented to assist with the secure development and maintenance of products and services.</p>
               </part>
            </control>
            <control id="ism-1755" class="ISM-control">
               <title>Control: ism-1755</title>
               <prop name="sort-id"
                      value="catalog[1].group[18].group[1].group[5].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1755_smt">
                  <p>A vulnerability disclosure policy is developed, implemented and maintained.</p>
               </part>
            </control>
            <control id="ism-1756" class="ISM-control">
               <title>Control: ism-1756</title>
               <prop name="sort-id"
                      value="catalog[1].group[18].group[1].group[5].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1756_smt">
                  <p>Vulnerability disclosure processes, and supporting vulnerability disclosure procedures, are developed, implemented and maintained.</p>
               </part>
            </control>
            <control id="ism-1717" class="ISM-control">
               <title>Control: ism-1717</title>
               <prop name="sort-id"
                      value="catalog[1].group[18].group[1].group[5].control[4]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1717_smt">
                  <p>A ‘security.txt’ file is hosted for all internet-facing organisational domains to assist in the responsible disclosure of security vulnerabilities in an organisation’s products and services.</p>
               </part>
            </control>
         </group>
      </group>
      <group>
         <title>Web application development</title>
         <prop name="sort-id" value="catalog[1].group[18].group[2]"/>
         <part name="overview">
            <h1>Further information</h1>
            <p>Further information on web application security can be found in the <a href="#d2f005c5-2ad3-4b5e-9eb1-d0642f3560f4">OWASP Application Security Verification Standard</a> and <a href="#18274424-7086-419e-9fae-a6ba64870459">OWASP Top Ten Proactive Controls</a> publications.</p>
            <p>Further information on web application security risks can be found in the <a href="#436de247-4c95-4449-89a4-fec912605e7d">OWASP Top 10</a> publication.</p>
            <p>Further information on implementing HTTPS can be found in the ACSC’s <a href="#b8cdbf18-31cb-4e10-bb43-e8488ee8c2f6">Implementing Certificates, TLS, HTTPS and Opportunistic TLS</a> publication.</p>
            <p>Further information on using TLS in HTTPS can be found in the Transport Layer Security section of the <a href="#195abe87-bb1e-4006-8b42-eaecca4d51f1">Guidelines for Cryptography</a>.</p>
            <p>Further information on web application security can be found in the ACSC’s <a href="#b3fa2724-3a61-4d68-843a-61cab9e28750">Protecting Web Applications and Users</a> and <a href="#baf3f7d2-750f-43c8-b805-8fc10228a6fd">Securing Content Management Systems</a> publications.</p>
            <p>Further information on API security can be found in the <a href="#76087ab6-88d4-4610-9a98-6ddc5f7bd7e6">OWASP API Security Top 10</a> publication.</p>
            <p>Further information on strong authentication can be found in the authentication hardening section of the <a href="#de7525f3-a466-40a5-abdd-3ae24a6d1b44">Guidelines for System Hardening</a>.</p>
            <p>Further information on event logging can be found in the event logging and monitoring section of the <a href="#edc24216-f52b-4513-bcda-5fa564661999">Guidelines for System Monitoring</a>.</p>
         </part>
         <group>
            <title>Open Web Application Security Projects</title>
            <prop name="sort-id" value="catalog[1].group[18].group[2].group[1]"/>
            <part name="overview">
               <p>The Open Web Application Security Project (OWASP) provides comprehensive resources for software developers that should be followed when developing web applications.</p>
            </part>
            <control id="ism-0971" class="ISM-control">
               <title>Control: ism-0971</title>
               <prop name="sort-id"
                      value="catalog[1].group[18].group[2].group[1].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="8"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-23"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0971_smt">
                  <p>The OWASP Application Security Verification Standard is used in the development of web applications.</p>
               </part>
            </control>
            <control id="ism-1849" class="ISM-control">
               <title>Control: ism-1849</title>
               <prop name="sort-id"
                      value="catalog[1].group[18].group[2].group[1].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-23"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1849_smt">
                  <p>The OWASP Top Ten Proactive Controls are used in the development of web applications.</p>
               </part>
            </control>
            <control id="ism-1850" class="ISM-control">
               <title>Control: ism-1850</title>
               <prop name="sort-id"
                      value="catalog[1].group[18].group[2].group[1].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-23"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1850_smt">
                  <p>The OWASP Top 10 are mitigated in the development of web applications.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Web application frameworks</title>
            <prop name="sort-id" value="catalog[1].group[18].group[2].group[2]"/>
            <part name="overview">
               <p>Web application frameworks can be leveraged by software developers to enhance the security of web applications while decreasing development time. These resources can assist in securely implementing complex software functions, such as session management, input handling and cryptographic operations.</p>
            </part>
            <control id="ism-1239" class="ISM-control">
               <title>Control: ism-1239</title>
               <prop name="sort-id"
                      value="catalog[1].group[18].group[2].group[2].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1239_smt">
                  <p>Robust web application frameworks are used in the development of web applications.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Web application interactions</title>
            <prop name="sort-id" value="catalog[1].group[18].group[2].group[3]"/>
            <part name="overview">
               <p>Hypertext Transfer Protocol Secure (HTTPS) is the Hypertext Transfer Protocol secured by Transport Layer Security (TLS) encryption. The use of HTTPS for web applications can assist in ensuring that interactions with web applications are confidential and that the integrity of such interactions are also maintained.</p>
            </part>
            <control id="ism-1552" class="ISM-control">
               <title>Control: ism-1552</title>
               <prop name="sort-id"
                      value="catalog[1].group[18].group[2].group[3].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Oct-19"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1552_smt">
                  <p>All web application content is offered exclusively using HTTPS.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Web application programming interfaces</title>
            <prop name="sort-id" value="catalog[1].group[18].group[2].group[4]"/>
            <part name="overview">
               <p>Web application programming interfaces (APIs) can facilitate the exchange of data between computing devices. However, poorly-secured web APIs might facilitate unauthorised access to data not authorised for release into the public domain. In addition, poorly-secured web APIs might facilitate unauthorised modification of data. In such cases, ensuring authentication and authorisation of clients is performed when clients call web APIs can assist in mitigating unauthorised access to, or modification of, data.</p>
            </part>
            <control id="ism-1817" class="ISM-control">
               <title>Control: ism-1817</title>
               <prop name="sort-id"
                      value="catalog[1].group[18].group[2].group[4].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-23"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1817_smt">
                  <p>Authentication and authorisation of clients is performed when clients call web APIs that facilitate access to data not authorised for release into the public domain.</p>
               </part>
            </control>
            <control id="ism-1818" class="ISM-control">
               <title>Control: ism-1818</title>
               <prop name="sort-id"
                      value="catalog[1].group[18].group[2].group[4].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-23"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1818_smt">
                  <p>Authentication and authorisation of clients is performed when clients call web APIs that facilitate modification of data.</p>
               </part>
            </control>
            <control id="ism-1851" class="ISM-control">
               <title>Control: ism-1851</title>
               <prop name="sort-id"
                      value="catalog[1].group[18].group[2].group[4].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-23"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1851_smt">
                  <p>The OWASP API Security Top 10 are mitigated in the development of web APIs.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Web application input handling</title>
            <prop name="sort-id" value="catalog[1].group[18].group[2].group[5]"/>
            <part name="overview">
               <p>Most web application security vulnerabilities are caused by a lack of secure input handling. As such, it is essential that web applications do not trust any input, such as website addresses and their parameters, Hypertext Markup Language (HTML) form data, cookie values, or request headers, without performing validation or sanitisation. Examples of validation and sanitisation include ensuring a telephone form field contains only numerals, ensuring data used in a Structured Query Language query is sanitised properly and ensuring Unicode input is handled appropriately.</p>
            </part>
            <control id="ism-1240" class="ISM-control">
               <title>Control: ism-1240</title>
               <prop name="sort-id"
                      value="catalog[1].group[18].group[2].group[5].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1240_smt">
                  <p>Validation or sanitisation is performed on all input handled by web applications.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Web application output encoding</title>
            <prop name="sort-id" value="catalog[1].group[18].group[2].group[6]"/>
            <part name="overview">
               <p>The likelihood of cross-site scripting and other content injection attacks can be reduced through the use of output encoding. In particular, output encoding is useful when external data sources, which may not be subject to the same level of input filtering, are output to users. The most common example of output encoding is the conversion of potentially dangerous HTML characters into their encoded equivalents, such as ‘&lt;’, ‘&gt;’ and ‘&amp;’ into ‘&amp;lt;’, ‘&amp;gt;’ and ‘&amp;amp;’.</p>
            </part>
            <control id="ism-1241" class="ISM-control">
               <title>Control: ism-1241</title>
               <prop name="sort-id"
                      value="catalog[1].group[18].group[2].group[6].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1241_smt">
                  <p>Output encoding is performed on all output produced by web applications.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Web browser-based controls</title>
            <prop name="sort-id" value="catalog[1].group[18].group[2].group[7]"/>
            <part name="overview">
               <p>Web browser-based controls, such as Content-Security-Policy, Hypertext Transfer Protocol Strict Transport Security (HSTS) and X-Frame-Options, can be used by web applications to help protect themselves and their users. This is achieved via setting security policy in response headers from web applications which web browsers then apply. Note, since the controls are applied via response headers, they can be applied to legacy or proprietary web applications where changes to their source code may be impractical.</p>
            </part>
            <control id="ism-1424" class="ISM-control">
               <title>Control: ism-1424</title>
               <prop name="sort-id"
                      value="catalog[1].group[18].group[2].group[7].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1424_smt">
                  <p>Web applications implement Content-Security-Policy, HSTS and X-Frame-Options via security policy in response headers.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Web application event logging</title>
            <prop name="sort-id" value="catalog[1].group[18].group[2].group[8]"/>
            <part name="overview">
               <p>Web application events can assist in monitoring the security posture of web applications, detecting malicious behaviour and contributing to investigations following cyber security incidents. To facilitate such activities, web application event logs should be captured and stored centrally.</p>
            </part>
            <control id="ism-1536" class="ISM-control">
               <title>Control: ism-1536</title>
               <prop name="sort-id"
                      value="catalog[1].group[18].group[2].group[8].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1536_smt">
                  <p>The following events are logged for web applications: attempted access that is denied, crashes and error messages, and search queries initiated by users.</p>
               </part>
            </control>
            <control id="ism-1757" class="ISM-control">
               <title>Control: ism-1757</title>
               <prop name="sort-id"
                      value="catalog[1].group[18].group[2].group[8].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1757_smt">
                  <p>Web application event logs are stored centrally.</p>
               </part>
            </control>
         </group>
      </group>
   </group>
   <group>
      <title>Guidelines for Database Systems</title>
      <prop name="sort-id" value="catalog[1].group[19]"/>
      <group>
         <title>Database servers</title>
         <prop name="sort-id" value="catalog[1].group[19].group[1]"/>
         <part name="overview">
            <h1>Further information</h1>
            <p>Further information on the functional separation of computing environments can be found in the virtualisation hardening section of the <a href="#de7525f3-a466-40a5-abdd-3ae24a6d1b44">Guidelines for System Hardening</a>.</p>
            <p>Further information on encrypting communications can be found in the cryptographic fundamentals section of the <a href="#195abe87-bb1e-4006-8b42-eaecca4d51f1">Guidelines for Cryptography</a>.</p>
            <p>Further information on network segmentation and segregation can be found in the network design and configuration section of the <a href="#f145ff5b-d396-4248-8f48-621349d6f0ed">Guidelines for Networking</a>.</p>
            <p>Further information on database management system software can be found in the server application hardening section of the <a href="#de7525f3-a466-40a5-abdd-3ae24a6d1b44">Guidelines for System Hardening</a>.</p>
         </part>
         <group>
            <title>Functional separation between database servers and web servers</title>
            <prop name="sort-id" value="catalog[1].group[19].group[1].group[1]"/>
            <part name="overview">
               <p>Due to the higher threat environment that web servers are typically exposed to, hosting database servers and web servers within the same operating environment increases the likelihood of database servers being compromise by an adversary. This security risk can be mitigated by ensuring that database servers are functionally separated from web servers.</p>
            </part>
            <control id="ism-1269" class="ISM-control">
               <title>Control: ism-1269</title>
               <prop name="sort-id"
                      value="catalog[1].group[19].group[1].group[1].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1269_smt">
                  <p>Database servers and web servers are functionally separated.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Communications between database servers and web servers</title>
            <prop name="sort-id" value="catalog[1].group[19].group[1].group[2]"/>
            <part name="overview">
               <p>Data communicated between database servers and web servers, especially over the internet, is susceptible to capture by an adversary. As such, it is important that all data communicated between database servers and web servers is encrypted.</p>
            </part>
            <control id="ism-1277" class="ISM-control">
               <title>Control: ism-1277</title>
               <prop name="sort-id"
                      value="catalog[1].group[19].group[1].group[2].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1277_smt">
                  <p>Data communicated between database servers and web servers is encrypted.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Network environment</title>
            <prop name="sort-id" value="catalog[1].group[19].group[1].group[3]"/>
            <part name="overview">
               <p>Placing database servers on the same network segment as user workstations can increase the likelihood of database servers being compromise by an adversary. Additionally, in cases where databases will only be accessed from their own database server, allowing remote access to the database server poses an unnecessary security risk.</p>
            </part>
            <control id="ism-1270" class="ISM-control">
               <title>Control: ism-1270</title>
               <prop name="sort-id"
                      value="catalog[1].group[19].group[1].group[3].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1270_smt">
                  <p>Database servers are placed on a different network segment to user workstations.</p>
               </part>
            </control>
            <control id="ism-1271" class="ISM-control">
               <title>Control: ism-1271</title>
               <prop name="sort-id"
                      value="catalog[1].group[19].group[1].group[3].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Jan-20"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1271_smt">
                  <p>Network access controls are implemented to restrict database server communications to strictly defined network resources, such as web servers, application servers and storage area networks.</p>
               </part>
            </control>
            <control id="ism-1272" class="ISM-control">
               <title>Control: ism-1272</title>
               <prop name="sort-id"
                      value="catalog[1].group[19].group[1].group[3].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-18"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1272_smt">
                  <p>If only local access to a database is required, networking functionality of database management system software is disabled or directed to listen solely to the localhost interface.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Separation of development, testing and production database servers</title>
            <prop name="sort-id" value="catalog[1].group[19].group[1].group[4]"/>
            <part name="overview">
               <p>Using production database servers for development and testing activities could result in accidental damage to their integrity or contents.</p>
            </part>
            <control id="ism-1273" class="ISM-control">
               <title>Control: ism-1273</title>
               <prop name="sort-id"
                      value="catalog[1].group[19].group[1].group[4].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1273_smt">
                  <p>Development and testing environments do not use the same database servers as production environments.</p>
               </part>
            </control>
         </group>
      </group>
      <group>
         <title>Databases</title>
         <prop name="sort-id" value="catalog[1].group[19].group[2]"/>
         <part name="overview">
            <h1>Further information</h1>
            <p>Further information on event logging can be found in the event logging and monitoring section of the <a href="#edc24216-f52b-4513-bcda-5fa564661999">Guidelines for System Monitoring</a>.</p>
         </part>
         <group>
            <title>Database register</title>
            <prop name="sort-id" value="catalog[1].group[19].group[2].group[1]"/>
            <part name="overview">
               <p>Without knowledge of all the databases in an organisation, and their contents, an organisation will be unable to appropriately protect their assets. As such, it is important that a database register is developed, implemented, maintained and verified on a regular basis.</p>
            </part>
            <control id="ism-1243" class="ISM-control">
               <title>Control: ism-1243</title>
               <prop name="sort-id"
                      value="catalog[1].group[19].group[2].group[1].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="6"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1243_smt">
                  <p>A database register is developed, implemented, maintained and verified on a regular basis.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Protecting databases</title>
            <prop name="sort-id" value="catalog[1].group[19].group[2].group[2]"/>
            <part name="overview">
               <p>Databases can be protected from unauthorised copying, and subsequent offline analysis, by applying file-based access controls to database files.</p>
            </part>
            <control id="ism-1256" class="ISM-control">
               <title>Control: ism-1256</title>
               <prop name="sort-id"
                      value="catalog[1].group[19].group[2].group[2].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-18"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1256_smt">
                  <p>File-based access controls are applied to database files.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Protecting database contents</title>
            <prop name="sort-id" value="catalog[1].group[19].group[2].group[3]"/>
            <part name="overview">
               <p>Database administrators and database users should know the sensitivity or classification associated with databases and their contents. In cases where all of a database’s contents are the same sensitivity or classification, an organisation should classify the entire database at this level and protect it as such. Alternatively, in cases where a database’s contents are of varying sensitivities or classifications, and database users have varying levels of access to the database’s contents, an organisation should protect the database’s contents at a more granular level.</p>
               <p>Restricting database users’ ability to access, insert, modify or remove database contents, based on their work duties, ensures that the likelihood of unauthorised access, modification or deletion of database contents is reduced. Furthermore, where concerns exist that the aggregation of separate pieces of content from within a database could lead to an adversary determining more sensitive or classified content, the need-to-know principle can be enforced through the use of minimum privileges, database views and database roles. Alternatively, the content of concern could be separated by implementing multiple databases, each with restricted data sets.</p>
            </part>
            <control id="ism-0393" class="ISM-control">
               <title>Control: ism-0393</title>
               <prop name="sort-id"
                      value="catalog[1].group[19].group[2].group[3].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="8"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Jun-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0393_smt">
                  <p>Databases and their contents are classified based on the sensitivity or classification of data that they contain.</p>
               </part>
            </control>
            <control id="ism-1255" class="ISM-control">
               <title>Control: ism-1255</title>
               <prop name="sort-id"
                      value="catalog[1].group[19].group[2].group[3].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1255_smt">
                  <p>Database users’ ability to access, insert, modify and remove database contents is restricted based on their work duties.</p>
               </part>
            </control>
            <control id="ism-1268" class="ISM-control">
               <title>Control: ism-1268</title>
               <prop name="sort-id"
                      value="catalog[1].group[19].group[2].group[3].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-18"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1268_smt">
                  <p>The need-to-know principle is enforced for database contents through the application of minimum privileges, database views and database roles.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Separation of development, testing and production databases</title>
            <prop name="sort-id" value="catalog[1].group[19].group[2].group[4]"/>
            <part name="overview">
               <p>Using database contents from production environments in development or testing environments could result in inadequate protection being applied to the database contents.</p>
            </part>
            <control id="ism-1274" class="ISM-control">
               <title>Control: ism-1274</title>
               <prop name="sort-id"
                      value="catalog[1].group[19].group[2].group[4].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="6"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1274_smt">
                  <p>Database contents from production environments are not used in development or testing environments unless the environment is secured to the same level as the production environment.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Web application interaction with databases</title>
            <prop name="sort-id" value="catalog[1].group[19].group[2].group[5]"/>
            <part name="overview">
               <p>Structured Query Language (SQL) injection attacks, facilitated by the use of dynamically generated queries, are a significant threat to the confidentiality, integrity and availability of database contents. Specifically, SQL injection attacks can allow an adversary to steal database contents, modify database contents, delete an entire database or even in some circumstances gain control of the underlying database server. Furthermore, when database queries from web applications fail they may display detailed error information about the structure of databases. This can be used by an adversary to further tailor their SQL injection attacks.</p>
            </part>
            <control id="ism-1275" class="ISM-control">
               <title>Control: ism-1275</title>
               <prop name="sort-id"
                      value="catalog[1].group[19].group[2].group[5].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-18"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1275_smt">
                  <p>All queries to databases from web applications are filtered for legitimate content and correct syntax.</p>
               </part>
            </control>
            <control id="ism-1276" class="ISM-control">
               <title>Control: ism-1276</title>
               <prop name="sort-id"
                      value="catalog[1].group[19].group[2].group[5].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-23"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1276_smt">
                  <p>Parameterised queries or stored procedures, instead of dynamically generated queries, are used for database interactions.</p>
               </part>
            </control>
            <control id="ism-1278" class="ISM-control">
               <title>Control: ism-1278</title>
               <prop name="sort-id"
                      value="catalog[1].group[19].group[2].group[5].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-23"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1278_smt">
                  <p>Web applications are designed or configured to provide as little error information as possible about the structure of databases.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Database event logging</title>
            <prop name="sort-id" value="catalog[1].group[19].group[2].group[6]"/>
            <part name="overview">
               <p>Database events can assist in monitoring the security posture of databases, detecting malicious behaviour and contributing to investigations following cyber security incidents. To facilitate such activities, database event logs should be captured and stored centrally.</p>
            </part>
            <control id="ism-1537" class="ISM-control">
               <title>Control: ism-1537</title>
               <prop name="sort-id"
                      value="catalog[1].group[19].group[2].group[6].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Jun-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1537_smt">
                  <p>The following events are logged for databases:</p>
                  <ul>
                     <li>access or modification of particularly important content</li>
                     <li>addition of new users, especially privileged users</li>
                     <li>changes to user roles or privileges</li>
                     <li>attempts to elevate user privileges</li>
                     <li>queries containing comments</li>
                     <li>queries containing multiple embedded queries</li>
                     <li>database and query alerts or failures</li>
                     <li>database structure changes</li>
                     <li>database administrator actions</li>
                     <li>use of executable commands</li>
                     <li>database logons and logoffs.</li>
                  </ul>
               </part>
            </control>
            <control id="ism-1758" class="ISM-control">
               <title>Control: ism-1758</title>
               <prop name="sort-id"
                      value="catalog[1].group[19].group[2].group[6].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1758_smt">
                  <p>Database event logs are stored centrally.</p>
               </part>
            </control>
         </group>
      </group>
   </group>
   <group>
      <title>Guidelines for Email</title>
      <prop name="sort-id" value="catalog[1].group[20]"/>
      <group>
         <title>Email usage</title>
         <prop name="sort-id" value="catalog[1].group[20].group[1]"/>
         <part name="overview">
            <h1>Further information</h1>
            <p>Further information on the Australian Government’s email protective marking standard can be found in the Attorney-General’s Department’s <a href="#92679127-f61d-486a-a93e-df2a26dfb07a">Protective Security Policy Framework</a>, <a href="#e1ebbfe4-ac16-4286-884e-907b2eada22b">Sensitive and classified information</a> policy.</p>
         </part>
         <group>
            <title>Email usage policy</title>
            <prop name="sort-id" value="catalog[1].group[20].group[1].group[1]"/>
            <part name="overview">
               <p>As there are many security risks associated with the use of email services, it is important that an organisation develops, implements and maintains an email usage policy governing its use.</p>
            </part>
            <control id="ism-0264" class="ISM-control">
               <title>Control: ism-0264</title>
               <prop name="sort-id"
                      value="catalog[1].group[20].group[1].group[1].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0264_smt">
                  <p>An email usage policy is developed, implemented and maintained.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Webmail services</title>
            <prop name="sort-id" value="catalog[1].group[20].group[1].group[2]"/>
            <part name="overview">
               <p>When users access non-approved webmail services, they often bypass controls that have been implemented by an organisation, such as email content filtering. To mitigate this security risk, access to non-approved webmail services should be blocked.</p>
            </part>
            <control id="ism-0267" class="ISM-control">
               <title>Control: ism-0267</title>
               <prop name="sort-id"
                      value="catalog[1].group[20].group[1].group[2].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="7"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-19"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0267_smt">
                  <p>Access to non-approved webmail services is blocked.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Protective markings for emails</title>
            <prop name="sort-id" value="catalog[1].group[20].group[1].group[3]"/>
            <part name="overview">
               <p>Implementing protective markings for emails helps to prevent data spills, such as unauthorised data being released into the public domain. In doing so, it is important that protective markings reflect the highest sensitivity or classification of the subject, body and attachments of emails.</p>
            </part>
            <control id="ism-0270" class="ISM-control">
               <title>Control: ism-0270</title>
               <prop name="sort-id"
                      value="catalog[1].group[20].group[1].group[3].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="6"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Jun-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0270_smt">
                  <p>Protective markings are applied to emails and reflect the highest sensitivity or classification of the subject, body and attachments.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Protective marking tools</title>
            <prop name="sort-id" value="catalog[1].group[20].group[1].group[4]"/>
            <part name="overview">
               <p>Requiring user involvement in the protective marking of emails ensures a conscious decision is made by users, thereby lessening the chance of incorrect protective markings being applied to emails. In addition, allowing users to select only protective markings for which a system is authorised to process, store or communicate lessens the chance of users inadvertently over-classifying emails.</p>
               <p>Email content filters may only check the most recent protective marking applied to emails. Therefore, when users are responding to or forwarding emails, requiring protective markings which are at least as high as that of emails that are received will help email content filters prevent emails being sent to systems that are not authorised to handle their original sensitivity or classification.</p>
            </part>
            <control id="ism-0271" class="ISM-control">
               <title>Control: ism-0271</title>
               <prop name="sort-id"
                      value="catalog[1].group[20].group[1].group[4].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-19"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0271_smt">
                  <p>Protective marking tools do not automatically insert protective markings into emails.</p>
               </part>
            </control>
            <control id="ism-0272" class="ISM-control">
               <title>Control: ism-0272</title>
               <prop name="sort-id"
                      value="catalog[1].group[20].group[1].group[4].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-19"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0272_smt">
                  <p>Protective marking tools do not allow users to select protective markings that a system has not been authorised to process, store or communicate.</p>
               </part>
            </control>
            <control id="ism-1089" class="ISM-control">
               <title>Control: ism-1089</title>
               <prop name="sort-id"
                      value="catalog[1].group[20].group[1].group[4].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="5"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1089_smt">
                  <p>Protective marking tools do not allow users replying to or forwarding emails to select protective markings lower than previously used.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Handling emails with inappropriate, invalid or missing protective markings</title>
            <prop name="sort-id" value="catalog[1].group[20].group[1].group[5]"/>
            <part name="overview">
               <p>It is important that email servers are configured to block emails with inappropriate protective markings. For example, blocking inbound and outbound emails with protective markings higher than the sensitivity or classification of the receiving system, as this will prevent a data spill from occurring. In doing so, it is important to inform the intended recipients of blocked inbound emails, and the senders of blocked outbound emails, that this has occurred.</p>
               <p>If emails are received with invalid or missing protective markings they may still be passed to their intended recipients. However, the recipients will have an obligation to determine appropriate protective markings if emails are to be responded to, forwarded or printed. If unsure, original senders of emails should be contacted to provide guidance on appropriate protective markings.</p>
            </part>
            <control id="ism-0565" class="ISM-control">
               <title>Control: ism-0565</title>
               <prop name="sort-id"
                      value="catalog[1].group[20].group[1].group[5].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-19"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0565_smt">
                  <p>Email servers are configured to block, log and report emails with inappropriate protective markings.</p>
               </part>
            </control>
            <control id="ism-1023" class="ISM-control">
               <title>Control: ism-1023</title>
               <prop name="sort-id"
                      value="catalog[1].group[20].group[1].group[5].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="6"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1023_smt">
                  <p>The intended recipients of blocked inbound emails, and the senders of blocked outbound emails, are notified.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Email distribution lists</title>
            <prop name="sort-id" value="catalog[1].group[20].group[1].group[6]"/>
            <part name="overview">
               <p>In some cases, the membership and nationality of members of email distribution lists will be unknown. As such, emails containing Australian Eyes Only, Australian Government Access Only or Releasable To data that are sent to email distribution lists could accidentally cause a data spill.</p>
            </part>
            <control id="ism-0269" class="ISM-control">
               <title>Control: ism-0269</title>
               <prop name="sort-id"
                      value="catalog[1].group[20].group[1].group[6].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="5"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-0269_smt">
                  <p>Emails containing Australian Eyes Only, Australian Government Access Only or Releasable To data are not sent to email distribution lists unless the nationality of all members of email distribution lists can be confirmed.</p>
               </part>
            </control>
         </group>
      </group>
      <group>
         <title>Email gateways and servers</title>
         <prop name="sort-id" value="catalog[1].group[20].group[2]"/>
         <part name="overview">
            <h1>Further information</h1>
            <p>Further information on implementing opportunistic TLS encryption for email servers can be found in the Australian Cyber Security Centre (ACSC)’s <a href="#b8cdbf18-31cb-4e10-bb43-e8488ee8c2f6">Implementing Certificates, TLS, HTTPS and Opportunistic TLS</a> publication.</p>
            <p>Further information on implementing SPF, DKIM and DMARC can be found in the ACSC’s <a href="#d3572f80-d9d6-4023-b6e6-23720bb0d618">How to Combat Fake Emails</a> publication.</p>
            <p>Further information on engaging the services of email service providers for marketing or filtering purposes can be found in the ACSC’s <a href="#e4eee462-f6e5-4921-a8fe-26f3de6c6f45">Marketing and Filtering Email Service Providers</a> publication.</p>
            <p>Further information on email content filtering can be found in the content filtering section of the <a href="#e8bde527-526c-4a6a-b66f-05228f09dd7b">Guidelines for Gateways</a>.</p>
            <p>Further information on email content filtering can be found in the ACSC’s <a href="#6136b137-0cc9-4d21-94ee-0abfac2b4e18">Malicious Email Mitigation Strategies</a> publication.</p>
            <p>Further information on email security can be found in the following National Institute of Standards and Technology (NIST) publications:</p>
            <ul>
               <li>NIST Special Publication (SP) 800-45 Rev. 2, <a href="#b383a647-7627-4450-99b6-640ae554c2f1">Guidelines on Electronic Mail Security</a>
               </li>
               <li>NIST SP 800-177 Rev. 1, <a href="#4b0f2fa7-f9d6-48d8-b14c-527939808882">Trustworthy Email</a>
               </li>
               <li>NIST SP 1800-6, <a href="#55038d94-7587-4234-a18c-fb459fcdb295">Domain Name System-Based Electronic Mail Security</a>.</li>
            </ul>
         </part>
         <group>
            <title>Centralised email gateways</title>
            <prop name="sort-id" value="catalog[1].group[20].group[2].group[01]"/>
            <part name="overview">
               <p>When routing emails via centralised email gateways it will be easier for an organisation to deploy Sender Policy Framework (SPF), DomainKeys Identified Mail (DKIM), Domain-based Message Authentication, Reporting and Conformance (DMARC) and protective marking checks.</p>
            </part>
            <control id="ism-0569" class="ISM-control">
               <title>Control: ism-0569</title>
               <prop name="sort-id"
                      value="catalog[1].group[20].group[2].group[01].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="5"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Jun-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0569_smt">
                  <p>Emails are routed via centralised email gateways.</p>
               </part>
            </control>
            <control id="ism-0571" class="ISM-control">
               <title>Control: ism-0571</title>
               <prop name="sort-id"
                      value="catalog[1].group[20].group[2].group[01].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="7"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Jun-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0571_smt">
                  <p>When users send or receive emails, an authenticated and encrypted channel is used to route emails via their organisation’s centralised email gateways.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Email gateway maintenance activities</title>
            <prop name="sort-id" value="catalog[1].group[20].group[2].group[02]"/>
            <part name="overview">
               <p>As backup and alternative email gateways are often poorly maintained in terms of patches and email content filtering, an adversary will often seek to exploit this when sending malicious emails to an organisation. As such, it is important that backup and alternative email gateways are maintained at the same standard as an organisation’s primary email gateway.</p>
            </part>
            <control id="ism-0570" class="ISM-control">
               <title>Control: ism-0570</title>
               <prop name="sort-id"
                      value="catalog[1].group[20].group[2].group[02].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-18"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0570_smt">
                  <p>Where backup or alternative email gateways are in place, they are maintained at the same standard as the primary email gateway.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Open relay email servers</title>
            <prop name="sort-id" value="catalog[1].group[20].group[2].group[03]"/>
            <part name="overview">
               <p>An open relay email server (or open mail relay) is an email server that is configured to allow anyone on the internet to send emails through it. Such configurations are highly undesirable as spammers and worms can exploit them.</p>
            </part>
            <control id="ism-0567" class="ISM-control">
               <title>Control: ism-0567</title>
               <prop name="sort-id"
                      value="catalog[1].group[20].group[2].group[03].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="5"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0567_smt">
                  <p>Email servers only relay emails destined for or originating from their domains (including subdomains).</p>
               </part>
            </control>
         </group>
         <group>
            <title>Email server transport encryption</title>
            <prop name="sort-id" value="catalog[1].group[20].group[2].group[04]"/>
            <part name="overview">
               <p>Emails can be intercepted anywhere between originating email servers and destination email servers. Implementing opportunistic Transport Layer Security (TLS) encryption can mitigate this security risk while ensuring email servers remain compatible with each other. However, opportunistic TLS encryption is susceptible to downgrade attacks. To mitigate this security risk, Mail Transfer Agent Strict Transport Security (MTA-STS) allows domain owners to indicate that email transfers should only occur if satisfactory TLS encryption is negotiated beforehand.</p>
               <p>Implementing MTA-STS reduces the opportunity for downgrade attacks during email transfers, and provides visibility of when they are attempted. TLS reporting supports the implementation of MTA-STS by providing a mechanism for a domain owner to publish a location where reports can be submitted regarding the success or failure of attempts to initiate encrypted connections when sending emails to a specified domain.</p>
            </part>
            <control id="ism-0572" class="ISM-control">
               <title>Control: ism-0572</title>
               <prop name="sort-id"
                      value="catalog[1].group[20].group[2].group[04].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0572_smt">
                  <p>Opportunistic TLS encryption is enabled on email servers that make incoming or outgoing email connections over public network infrastructure.</p>
               </part>
            </control>
            <control id="ism-1589" class="ISM-control">
               <title>Control: ism-1589</title>
               <prop name="sort-id"
                      value="catalog[1].group[20].group[2].group[04].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1589_smt">
                  <p>MTA-STS is enabled to prevent the unencrypted transfer of emails between complying servers.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Sender Policy Framework</title>
            <prop name="sort-id" value="catalog[1].group[20].group[2].group[05]"/>
            <part name="overview">
               <p>SPF aids in the detection of spoofed emails by specifying a list of hosts or Internet Protocol (IP) addresses that are allowed to send emails on behalf of a specified domain or subdomain. If an email server is not in the SPF record for a domain or subdomain, SPF verification will not pass. In specifying SPF records, domain owners should ensure that they delegate the minimum necessary set of hosts or IP addresses necessary for sending emails. In addition, extra care should be taken when delegating to hosts or IP addresses not under an organisation’s control.</p>
            </part>
            <control id="ism-0574" class="ISM-control">
               <title>Control: ism-0574</title>
               <prop name="sort-id"
                      value="catalog[1].group[20].group[2].group[05].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="6"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0574_smt">
                  <p>SPF is used to specify authorised email servers (or lack thereof) for all domains (including subdomains).</p>
               </part>
            </control>
            <control id="ism-1183" class="ISM-control">
               <title>Control: ism-1183</title>
               <prop name="sort-id"
                      value="catalog[1].group[20].group[2].group[05].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1183_smt">
                  <p>A hard fail SPF record is used when specifying authorised email servers (or lack thereof) for all domains (including subdomains).</p>
               </part>
            </control>
            <control id="ism-1151" class="ISM-control">
               <title>Control: ism-1151</title>
               <prop name="sort-id"
                      value="catalog[1].group[20].group[2].group[05].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Oct-19"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1151_smt">
                  <p>SPF is used to verify the authenticity of incoming emails.</p>
               </part>
            </control>
         </group>
         <group>
            <title>DomainKeys Identified Mail</title>
            <prop name="sort-id" value="catalog[1].group[20].group[2].group[06]"/>
            <part name="overview">
               <p>DKIM enables the detection of spoofed email contents. This is achieved by DKIM records specifying the public key used to verify the digital signature in an email. Specifically, if the signed digest in an email header does not match the signed contents of the email, verification will not pass.</p>
            </part>
            <control id="ism-0861" class="ISM-control">
               <title>Control: ism-0861</title>
               <prop name="sort-id"
                      value="catalog[1].group[20].group[2].group[06].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0861_smt">
                  <p>DKIM signing is enabled on emails originating from an organisation’s domains (including subdomains).</p>
               </part>
            </control>
            <control id="ism-1026" class="ISM-control">
               <title>Control: ism-1026</title>
               <prop name="sort-id"
                      value="catalog[1].group[20].group[2].group[06].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="5"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Jan-20"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1026_smt">
                  <p>DKIM signatures on received emails are verified.</p>
               </part>
            </control>
            <control id="ism-1027" class="ISM-control">
               <title>Control: ism-1027</title>
               <prop name="sort-id"
                      value="catalog[1].group[20].group[2].group[06].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-18"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1027_smt">
                  <p>Email distribution list software used by external senders is configured such that it does not break the validity of the sender’s DKIM signature.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Domain-based Message Authentication, Reporting and Conformance</title>
            <prop name="sort-id" value="catalog[1].group[20].group[2].group[07]"/>
            <part name="overview">
               <p>DMARC enables a domain owner to specify what action receiving email servers should take as a result of domain alignment, SPF and DKIM checks. For emails that do not pass DMARC checks, this includes ‘reject’ (emails are rejected), ‘quarantine’ (emails are marked as spam) or ‘none’ (no action is taken).</p>
               <p>DMARC also provides a reporting feature which enables a domain owner to receive reports on the actions taken by receiving email servers. While this feature does not mitigate malicious emails sent to the domain owner’s organisation, it can give the domain owner some visibility of attempts by an adversary to spoof their organisation’s domains.</p>
            </part>
            <control id="ism-1540" class="ISM-control">
               <title>Control: ism-1540</title>
               <prop name="sort-id"
                      value="catalog[1].group[20].group[2].group[07].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1540_smt">
                  <p>DMARC records are configured for all domains (including subdomains) such that emails are rejected if they do not pass DMARC checks.</p>
               </part>
            </control>
            <control id="ism-1799" class="ISM-control">
               <title>Control: ism-1799</title>
               <prop name="sort-id"
                      value="catalog[1].group[20].group[2].group[07].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1799_smt">
                  <p>Incoming emails are rejected if they do not pass DMARC checks.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Email content filtering</title>
            <prop name="sort-id" value="catalog[1].group[20].group[2].group[08]"/>
            <part name="overview">
               <p>Content filtering performed on email bodies and attachments provides a defence-in-depth approach to preventing malicious code being introduced into networks.</p>
            </part>
            <control id="ism-1234" class="ISM-control">
               <title>Control: ism-1234</title>
               <prop name="sort-id"
                      value="catalog[1].group[20].group[2].group[08].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="5"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1234_smt">
                  <p>Email content filtering is implemented to filter potentially harmful content in email bodies and attachments.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Blocking suspicious emails</title>
            <prop name="sort-id" value="catalog[1].group[20].group[2].group[09]"/>
            <part name="overview">
               <p>Blocking specific types of suspicious emails, such as where the email source address uses an internal domain, or internal subdomain, reduces the likelihood of phishing emails entering an organisation’s network.</p>
            </part>
            <control id="ism-1502" class="ISM-control">
               <title>Control: ism-1502</title>
               <prop name="sort-id"
                      value="catalog[1].group[20].group[2].group[09].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1502_smt">
                  <p>Emails arriving via an external connection where the email source address uses an internal domain, or internal subdomain, are blocked at the email gateway.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Notifications of undeliverable emails</title>
            <prop name="sort-id" value="catalog[1].group[20].group[2].group[10]"/>
            <part name="overview">
               <p>Notifications of undeliverable emails are commonly sent by receiving email servers when emails cannot be delivered, usually because destination addresses are invalid. Due to the common spamming practice of spoofing sender addresses, this often results in a large number of notifications of undeliverable emails being sent to innocent third parties. Sending notifications of undeliverable emails only to senders that can be verified via SPF, or other trusted means, avoids contributing to this problem while allowing legitimate senders to be notified.</p>
            </part>
            <control id="ism-1024" class="ISM-control">
               <title>Control: ism-1024</title>
               <prop name="sort-id"
                      value="catalog[1].group[20].group[2].group[10].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="5"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1024_smt">
                  <p>Notifications of undeliverable emails are only sent to senders that can be verified via SPF or other trusted means.</p>
               </part>
            </control>
         </group>
      </group>
   </group>
   <group>
      <title>Guidelines for Networking</title>
      <prop name="sort-id" value="catalog[1].group[21]"/>
      <group>
         <title>Network design and configuration</title>
         <prop name="sort-id" value="catalog[1].group[21].group[1]"/>
         <part name="overview">
            <h1>Further information</h1>
            <p>Further information on wireless networks can be found in the wireless networks section of these guidelines.</p>
            <p>Further information on gateways can be found in the gateways section of the <a href="#e8bde527-526c-4a6a-b66f-05228f09dd7b">Guidelines for Gateways</a>.</p>
            <p>Further information on encrypting communications can be found in the cryptographic fundamentals section of the <a href="#195abe87-bb1e-4006-8b42-eaecca4d51f1">Guidelines for Cryptography</a>.</p>
            <p>Further information on network segmentation and segregation can be found in the ACSC’s <a href="#23d977b2-e64e-4ebc-a59f-cd95212045c5">Implementing Network Segmentation and Segregation</a> publication.</p>
            <p>Further information on network security zones can be found in the Canadian Centre for Cyber Security’s <a href="#b43b0377-c2e4-4cdc-acec-a9ece7371e36">Baseline Security Requirements for Network Security Zones (Version 2.0)</a> publication.</p>
            <p>Further information on implementing network segmentation and segregation for system administration purposes can be found in the system administration section of the <a href="#c6ca6620-ccd5-4c5d-b97c-9d92f1162948">Guidelines for System Management</a>.</p>
            <p>Further information on functional separation of servers using virtualisation can be found in the virtualisation hardening section of the <a href="#de7525f3-a466-40a5-abdd-3ae24a6d1b44">Guidelines for System Hardening</a>.</p>
            <p>Further information on event logging can be found in the event logging and monitoring section of the <a href="#edc24216-f52b-4513-bcda-5fa564661999">Guidelines for System Monitoring</a>.</p>
            <p>Further information on blocking anonymity network traffic can be found in the ACSC’s <a href="#ded13757-3c76-40cb-b46e-f84e46a1c1c7">Defending Against the Malicious Use of the Tor Network</a> publication.</p>
            <p>Further information on Domain Name System services can be found in the ACSC’s <a href="#b66f8d23-4209-4775-a1fd-bd4dc299a027">Domain Name System Security for Domain Owners</a> and <a href="#b13cb68a-a94a-4a69-b094-b1b68d10239e">Domain Name System Security for Domain Resolvers</a> publications.</p>
            <p>Further information on selecting a protective DNS service can be found in the United States’ National Security Agency and Cybersecurity &amp; Infrastructure Security Agency’s <a href="#63b0d043-b6b3-4e2b-bca8-99b42cfd9904">Selecting a Protective DNS Service</a> publication.</p>
            <p>Further information on network design and configuration can be found in the United States’ National Security Agency’s <a href="#1ecfc41e-f6a8-4c96-ac41-1587718ca459">Network Infrastructure Security Guide</a> publication.</p>
            <p>Further information on cyber supply chain risk management can be found in the cyber supply chain risk management section of the <a href="#f37a4848-0791-4870-b316-5536c2681c28">Guidelines for Procurement and Outsourcing</a>.</p>
         </part>
         <group>
            <title>Network documentation</title>
            <prop name="sort-id" value="catalog[1].group[21].group[1].group[01]"/>
            <part name="overview">
               <p>It is important that network documentation is developed and accurately depicts the current state of networks, as this can assist in troubleshooting network problems as well as responding to and recovering from cyber security incidents. As such, network documentation should include, at a minimum, high-level network diagrams showing all connections into networks and logical network diagrams showing all critical servers, high-value servers, network devices and network security appliances. Finally, as network documentation could be used by an adversary to assist in compromising networks, it is important that it is appropriately protected.</p>
            </part>
            <control id="ism-0518" class="ISM-control">
               <title>Control: ism-0518</title>
               <prop name="sort-id"
                      value="catalog[1].group[21].group[1].group[01].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="5"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0518_smt">
                  <p>Network documentation is developed, implemented, maintained.</p>
               </part>
            </control>
            <control id="ism-0516" class="ISM-control">
               <title>Control: ism-0516</title>
               <prop name="sort-id"
                      value="catalog[1].group[21].group[1].group[01].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="5"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0516_smt">
                  <p>Network documentation includes high-level network diagrams showing all connections into networks and logical network diagrams showing all critical servers, high-value servers, network devices and network security appliances.</p>
               </part>
            </control>
            <control id="ism-1178" class="ISM-control">
               <title>Control: ism-1178</title>
               <prop name="sort-id"
                      value="catalog[1].group[21].group[1].group[01].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-18"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1178_smt">
                  <p>Network documentation provided to a third party, or published in public tender documentation, only contains details necessary for other parties to undertake contractual services.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Network encryption</title>
            <prop name="sort-id" value="catalog[1].group[21].group[1].group[02]"/>
            <part name="overview">
               <p>While physical security can provide a degree of protection against unauthorised physical access to network infrastructure, unauthorised access to unencrypted data can still be gained via other means, such as compromised network devices. For this reason, it is important that all data communicated over network infrastructure is encrypted, even within appropriately secure areas. Note, however, some protocols do not have encrypted equivalents. In such situations, where practical and feasible, an organisation should consider transitioning to the use of alternative protocols that support encryption.</p>
            </part>
            <control id="ism-1781" class="ISM-control">
               <title>Control: ism-1781</title>
               <prop name="sort-id"
                      value="catalog[1].group[21].group[1].group[02].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Jun-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1781_smt">
                  <p>All data communicated over network infrastructure is encrypted.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Network segmentation and segregation</title>
            <prop name="sort-id" value="catalog[1].group[21].group[1].group[03]"/>
            <part name="overview">
               <p>Network segmentation and segregation is one of the most effective controls in preventing an adversary from easily propagating throughout networks once initial access has been gained. To achieve this, networks can be segregated into multiple network zones in order to protect servers, services and data. For example, administrative infrastructure used for managing critical servers, high-value servers and regular servers should be segregated from each other. In addition, all administrative infrastructure should be segregated from other assets on networks.</p>
            </part>
            <control id="ism-1181" class="ISM-control">
               <title>Control: ism-1181</title>
               <prop name="sort-id"
                      value="catalog[1].group[21].group[1].group[03].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="5"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1181_smt">
                  <p>Networks are segregated into multiple network zones according to the criticality of servers, services and data.</p>
               </part>
            </control>
            <control id="ism-1577" class="ISM-control">
               <title>Control: ism-1577</title>
               <prop name="sort-id"
                      value="catalog[1].group[21].group[1].group[03].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1577_smt">
                  <p>An organisation’s networks are segregated from their service providers’ networks.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Using Virtual Local Area Networks</title>
            <prop name="sort-id" value="catalog[1].group[21].group[1].group[04]"/>
            <part name="overview">
               <p>Virtual Local Area Networks (VLANs) can be used to implement network segmentation and segregation as long as networks belong to the same security domain. In such cases, if a data spill occurs the impact will be less than if a data spill occurred between two networks of different classifications or between an organisation’s network and public network infrastructure. Should an organisation choose to risk manage implementing VLANs between networks belonging to different security domains, such as at the same classification, additional controls for network devices will apply, such as not sharing VLAN trunks and terminating VLANs on separate physical network interfaces.</p>
               <p>For the purposes of this topic, Multiprotocol Label Switching is considered to be equivalent to VLANs and is subject to the same controls.</p>
            </part>
            <control id="ism-1532" class="ISM-control">
               <title>Control: ism-1532</title>
               <prop name="sort-id"
                      value="catalog[1].group[21].group[1].group[04].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1532_smt">
                  <p>VLANs are not used to separate network traffic between an organisation’s networks and public network infrastructure.</p>
               </part>
            </control>
            <control id="ism-0529" class="ISM-control">
               <title>Control: ism-0529</title>
               <prop name="sort-id"
                      value="catalog[1].group[21].group[1].group[04].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="6"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0529_smt">
                  <p>VLANs are not used to separate network traffic between networks belonging to different security domains.</p>
               </part>
            </control>
            <control id="ism-0530" class="ISM-control">
               <title>Control: ism-0530</title>
               <prop name="sort-id"
                      value="catalog[1].group[21].group[1].group[04].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="6"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0530_smt">
                  <p>Network devices managing VLANs are administered from the most trusted security domain.</p>
               </part>
            </control>
            <control id="ism-0535" class="ISM-control">
               <title>Control: ism-0535</title>
               <prop name="sort-id"
                      value="catalog[1].group[21].group[1].group[04].control[4]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="6"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0535_smt">
                  <p>Network devices managing VLANs belonging to different security domains do not share VLAN trunks.</p>
               </part>
            </control>
            <control id="ism-1364" class="ISM-control">
               <title>Control: ism-1364</title>
               <prop name="sort-id"
                      value="catalog[1].group[21].group[1].group[04].control[5]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1364_smt">
                  <p>Network devices managing VLANs terminate VLANs belonging to different security domains on separate physical network interfaces.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Using Internet Protocol version 6</title>
            <prop name="sort-id" value="catalog[1].group[21].group[1].group[05]"/>
            <part name="overview">
               <p>The use of Internet Protocol version 6 (IPv6) can introduce additional security risks to networks. As such, an organisation exclusively using Internet Protocol version 4 (IPv4) should disable IPv6. This will assist in minimising the attack surface of networks and ensure that IPv6 cannot be exploited by an adversary.</p>
               <p>To aid in the transition from IPv4 to IPv6, numerous tunnelling protocols have been developed to allow interoperability between IPv4 and IPv6. Disabling IPv6 tunnelling protocols on networks that do not require such functionality will prevent an adversary from bypassing traditional network defences by encapsulating IPv6 data inside IPv4 packets.</p>
               <p>Stateless Address Autoconfiguration is a method of stateless Internet Protocol (IP) address configuration in IPv6 networks. Notably, it reduces the ability of an organisation to maintain effective logs of IP address assignments on networks. For this reason, stateless IP addressing should be avoided.</p>
            </part>
            <control id="ism-0521" class="ISM-control">
               <title>Control: ism-0521</title>
               <prop name="sort-id"
                      value="catalog[1].group[21].group[1].group[05].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="6"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0521_smt">
                  <p>IPv6 functionality is disabled in dual-stack network devices unless it is being used.</p>
               </part>
            </control>
            <control id="ism-1186" class="ISM-control">
               <title>Control: ism-1186</title>
               <prop name="sort-id"
                      value="catalog[1].group[21].group[1].group[05].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1186_smt">
                  <p>IPv6 capable network security appliances are used on IPv6 and dual-stack networks.</p>
               </part>
            </control>
            <control id="ism-1428" class="ISM-control">
               <title>Control: ism-1428</title>
               <prop name="sort-id"
                      value="catalog[1].group[21].group[1].group[05].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1428_smt">
                  <p>Unless explicitly required, IPv6 tunnelling is disabled on all network devices.</p>
               </part>
            </control>
            <control id="ism-1429" class="ISM-control">
               <title>Control: ism-1429</title>
               <prop name="sort-id"
                      value="catalog[1].group[21].group[1].group[05].control[4]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1429_smt">
                  <p>IPv6 tunnelling is blocked by network security appliances at externally-connected network boundaries.</p>
               </part>
            </control>
            <control id="ism-1430" class="ISM-control">
               <title>Control: ism-1430</title>
               <prop name="sort-id"
                      value="catalog[1].group[21].group[1].group[05].control[5]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1430_smt">
                  <p>Dynamically assigned IPv6 addresses are configured with Dynamic Host Configuration Protocol version 6 in a stateful manner with lease data stored in a centralised event logging facility.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Network access controls</title>
            <prop name="sort-id" value="catalog[1].group[21].group[1].group[06]"/>
            <part name="overview">
               <p>If an adversary has reduced opportunities to physically connect unauthorised network devices to networks, they also have reduced opportunities to compromise networks. Network access controls can not only prevent unauthorised physical access to networks, but also prevent personnel from carelessly bridging networks by connecting one network to another network. Furthermore, network access controls can also be useful for limiting the flow of network traffic between network segments.</p>
            </part>
            <control id="ism-0520" class="ISM-control">
               <title>Control: ism-0520</title>
               <prop name="sort-id"
                      value="catalog[1].group[21].group[1].group[06].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="6"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-18"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0520_smt">
                  <p>Network access controls are implemented on networks to prevent the connection of unauthorised network devices.</p>
               </part>
            </control>
            <control id="ism-1182" class="ISM-control">
               <title>Control: ism-1182</title>
               <prop name="sort-id"
                      value="catalog[1].group[21].group[1].group[06].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1182_smt">
                  <p>Network access controls are implemented to limit network traffic within and between network segments to only those required for business purposes.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Functional separation between servers</title>
            <prop name="sort-id" value="catalog[1].group[21].group[1].group[07]"/>
            <part name="overview">
               <p>Implementing functional separation between servers reduces the likelihood that a server compromised by an adversary will pose an increased security risk to other servers.</p>
            </part>
            <control id="ism-0385" class="ISM-control">
               <title>Control: ism-0385</title>
               <prop name="sort-id"
                      value="catalog[1].group[21].group[1].group[07].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="6"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-18"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0385_smt">
                  <p>Servers maintain effective functional separation with other servers allowing them to operate independently.</p>
               </part>
            </control>
            <control id="ism-1479" class="ISM-control">
               <title>Control: ism-1479</title>
               <prop name="sort-id"
                      value="catalog[1].group[21].group[1].group[07].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-18"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1479_smt">
                  <p>Servers minimise communications with other servers at both the network and file system level.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Network management traffic</title>
            <prop name="sort-id" value="catalog[1].group[21].group[1].group[08]"/>
            <part name="overview">
               <p>Implementing security measures specifically for network management traffic provides another layer of defence should an adversary find an opportunity to connect to networks. In addition, this also makes it more difficult for an adversary to enumerate networks.</p>
            </part>
            <control id="ism-1006" class="ISM-control">
               <title>Control: ism-1006</title>
               <prop name="sort-id"
                      value="catalog[1].group[21].group[1].group[08].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="6"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-18"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1006_smt">
                  <p>Security measures are implemented to prevent unauthorised access to network management traffic.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Use of Simple Network Management Protocol</title>
            <prop name="sort-id" value="catalog[1].group[21].group[1].group[09]"/>
            <part name="overview">
               <p>The Simple Network Management Protocol (SNMP) can be used to monitor the status of network devices. The first two iterations of SNMP were inherently insecure as they used trivial authentication methods. Furthermore, changing all default SNMP community strings on network devices, and limiting their access to read-only, is strongly encouraged.</p>
            </part>
            <control id="ism-1311" class="ISM-control">
               <title>Control: ism-1311</title>
               <prop name="sort-id"
                      value="catalog[1].group[21].group[1].group[09].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1311_smt">
                  <p>SNMP version 1 and SNMP version 2 are not used on networks.</p>
               </part>
            </control>
            <control id="ism-1312" class="ISM-control">
               <title>Control: ism-1312</title>
               <prop name="sort-id"
                      value="catalog[1].group[21].group[1].group[09].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1312_smt">
                  <p>All default SNMP community strings on network devices are changed and write access is disabled.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Using Network-based Intrusion Detection and Prevention Systems</title>
            <prop name="sort-id" value="catalog[1].group[21].group[1].group[10]"/>
            <part name="overview">
               <p>A Network-based Intrusion Detection System (NIDS) or Network-based Intrusion Prevention System (NIPS) can be an effective way of identifying and responding to network intrusions. In addition, generating event logs and alerts for network traffic that contravenes any rule in a firewall ruleset can help identify suspicious or malicious network traffic entering networks due to a failure of, or configuration change to, firewalls.</p>
            </part>
            <control id="ism-1028" class="ISM-control">
               <title>Control: ism-1028</title>
               <prop name="sort-id"
                      value="catalog[1].group[21].group[1].group[10].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="8"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1028_smt">
                  <p>A NIDS or NIPS is deployed in gateways between an organisation’s networks and other networks they do not manage.</p>
               </part>
            </control>
            <control id="ism-1030" class="ISM-control">
               <title>Control: ism-1030</title>
               <prop name="sort-id"
                      value="catalog[1].group[21].group[1].group[10].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="8"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1030_smt">
                  <p>A NIDS or NIPS is located immediately inside the outermost firewall for gateways and configured to generate event logs and alerts for network traffic that contravenes any rule in a firewall ruleset.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Blocking anonymity network traffic</title>
            <prop name="sort-id" value="catalog[1].group[21].group[1].group[11]"/>
            <part name="overview">
               <p>Inbound network connections from anonymity networks, such as the Tor network, to an organisation’s internet-facing services can be used by an adversary for reconnaissance and malware delivery purposes with minimal risk of detection and attribution. As such, this network traffic should be blocked. However, an organisation might choose to support anonymous connections to their websites to cater for individuals who want to remain anonymous for privacy reasons. In such cases, it is suggested that network traffic from anonymity networks be logged and monitored instead. Additionally, outbound network connections to anonymity networks can be used by malware for command and control or data exfiltration purposes and should be blocked.</p>
            </part>
            <control id="ism-1627" class="ISM-control">
               <title>Control: ism-1627</title>
               <prop name="sort-id"
                      value="catalog[1].group[21].group[1].group[11].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Nov-20"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1627_smt">
                  <p>Inbound network connections from anonymity networks to internet-facing services are blocked.</p>
               </part>
            </control>
            <control id="ism-1628" class="ISM-control">
               <title>Control: ism-1628</title>
               <prop name="sort-id"
                      value="catalog[1].group[21].group[1].group[11].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Nov-20"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1628_smt">
                  <p>Outbound network connections to anonymity networks are blocked.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Protective Domain Name System Services</title>
            <prop name="sort-id" value="catalog[1].group[21].group[1].group[12]"/>
            <part name="overview">
               <p>A protective Domain Name System (DNS) service can be an effective way of blocking requests made by an organisation’s users, or an adversary on an organisation’s network, to known malicious domain names – either as part of an initial compromise or subsequent command and control activities. DNS event logs captured by a protective DNS service can also be useful for investigating any exploitation attempt or successful compromise of a network by an adversary.</p>
               <p>In selecting a protective DNS service, many commercial offerings exist. In addition, the Australian Cyber Security Centre (ACSC) also offers a free protective DNS service for all levels of government.</p>
            </part>
            <control id="ism-1782" class="ISM-control">
               <title>Control: ism-1782</title>
               <prop name="sort-id"
                      value="catalog[1].group[21].group[1].group[12].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1782_smt">
                  <p>A protective DNS service is used to block access to known malicious domain names.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Flashing network devices with trusted firmware before first use</title>
            <prop name="sort-id" value="catalog[1].group[21].group[1].group[13]"/>
            <part name="overview">
               <p>Flashing network devices with trusted firmware, obtained from vendors via trusted means, before network devices are used for the first time can assist in reducing cyber supply chain risks, such as the introduction of malicious firmware resulting from a cyber supply chain interdiction attack or a compromised vendor development environment or source code repository.</p>
            </part>
            <control id="ism-1800" class="ISM-control">
               <title>Control: ism-1800</title>
               <prop name="sort-id"
                      value="catalog[1].group[21].group[1].group[13].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1800_smt">
                  <p>Network devices are flashed with trusted firmware before they are used for the first time.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Default accounts and credentials for network devices</title>
            <prop name="sort-id" value="catalog[1].group[21].group[1].group[14]"/>
            <part name="overview">
               <p>Network devices can come pre-configured with default accounts and credentials. For example, wireless access points with an account named ‘admin’ and a password of ‘admin’. Ensuring default accounts or credentials are changed can assist in reducing the likelihood of network devices being exploited by an adversary.</p>
            </part>
            <control id="ism-1304" class="ISM-control">
               <title>Control: ism-1304</title>
               <prop name="sort-id"
                      value="catalog[1].group[21].group[1].group[14].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1304_smt">
                  <p>Default accounts or credentials for network devices including for any pre-configured accounts, are changed.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Disabling unused physical ports on network devices</title>
            <prop name="sort-id" value="catalog[1].group[21].group[1].group[15]"/>
            <part name="overview">
               <p>Disabling unused physical ports on network devices reduces the opportunity for an adversary to connect to networks if they can gain physical access to network devices.</p>
            </part>
            <control id="ism-0534" class="ISM-control">
               <title>Control: ism-0534</title>
               <prop name="sort-id"
                      value="catalog[1].group[21].group[1].group[15].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-18"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0534_smt">
                  <p>Unused physical ports on network devices are disabled.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Regularly restarting network devices</title>
            <prop name="sort-id" value="catalog[1].group[21].group[1].group[16]"/>
            <part name="overview">
               <p>Implementing measures to restart network devices on at least a monthly basis can assist in maintaining network device performance as well as removing an adversary that may have compromised a network device but failed to gain persistence.</p>
            </part>
            <control id="ism-1801" class="ISM-control">
               <title>Control: ism-1801</title>
               <prop name="sort-id"
                      value="catalog[1].group[21].group[1].group[16].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1801_smt">
                  <p>Network devices are restarted on at least a monthly basis.</p>
               </part>
            </control>
         </group>
      </group>
      <group>
         <title>Wireless networks</title>
         <prop name="sort-id" value="catalog[1].group[21].group[2]"/>
         <part name="overview">
            <h1>Wireless networks</h1>
            <p>This section describes the controls applicable to wireless networks and extends upon the prior network design and configuration section.</p>
            <h1>Further information</h1>
            <p>Further information on <a href="#a9b6660b-fc4c-4a08-8db6-1130370b6b09">Wi-Fi technologies</a> and associated <a href="#86b273d9-e9d7-4919-9a41-631a5ae5bf88">certification programs</a> are available from the Wi-Fi Alliance.</p>
            <p>Further information on cyber supply chain risk management can be found in the cyber supply chain risk management section of the <a href="#f37a4848-0791-4870-b316-5536c2681c28">Guidelines for Procurement and Outsourcing</a>.</p>
            <p>Further information on evaluated products can be found in the evaluated product procurement section of the <a href="#a699a3aa-828d-479b-b50b-98127bb19437">Guidelines for Evaluated Products</a>.</p>
            <p>Further information on encrypting communications can be found in the cryptographic fundamentals section of the <a href="#195abe87-bb1e-4006-8b42-eaecca4d51f1">Guidelines for Cryptography</a>.</p>
         </part>
         <group>
            <title>Choosing wireless devices</title>
            <prop name="sort-id" value="catalog[1].group[21].group[2].group[01]"/>
            <part name="overview">
               <p>Using wireless devices, such as wireless access points, wireless adapters and wireless network cards, which have been certified against a Wi-Fi Alliance certification program, provides an organisation with the assurance that they conform to wireless standards and are guaranteed to be interoperable with other wireless devices on wireless networks.</p>
            </part>
            <control id="ism-1314" class="ISM-control">
               <title>Control: ism-1314</title>
               <prop name="sort-id"
                      value="catalog[1].group[21].group[2].group[01].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1314_smt">
                  <p>All wireless devices are Wi-Fi Alliance certified.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Public wireless networks</title>
            <prop name="sort-id" value="catalog[1].group[21].group[2].group[02]"/>
            <part name="overview">
               <p>When an organisation provides a public wireless network for general public use, connecting the public wireless network to, or sharing infrastructure with, any other organisation networks can create an entry point for an adversary allowing them to target organisation networks in order to steal data or disrupt services.</p>
            </part>
            <control id="ism-0536" class="ISM-control">
               <title>Control: ism-0536</title>
               <prop name="sort-id"
                      value="catalog[1].group[21].group[2].group[02].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="7"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0536_smt">
                  <p>Public wireless networks provided for general public use are segregated from all other organisation networks.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Administrative interfaces for wireless access points</title>
            <prop name="sort-id" value="catalog[1].group[21].group[2].group[03]"/>
            <part name="overview">
               <p>Administrative interfaces allow users to modify the configuration and security settings of wireless access points. Often, by default, wireless access points allow users to access administrative interfaces over fixed network connections or wireless network connections. To assist in reducing the attack surface for wireless access points, the administrative interface should be disabled for wireless network connections.</p>
            </part>
            <control id="ism-1315" class="ISM-control">
               <title>Control: ism-1315</title>
               <prop name="sort-id"
                      value="catalog[1].group[21].group[2].group[03].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-18"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1315_smt">
                  <p>The administrative interface on wireless access points is disabled for wireless network connections.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Default settings</title>
            <prop name="sort-id" value="catalog[1].group[21].group[2].group[04]"/>
            <part name="overview">
               <p>Some wireless access points come pre-configured with weak configuration settings. As such, it is important to harden the configuration settings of wireless access points prior to their deployment in networks. In addition, some wireless access points come with default Service Set Identifiers (SSIDs). As default SSIDs are often documented on the internet, it is important to change default SSIDs of wireless access points.</p>
               <p>When changing default SSIDs, it is important that new SSIDs do not bring undue attention to an organisation’s wireless networks. In doing so, SSIDs of wireless networks should not be readily associated with an organisation, the location of their premises or the functionality of wireless networks.</p>
               <p>A method commonly recommended to lower the profile of wireless networks is disabling SSID broadcasting. While this ensures that the existence of wireless networks are not broadcast overtly using beacon frames, SSIDs are still broadcast in probe requests, probe responses, association requests and re-association requests. As such, it is easy to determine SSIDs of wireless networks by capturing these requests and responses. By disabling SSID broadcasting, an organisation will make it more difficult for users to connect to wireless networks. Furthermore, an adversary could configure a malicious wireless access point to broadcast the same SSID as a hidden SSID used by a legitimate wireless network, thereby fooling users or devices into automatically connecting to the adversary’s malicious wireless access point instead. In doing so, the adversary could steal authentication credentials in order to gain access to the legitimate wireless network.</p>
            </part>
            <control id="ism-1710" class="ISM-control">
               <title>Control: ism-1710</title>
               <prop name="sort-id"
                      value="catalog[1].group[21].group[2].group[04].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1710_smt">
                  <p>Configuration settings for wireless access points are hardened.</p>
               </part>
            </control>
            <control id="ism-1316" class="ISM-control">
               <title>Control: ism-1316</title>
               <prop name="sort-id"
                      value="catalog[1].group[21].group[2].group[04].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1316_smt">
                  <p>Default SSIDs of wireless access points are changed.</p>
               </part>
            </control>
            <control id="ism-1317" class="ISM-control">
               <title>Control: ism-1317</title>
               <prop name="sort-id"
                      value="catalog[1].group[21].group[2].group[04].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1317_smt">
                  <p>SSIDs of non-public wireless networks are not readily associated with an organisation, the location of their premises or the functionality of wireless networks.</p>
               </part>
            </control>
            <control id="ism-1318" class="ISM-control">
               <title>Control: ism-1318</title>
               <prop name="sort-id"
                      value="catalog[1].group[21].group[2].group[04].control[4]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1318_smt">
                  <p>SSID broadcasting is not disabled on wireless access points.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Media Access Control address filtering</title>
            <prop name="sort-id" value="catalog[1].group[21].group[2].group[05]"/>
            <part name="overview">
               <p>Devices that connect to wireless networks generally have a unique Media Access Control (MAC) address. Using MAC address filtering can prevent rogue devices from connecting to wireless networks. However, an adversary may be able to determine MAC addresses of legitimate devices and use this information to gain access to wireless networks. As such, MAC address filtering introduces management overhead without any tangible security benefit.</p>
            </part>
            <control id="ism-1320" class="ISM-control">
               <title>Control: ism-1320</title>
               <prop name="sort-id"
                      value="catalog[1].group[21].group[2].group[05].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-18"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1320_smt">
                  <p>MAC address filtering is not used to restrict which devices can connect to wireless networks.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Static addressing</title>
            <prop name="sort-id" value="catalog[1].group[21].group[2].group[06]"/>
            <part name="overview">
               <p>Assigning static IP addresses for devices accessing wireless networks can prevent rogue devices connecting to wireless networks from being assigned routable IP addresses. However, an adversary may be able to determine IP addresses of legitimate devices and use this information to gain access to wireless networks. As such, configuring devices to use static IP addresses introduces management overhead without any tangible security benefit.</p>
            </part>
            <control id="ism-1319" class="ISM-control">
               <title>Control: ism-1319</title>
               <prop name="sort-id"
                      value="catalog[1].group[21].group[2].group[06].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-18"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1319_smt">
                  <p>Static addressing is not used for assigning IP addresses on wireless networks.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Confidentiality and integrity of wireless network traffic</title>
            <prop name="sort-id" value="catalog[1].group[21].group[2].group[07]"/>
            <part name="overview">
               <p>As wireless networks are often capable of being accessed from outside the perimeter of secured spaces, all wireless network traffic requires suitable cryptographic protection. For this purpose it is recommended that Wi-Fi Protected Access 3 (WPA3) be used as it provides equivalent or greater security than its predecessor Wi-Fi Protected Access 2 (WPA2). WPA3 has also prohibited the use of various outdated and insecure cipher suites.</p>
               <p>WPA3-Enterprise supports three enterprise modes of operation: enterprise only mode, transition mode and 192-bit mode. Preference is given to WPA3-Enterprise 192-bit mode as this mode ensures no algorithms with known weaknesses are used. However, if any other WPA3-Enterprise modes are used then Authentication and Key Management suite 00-0F-AC:1 should be disabled (if this option is available).</p>
            </part>
            <control id="ism-1332" class="ISM-control">
               <title>Control: ism-1332</title>
               <prop name="sort-id"
                      value="catalog[1].group[21].group[2].group[07].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1332_smt">
                  <p>WPA3-Enterprise 192-bit mode is used to protect the confidentiality and integrity of all wireless network traffic.</p>
               </part>
            </control>
         </group>
         <group>
            <title>802.1X authentication</title>
            <prop name="sort-id" value="catalog[1].group[21].group[2].group[08]"/>
            <part name="overview">
               <p>WPA3-Enterprise uses 802.1X authentication which requires the use of an Extensible Authentication Protocol (EAP). A number of EAP methods supported by both WPA2 and WPA3 are available.</p>
               <p>Extensible Authentication Protocol-Transport Layer Security (EAP-TLS) is considered one of the most secure EAP methods and is widely supported. It uses a Public Key Infrastructure to secure communications between devices and a Remote Access Dial-In User Service (RADIUS) server through the use of X.509 certificates. While EAP-TLS provides strong mutual authentication, it requires an organisation to have established a Public Key Infrastructure. This involves deploying their own certificate authority and issuing certificates, or sourcing certificates from a commercial certificate authority, for every device that accesses their wireless networks. While this introduces additional costs and management overheads, the security advantages are significant.</p>
            </part>
            <control id="ism-1321" class="ISM-control">
               <title>Control: ism-1321</title>
               <prop name="sort-id"
                      value="catalog[1].group[21].group[2].group[08].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1321_smt">
                  <p>802.1X authentication with EAP-TLS, using X.509 certificates, is used for mutual authentication; with all other EAP methods disabled on supplications and authentication servers.</p>
               </part>
            </control>
            <control id="ism-1711" class="ISM-control">
               <title>Control: ism-1711</title>
               <prop name="sort-id"
                      value="catalog[1].group[21].group[2].group[08].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1711_smt">
                  <p>User identity confidentiality is used if available with EAP-TLS implementations.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Evaluation of 802.1X authentication implementation</title>
            <prop name="sort-id" value="catalog[1].group[21].group[2].group[09]"/>
            <part name="overview">
               <p>The security of 802.1X authentication is dependent on four main elements and how they interact with each other. These four elements include supplicants, authenticators, wireless access points and authentication servers. To provide assurance that these elements have been implemented correctly, they should have completed an evaluation.</p>
            </part>
            <control id="ism-1322" class="ISM-control">
               <title>Control: ism-1322</title>
               <prop name="sort-id"
                      value="catalog[1].group[21].group[2].group[09].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1322_smt">
                  <p>Evaluated supplicants, authenticators, wireless access points and authentication servers are used in wireless networks.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Generating and issuing certificates for authentication</title>
            <prop name="sort-id" value="catalog[1].group[21].group[2].group[10]"/>
            <part name="overview">
               <p>When issuing certificates to devices in order to access wireless networks, an organisation should be aware that certificates could be stolen by malicious code. Once compromised, certificates could be used on other devices to gain unauthorised access to wireless networks. An organisation should also be aware that in only issuing certificates to devices, any actions taken by users will only be attributable to specific devices.</p>
               <p>When issuing certificates to users in order to access wireless networks, it can be in the form of certificates that are stored on devices or certificates that are stored on smart cards. While issuing certificates on smart cards provides increased security, it comes at a higher cost. However, users are more likely to notice missing smart cards and alert their security team, who are then able to revoke their credentials, which can minimise the time an adversary has access to wireless networks. In addition, to reduce the likelihood of stolen smart cards from being used to gain unauthorised access to wireless networks, multi-factor authentication can be implemented through the use of personal identification numbers on smart cards. This is particularly important when smart cards grant users any form of administrative access.</p>
            </part>
            <control id="ism-1324" class="ISM-control">
               <title>Control: ism-1324</title>
               <prop name="sort-id"
                      value="catalog[1].group[21].group[2].group[10].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1324_smt">
                  <p>Certificates are generated using an evaluated certificate authority or hardware security module.</p>
               </part>
            </control>
            <control id="ism-1323" class="ISM-control">
               <title>Control: ism-1323</title>
               <prop name="sort-id"
                      value="catalog[1].group[21].group[2].group[10].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1323_smt">
                  <p>Certificates are required for both devices and users accessing wireless networks.</p>
               </part>
            </control>
            <control id="ism-1327" class="ISM-control">
               <title>Control: ism-1327</title>
               <prop name="sort-id"
                      value="catalog[1].group[21].group[2].group[10].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1327_smt">
                  <p>Certificates are protected by encryption, user authentication, and both logical and physical access controls.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Caching 802.1X authentication outcomes</title>
            <prop name="sort-id" value="catalog[1].group[21].group[2].group[11]"/>
            <part name="overview">
               <p>When 802.1X authentication is used, a shared secret key known as the Pairwise Master Key (PMK) is generated upon successful authentication of devices. This PMK is then capable of being cached to assist with fast roaming between wireless access points. When devices roam away from wireless access points they have authenticated to, they will not need to perform a full re-authentication should they roam back while the cached PMK remains valid. To further assist with roaming, wireless access points can be configured to pre-authenticate devices to neighbouring wireless access points that devices might roam to. Although requiring full authentication for devices each time they roam between wireless access points is ideal, an organisation can choose to use PMK caching and pre-authentication if they have a business requirement for fast roaming. If PMK caching is used, the PMK caching period should not be set to greater than 1440 minutes (24 hours).</p>
            </part>
            <control id="ism-1330" class="ISM-control">
               <title>Control: ism-1330</title>
               <prop name="sort-id"
                      value="catalog[1].group[21].group[2].group[11].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-18"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1330_smt">
                  <p>The PMK caching period is not set to greater than 1440 minutes (24 hours).</p>
               </part>
            </control>
         </group>
         <group>
            <title>Fast Basic Service Set Transition</title>
            <prop name="sort-id" value="catalog[1].group[21].group[2].group[12]"/>
            <part name="overview">
               <p>The WPA3 standard specifies support for Fast Basic Service Set Transition (FT) (802.11r). FT is a feature designed to improve user mobility and combat lag introduced by the need to authenticate to each wireless access point. However, FT requires authenticators to request and send keys to other authenticators within a security domain. If any of these keys are intercepted, all security properties are lost. Therefore, it is imperative that communications are appropriately secured. As such, FT should be disabled unless it can be confirmed that authenticator-to-authenticator communications are secured by a suitable ASD-Approved Cryptographic Protocol that provides confidentiality, integrity and mutual authentication.</p>
            </part>
            <control id="ism-1712" class="ISM-control">
               <title>Control: ism-1712</title>
               <prop name="sort-id"
                      value="catalog[1].group[21].group[2].group[12].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1712_smt">
                  <p>The use of FT (802.11r) is disabled unless authenticator-to-authenticator communications are secured by an ASD-Approved Cryptographic Protocol.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Remote Authentication Dial-In User Service authentication</title>
            <prop name="sort-id" value="catalog[1].group[21].group[2].group[13]"/>
            <part name="overview">
               <p>Separate to the 802.1X authentication process is the RADIUS authentication process that occurs between authenticators and a RADIUS server. RADIUS is what is known as an authentication, authorisation and accounting protocol, and is intended to mediate network access. However, RADIUS is not secure enough to be used without protection. To protect credentials communicated between authenticators and a RADIUS server, communications should be encapsulated with an additional layer of encryption, such as RADIUS over Internet Protocol Security or RADIUS over Transport Layer Security.</p>
            </part>
            <control id="ism-1454" class="ISM-control">
               <title>Control: ism-1454</title>
               <prop name="sort-id"
                      value="catalog[1].group[21].group[2].group[13].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1454_smt">
                  <p>Communications between authenticators and a RADIUS server are encapsulated with an additional layer of encryption using RADIUS over Internet Protocol Security or RADIUS over Transport Layer Security.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Interference between wireless networks</title>
            <prop name="sort-id" value="catalog[1].group[21].group[2].group[14]"/>
            <part name="overview">
               <p>When wireless networks are deployed in close proximity, there is the potential for interference to impact their availability, especially when operating on commonly used 802.11b/g (2.4 GHz) default channels of 1 and 11. Sufficiently separating wireless networks through the use of frequency separation can help reduce this security risk. This can be achieved by using wireless networks that are configured to operate on channels that minimise overlapping frequencies or by using both 802.11b/g (2.4 GHz) channels and 802.11n (5 GHz) channels. It is important to note though, if implementing a mix of 2.4 GHz and 5 GHz channels, not all devices may be compatible with 802.11n and able to connect to 5 GHz channels.</p>
            </part>
            <control id="ism-1334" class="ISM-control">
               <title>Control: ism-1334</title>
               <prop name="sort-id"
                      value="catalog[1].group[21].group[2].group[14].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-18"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1334_smt">
                  <p>Wireless networks implement sufficient frequency separation from other wireless networks.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Protecting management frames on wireless networks</title>
            <prop name="sort-id" value="catalog[1].group[21].group[2].group[15]"/>
            <part name="overview">
               <p>An effective denial-of-service attack can be performed by exploiting unprotected management frames using inexpensive commercial hardware. The 802.11 standard provides no protection for management frames and therefore does not protect against spoofing or denial-of-service attacks. However, the 802.11w amendment specifically addresses the protection of management frames on wireless networks and should be enabled for WPA2. Note, in WPA3 this feature is built into the standard.</p>
            </part>
            <control id="ism-1335" class="ISM-control">
               <title>Control: ism-1335</title>
               <prop name="sort-id"
                      value="catalog[1].group[21].group[2].group[15].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-18"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1335_smt">
                  <p>Wireless access points enable the use of the 802.11w amendment to protect management frames.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Wireless network footprint</title>
            <prop name="sort-id" value="catalog[1].group[21].group[2].group[16]"/>
            <part name="overview">
               <p>Instead of deploying a small number of wireless access points that broadcast on high power, a greater number of wireless access points that use less broadcast power can be deployed to achieve the desired footprint for wireless networks. This has the benefit of providing service continuity should wireless access points become unserviceable. In such cases, the output power of nearby wireless access points can be increased to cover the footprint gap until the unserviceable wireless access points can be replaced.</p>
               <p>In addition to minimising the output power of wireless access points to reduce the footprint of wireless networks, the use of Radio Frequency (RF) shielding can be used for an organisation’s facilities. While expensive, this will limit wireless communications to areas under the control of an organisation. RF shielding on an organisation’s facilities also has the added benefit of preventing the jamming of wireless networks from outside of the facilities in which wireless networks are operating.</p>
            </part>
            <control id="ism-1338" class="ISM-control">
               <title>Control: ism-1338</title>
               <prop name="sort-id"
                      value="catalog[1].group[21].group[2].group[16].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1338_smt">
                  <p>Instead of deploying a small number of wireless access points that broadcast on high power, a greater number of wireless access points that use less broadcast power are deployed to achieve the desired footprint for wireless networks.</p>
               </part>
            </control>
            <control id="ism-1013" class="ISM-control">
               <title>Control: ism-1013</title>
               <prop name="sort-id"
                      value="catalog[1].group[21].group[2].group[16].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="6"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-1013_smt">
                  <p>The effective range of wireless communications outside an organisation’s area of control is limited by implementing RF shielding on facilities in which SECRET or TOP SECRET wireless networks are used.</p>
               </part>
            </control>
         </group>
      </group>
      <group>
         <title>Service continuity for online services</title>
         <prop name="sort-id" value="catalog[1].group[21].group[3]"/>
         <part name="overview">
            <h1>Further information</h1>
            <p>Further information on cyber supply chain risk management can be found in the cyber supply chain risk management section of the <a href="#f37a4848-0791-4870-b316-5536c2681c28">Guidelines for Procurement and Outsourcing</a>.</p>
            <p>Further information on the use of cloud service providers can be found in the managed services and cloud services section of the <a href="#f37a4848-0791-4870-b316-5536c2681c28">Guidelines for Procurement and Outsourcing</a>.</p>
            <p>Further information on business continuity and disaster recovery planning can be found in the Chief Information Security Officer section of the <a href="#626dab35-81ab-45fe-8c12-0faff1c23c07">Guidelines for Cyber Security Roles</a>.</p>
            <p>Further information on mitigating denial-of-service attacks can be found in the ACSC’s <a href="#c54cc4db-22f4-4d10-8977-2ce62b647bd2">Preparing for and Responding to Denial-of-Service Attacks</a> publication.</p>
         </part>
         <group>
            <title>Cloud-based hosting of online services</title>
            <prop name="sort-id" value="catalog[1].group[21].group[3].group[1]"/>
            <part name="overview">
               <p>Using cloud service providers can allow an organisation to build highly resilient online services due to the increased computing resources, bandwidth and multiple separate physical sites made available by the cloud server providers. An organisation can achieve the same results using their own infrastructure. However, doing so may require significant upfront costs and may still result in a limited capability to scale dynamically to meet increased demand. In case of a denial-of-service attack, cloud-based hosting can also provide segregation from self-hosted or other cloud-hosted services ensuring that other systems, such as email, are not affected.</p>
            </part>
            <control id="ism-1437" class="ISM-control">
               <title>Control: ism-1437</title>
               <prop name="sort-id"
                      value="catalog[1].group[21].group[3].group[1].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="5"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1437_smt">
                  <p>Cloud service providers are used for hosting online services.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Location policies for online services</title>
            <prop name="sort-id" value="catalog[1].group[21].group[3].group[2]"/>
            <part name="overview">
               <p>When using cloud service providers, an organisation will need to consider whether they should lock their data to specific regions or availability zones. In choosing to do so, an organisation will have an expectation that their data will not be relocated to different regions or availability zones by cloud service providers.</p>
            </part>
            <control id="ism-1578" class="ISM-control">
               <title>Control: ism-1578</title>
               <prop name="sort-id"
                      value="catalog[1].group[21].group[3].group[2].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1578_smt">
                  <p>An organisation is notified by cloud service providers of any change to configured regions or availability zones for online services.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Availability planning and monitoring for online services</title>
            <prop name="sort-id" value="catalog[1].group[21].group[3].group[3]"/>
            <part name="overview">
               <p>It is important that connectivity between an organisation and their cloud service providers meets requirements for bandwidth, latency and reliability. In support of this, an organisation and their cloud service providers should discuss any specific network requirements, performance characteristics or planned responses to availability failures, especially when a requirement for high availability exists. Furthermore, an organisation and their cloud service providers should discuss whether dedicated communication links or connections over the internet will be used and whether any secondary communications links will provide sufficient capacity to maintain operational requirements should the primary communication link become unavailable.</p>
               <p>Furthermore, capacity monitoring should be performed in order to manage workloads and monitor the health of online services. This can be achieved through continuous real-time monitoring of metrics, such as latency, jitter, packet loss, throughput and availability. In addition, feedback should be provided to cloud service providers when performance does not meet service level agreement targets. To assist with this, anomaly detection can be performed through network telemetry that is integrated into security monitoring tools.</p>
            </part>
            <control id="ism-1579" class="ISM-control">
               <title>Control: ism-1579</title>
               <prop name="sort-id"
                      value="catalog[1].group[21].group[3].group[3].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1579_smt">
                  <p>Cloud service providers’ ability to dynamically scale resources due to a genuine spike in demand or a denial-of-service attack is tested as part of capacity planning processes for online services.</p>
               </part>
            </control>
            <control id="ism-1580" class="ISM-control">
               <title>Control: ism-1580</title>
               <prop name="sort-id"
                      value="catalog[1].group[21].group[3].group[3].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1580_smt">
                  <p>Where a high availability requirement exists for online services, the services are architected to automatically transition between availability zones.</p>
               </part>
            </control>
            <control id="ism-1441" class="ISM-control">
               <title>Control: ism-1441</title>
               <prop name="sort-id"
                      value="catalog[1].group[21].group[3].group[3].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1441_smt">
                  <p>Where a requirement for high availability exists for online services, a denial of service mitigation service is used.</p>
               </part>
            </control>
            <control id="ism-1581" class="ISM-control">
               <title>Control: ism-1581</title>
               <prop name="sort-id"
                      value="catalog[1].group[21].group[3].group[3].control[4]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1581_smt">
                  <p>Continuous real-time monitoring of the availability of online services is performed.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Using content delivery networks</title>
            <prop name="sort-id" value="catalog[1].group[21].group[3].group[4]"/>
            <part name="overview">
               <p>Similar to cloud-based hosting, the use of content delivery networks (CDNs) can allow an organisation to create highly resilient online services by leveraging the large bandwidth, geographically dispersed hosting locations, traffic scrubbing and other controls offered by CDNs.</p>
               <p>The use of CDNs is particularly effective when serving static bandwidth intensive media, such as images, sound or video files. However, the services offered by CDNs can include more than basic content hosting, such as web response caching, load balancing, web application security and denial of service mitigations.</p>
               <p>Care should be taken when configuring the use of CDNs to ensure that the IP addresses of an organisation’s web servers are not identifiable by an adversary, as this could allow for protections to be bypassed. Additionally, appropriate controls should be applied to only allow communication between an organisation’s web servers, CDNs and authorised management networks.</p>
            </part>
            <control id="ism-1438" class="ISM-control">
               <title>Control: ism-1438</title>
               <prop name="sort-id"
                      value="catalog[1].group[21].group[3].group[4].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1438_smt">
                  <p>Where a high availability requirement exists for website hosting, CDNs that cache websites are used.</p>
               </part>
            </control>
            <control id="ism-1439" class="ISM-control">
               <title>Control: ism-1439</title>
               <prop name="sort-id"
                      value="catalog[1].group[21].group[3].group[4].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1439_smt">
                  <p>If using CDNs, disclosing the IP addresses of web servers under an organisation’s control (referred to as origin servers) is avoided and access to the origin servers is restricted to the CDNs and authorised management networks.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Denial of service strategies</title>
            <prop name="sort-id" value="catalog[1].group[21].group[3].group[5]"/>
            <part name="overview">
               <p>Denial-of-service attacks are designed to disrupt or degrade online services, such as website, email and Domain Name System services. To achieve this goal, an adversary may use a number of methods to deny access to legitimate users of online services. This includes using multiple computers to direct a large volume of unwanted network traffic at online services in an attempt to consume all available network bandwidth, using multiple computers to direct tailored network traffic at online services in an attempt to consume the processing resources of online services, or hijacking online services in an attempt to redirect legitimate users away from those services to other services that the adversary controls.</p>
               <p>Although an organisation cannot avoid being targeted by denial-of-service attacks, there are a number of measures they can implement to prepare for and potentially reduce the impact if targeted. This includes engaging with their cloud service providers to identify the denial of service detection technologies that may be available for their use. For example, real-time capacity reporting dashboards that provide out-of-band and real-time alerts based on organisation-defined thresholds can assist with the rapid identification of denial-of-service attacks.</p>
               <p>Finally, not all online services offered by an organisation may be business critical. Understanding what online services can be disabled or offered with reduced functionality during denial-of-service attacks can help an organisation reduce or eliminate the impact on essential services. Overall, preparing for denial-of-service attacks before they occur is by far the best strategy as it is very difficult to respond once they begin and efforts at this stage are unlikely to be effective.</p>
            </part>
            <control id="ism-1431" class="ISM-control">
               <title>Control: ism-1431</title>
               <prop name="sort-id"
                      value="catalog[1].group[21].group[3].group[5].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1431_smt">
                  <p>Denial-of-service attack mitigation strategies are discussed with cloud service providers, specifically:</p>
                  <ul>
                     <li>their capacity to withstand denial-of-service attacks</li>
                     <li>any costs likely to be incurred as a result of denial-of-service attacks</li>
                     <li>thresholds for notification of denial-of-service attacks</li>
                     <li>thresholds for turning off online services during denial-of-service attacks</li>
                     <li>pre-approved actions that can be undertaken during denial-of-service attacks</li>
                     <li>any arrangements with upstream service providers to block malicious network traffic as far upstream as possible.</li>
                  </ul>
               </part>
            </control>
            <control id="ism-1458" class="ISM-control">
               <title>Control: ism-1458</title>
               <prop name="sort-id"
                      value="catalog[1].group[21].group[3].group[5].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1458_smt">
                  <p>The functionality and quality of online services, how to maintain such functionality, and what functionality can be lived without during a denial-of-service attack, are determined and documented.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Domain name registrar locking</title>
            <prop name="sort-id" value="catalog[1].group[21].group[3].group[6]"/>
            <part name="overview">
               <p>The use of domain name registrar locking can prevent a denial of service caused by unauthorised modification of a domain’s registration details or unauthorised deletion or transfer of a domain.</p>
            </part>
            <control id="ism-1432" class="ISM-control">
               <title>Control: ism-1432</title>
               <prop name="sort-id"
                      value="catalog[1].group[21].group[3].group[6].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1432_smt">
                  <p>Domain names for online services are protected via registrar locking and confirming domain registration details are correct.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Monitoring with real-time alerting for online services</title>
            <prop name="sort-id" value="catalog[1].group[21].group[3].group[7]"/>
            <part name="overview">
               <p>An organisation should perform automated monitoring of online services with real-time alerting to ensure that a denial-of-service attack is detected and responded to as soon as possible.</p>
            </part>
            <control id="ism-1435" class="ISM-control">
               <title>Control: ism-1435</title>
               <prop name="sort-id"
                      value="catalog[1].group[21].group[3].group[7].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1435_smt">
                  <p>Availability monitoring with real-time alerting is implemented for online services to detect denial-of-service attacks and measure their impact.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Segregation of critical online services</title>
            <prop name="sort-id" value="catalog[1].group[21].group[3].group[8]"/>
            <part name="overview">
               <p>Denial-of-service attacks are typically focused on highly visible online services, such as an organisation’s core website, in order to have a publicly noticeable impact. By segregating online services, such as using one internet connection for email and internet access, and a separate internet connection for web hosting services, the impact of a denial-of-service attack can be limited.</p>
            </part>
            <control id="ism-1436" class="ISM-control">
               <title>Control: ism-1436</title>
               <prop name="sort-id"
                      value="catalog[1].group[21].group[3].group[8].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1436_smt">
                  <p>Critical online services are segregated from other online services that are more likely to be targeted.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Preparing for service continuity</title>
            <prop name="sort-id" value="catalog[1].group[21].group[3].group[9]"/>
            <part name="overview">
               <p>An organisation’s full-featured website may have higher processing or resource demands due to database integration or the presence of high-resolution images and videos. These additional resource requirements may make the website more susceptible to denial-of-service attacks. As such, depending on the nature of a denial-of-service attack, replacing the full-featured website with a minimal impact static version can help provide a level of service which would otherwise not be possible.</p>
            </part>
            <control id="ism-1518" class="ISM-control">
               <title>Control: ism-1518</title>
               <prop name="sort-id"
                      value="catalog[1].group[21].group[3].group[9].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1518_smt">
                  <p>A static version of a website is pre-prepared that requires minimal processing and bandwidth in order to facilitate at least a basic level of service when under a denial-of-service attack.</p>
               </part>
            </control>
         </group>
      </group>
   </group>
   <group>
      <title>Guidelines for Cryptography</title>
      <prop name="sort-id" value="catalog[1].group[22]"/>
      <group>
         <title>Cryptographic fundamentals</title>
         <prop name="sort-id" value="catalog[1].group[22].group[1]"/>
         <part name="overview">
            <h1>Purpose of cryptography</h1>
            <p>The purpose of cryptography is to provide confidentiality, integrity, authentication and non-repudiation of data. In doing so, confidentiality protects data by making it unreadable to all but authorised entities, integrity protects data from accidental or deliberate manipulation by entities, authentication ensures that an entity is who they claim to be, and non-repudiation provides proof that an entity performed a particular action.</p>
            <h1>Using encryption</h1>
            <p>Encryption of data at rest can be used to protect sensitive or classified data stored on ICT equipment and media. In addition, encryption of data in transit can be used to protect sensitive or classified data communicated over public network infrastructure. However, when an organisation uses encryption for data at rest, or data in transit, they are not reducing the sensitivity or classification of the data, they are simply reducing the immediate consequences of the data being accessed by an adversary.</p>
            <h1>International standards for cryptographic modules</h1>
            <p>International Organization for Standardization (ISO)/International Electrotechnical Commission (IEC) 19790:2012, <a href="#a07c439d-b2f4-4ee2-b56e-f17000f3722f">Information technology – Security techniques – Security requirements for cryptographic modules</a>, and ISO/IEC 24759:2017, <a href="#aaf83df2-02e3-4f9f-bdf5-33fbff42842d">Information technology – Security techniques – Test requirements for cryptographic modules</a>, are international standards for the design and validation of hardware and software cryptographic modules.</p>
            <p>Federal Information Processing Standard (FIPS) 140-3, <a href="#32c8fa3a-45bb-4f88-baee-73a7696aa2ad">Security Requirements for Cryptographic Modules</a> and National Institute of Standards and Technology (NIST) Special Publication (SP) 180-140, <a href="#197db872-c6a9-4b29-9888-1552e908252c">FIPS 140-3 Derived Test Requirements (DTR): CMVP Validation Authority Updates to ISO/IEC 24759</a> are United States standards based upon ISO/IEC 19790:2012 and ISO/IEC 24759:2017.</p>
            <h1>Further information</h1>
            <p>Further information on cryptographic key management practices can be found in NIST SP 800-57 Part 1 Rev. 5, <a href="#ffc8a1f6-f4e3-4ff5-a7f9-f41f766274eb">Recommendation for Key Management: Part 1 – General</a>.</p>
            <p>Further information on cryptographic key management practices for ASD-approved HACE is available from the ACSC.</p>
            <p>Further information on cyber supply chain risk management can be found in the cyber supply chain risk management section of the <a href="#f37a4848-0791-4870-b316-5536c2681c28">Guidelines for Procurement and Outsourcing</a>.</p>
            <p>Further information on evaluated products can be found in the evaluated product procurement section of the <a href="#a699a3aa-828d-479b-b50b-98127bb19437">Guidelines for Evaluated Products</a>.</p>
            <p>Further information on the evaluation of cryptographic modules, including testing requirements, is available as part of the <a href="#28cd91d2-e5cb-4896-bcfc-abb32e05e61d">Cryptographic Module Validation Program</a> which is jointly operated by NIST and the Canadian Centre for Cyber Security.</p>
            <p>Further information on the protection of ICT equipment and media can be found in the Attorney-General’s Department’s <a href="#92679127-f61d-486a-a93e-df2a26dfb07a">Protective Security Policy Framework</a>, <a href="#6e456a92-f405-4151-88ca-5621aa23519b">Physical security for entity resources</a> policy.</p>
         </part>
         <group>
            <title>ASD-approved High Assurance Cryptographic Equipment</title>
            <prop name="sort-id" value="catalog[1].group[22].group[1].group[1]"/>
            <part name="overview">
               <p>In order to ensure interoperability and maintain trust, all High Assurance Cryptographic Equipment (HACE) that processes, stores or communicates SECRET or TOP SECRET data must be approved for use by the Australian Signals Directorate (ASD). In addition, the Australian Cyber Security Centre (ACSC) specifies additional requirements in Australian Communications Security Instructions and other cyber security-related publications for ASD-approved HACE that must be complied with. Such requirements supplement these guidelines and, where conflicts occur, take precedence.</p>
            </part>
            <control id="ism-1802" class="ISM-control">
               <title>Control: ism-1802</title>
               <prop name="sort-id"
                      value="catalog[1].group[22].group[1].group[1].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-1802_smt">
                  <p>HACE does not process, store or communicate SECRET or TOP SECRET data until approved for use by ASD.</p>
               </part>
            </control>
            <control id="ism-0499" class="ISM-control">
               <title>Control: ism-0499</title>
               <prop name="sort-id"
                      value="catalog[1].group[22].group[1].group[1].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="10"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-0499_smt">
                  <p>All communications security and equipment-specific doctrine produced by the ACSC for the management and use of ASD-approved HACE is complied with.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Cryptographic key management processes and procedures</title>
            <prop name="sort-id" value="catalog[1].group[22].group[1].group[2]"/>
            <part name="overview">
               <p>Well documented cryptographic key management processes and procedures can assist with the secure use and management of cryptographic keys and associated hardware and software. In doing so, cryptographic key management processes and procedures should cover cryptographic key generation, registration, distribution, installation, usage, protection, storage, access, recovery and destruction.</p>
            </part>
            <control id="ism-0507" class="ISM-control">
               <title>Control: ism-0507</title>
               <prop name="sort-id"
                      value="catalog[1].group[22].group[1].group[2].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="5"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0507_smt">
                  <p>Cryptographic key management processes, and supporting cryptographic key management procedures, are developed, implemented and maintained.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Encrypting data at rest</title>
            <prop name="sort-id" value="catalog[1].group[22].group[1].group[3]"/>
            <part name="overview">
               <p>When encryption is applied to data at rest it provides an additional layer of defence against unauthorised access by an adversary. In doing so, it is important that full disk encryption is used as it provides a greater level of protection than file-based encryption. This is due to the fact that while file-based encryption may encrypt individual files, there is the possibility that unencrypted copies of files may be left in temporary locations used by an operating system. When selecting cryptographic equipment or software for this purpose, the level of assurance required will depend on the sensitivity or classification of the data.</p>
            </part>
            <control id="ism-1080" class="ISM-control">
               <title>Control: ism-1080</title>
               <prop name="sort-id"
                      value="catalog[1].group[22].group[1].group[3].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="5"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Jun-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1080_smt">
                  <p>An ASD-Approved Cryptographic Algorithm (AACA) or high assurance cryptographic algorithm is used when encrypting media.</p>
               </part>
            </control>
            <control id="ism-0457" class="ISM-control">
               <title>Control: ism-0457</title>
               <prop name="sort-id"
                      value="catalog[1].group[22].group[1].group[3].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="9"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="O"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="P"/>
               <part name="statement" id="ism-0457_smt">
                  <p>Cryptographic equipment or software that has completed a Common Criteria evaluation against a Protection Profile is used when encrypting media that contains OFFICIAL: Sensitive or PROTECTED data.</p>
               </part>
            </control>
            <control id="ism-0460" class="ISM-control">
               <title>Control: ism-0460</title>
               <prop name="sort-id"
                      value="catalog[1].group[22].group[1].group[3].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="12"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-0460_smt">
                  <p>ASD-approved HACE is used when encrypting media that contains SECRET or TOP SECRET data.</p>
               </part>
            </control>
            <control id="ism-0459" class="ISM-control">
               <title>Control: ism-0459</title>
               <prop name="sort-id"
                      value="catalog[1].group[22].group[1].group[3].control[4]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0459_smt">
                  <p>Full disk encryption, or partial encryption where access controls will only allow writing to the encrypted partition, is implemented when encrypting data at rest.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Encrypting data in transit</title>
            <prop name="sort-id" value="catalog[1].group[22].group[1].group[4]"/>
            <part name="overview">
               <p>When data is communicated over network infrastructure, encryption should be used to protect the data from unauthorised access or manipulation. When selecting cryptographic equipment or software for this purpose, the level of assurance required will depend on the sensitivity or classification of the data and the environment in which it is being applied.</p>
            </part>
            <control id="ism-0469" class="ISM-control">
               <title>Control: ism-0469</title>
               <prop name="sort-id"
                      value="catalog[1].group[22].group[1].group[4].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="6"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Jun-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0469_smt">
                  <p>An ASD-Approved Cryptographic Protocol (AACP) or high assurance cryptographic protocol is used to protect data when communicated over network infrastructure.</p>
               </part>
            </control>
            <control id="ism-0465" class="ISM-control">
               <title>Control: ism-0465</title>
               <prop name="sort-id"
                      value="catalog[1].group[22].group[1].group[4].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="9"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="O"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="P"/>
               <part name="statement" id="ism-0465_smt">
                  <p>Cryptographic equipment or software that has completed a Common Criteria evaluation against a Protection Profile is used to protect OFFICIAL: Sensitive or PROTECTED data when communicated over insufficiently secure networks, outside of appropriately secure areas or via public network infrastructure.</p>
               </part>
            </control>
            <control id="ism-0467" class="ISM-control">
               <title>Control: ism-0467</title>
               <prop name="sort-id"
                      value="catalog[1].group[22].group[1].group[4].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="11"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-0467_smt">
                  <p>ASD-approved HACE is used to protect SECRET and TOP SECRET data when communicated over insufficiently secure networks, outside of appropriately secure areas or via public network infrastructure.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Data recovery</title>
            <prop name="sort-id" value="catalog[1].group[22].group[1].group[5]"/>
            <part name="overview">
               <p>To ensure that access to encrypted data is not lost due to the loss, damage or failure of an encryption key, it is important that where practical cryptographic equipment and software provides a means of data recovery.</p>
            </part>
            <control id="ism-0455" class="ISM-control">
               <title>Control: ism-0455</title>
               <prop name="sort-id"
                      value="catalog[1].group[22].group[1].group[5].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0455_smt">
                  <p>Where practical, cryptographic equipment and software provides a means of data recovery to allow for circumstances where the encryption key is unavailable due to loss, damage or failure.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Handling encrypted ICT equipment and media</title>
            <prop name="sort-id" value="catalog[1].group[22].group[1].group[6]"/>
            <part name="overview">
               <p>When a user authenticates to the encryption functionality of ICT equipment or media, encrypted data is made available. At such a time, the ICT equipment or media should be handled according to its original sensitivity or classification. Once the user deauthenticates from the encryption functionality, such as shutting down a device or activating a lock screen, the ICT equipment or media can be considered to be protected by the encryption functionality again.</p>
            </part>
            <control id="ism-0462" class="ISM-control">
               <title>Control: ism-0462</title>
               <prop name="sort-id"
                      value="catalog[1].group[22].group[1].group[6].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="7"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0462_smt">
                  <p>When a user authenticates to the encryption functionality of ICT equipment or media, it is treated in accordance with its original sensitivity or classification until the user deauthenticates from the encryption functionality.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Transporting cryptographic equipment</title>
            <prop name="sort-id" value="catalog[1].group[22].group[1].group[7]"/>
            <part name="overview">
               <p>Transporting cryptographic equipment in a keyed state may expose its keying material to potential compromise. Therefore, if cryptographic equipment is transported in a keyed state it should be done based on the sensitivity or classification of its keying material.</p>
            </part>
            <control id="ism-0501" class="ISM-control">
               <title>Control: ism-0501</title>
               <prop name="sort-id"
                      value="catalog[1].group[22].group[1].group[7].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="6"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0501_smt">
                  <p>Keyed cryptographic equipment is transported based on the sensitivity or classification of its keying material.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Reporting cryptographic-related cyber security incidents</title>
            <prop name="sort-id" value="catalog[1].group[22].group[1].group[8]"/>
            <part name="overview">
               <p>If cryptographic equipment or associated keying material is compromised, or suspected of being compromised, then the confidentiality and integrity of previous and future communications may also be compromised. In such cases, the cyber security incident should be reported to an organisation’s Chief Information Security Officer, or one of their delegates, as soon as possible after it occurs and all keying material should be changed.</p>
            </part>
            <control id="ism-0142" class="ISM-control">
               <title>Control: ism-0142</title>
               <prop name="sort-id"
                      value="catalog[1].group[22].group[1].group[8].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0142_smt">
                  <p>The compromise or suspected compromise of cryptographic equipment or associated keying material is reported to an organisation’s Chief Information Security Officer, or one of their delegates, as soon as possible after it occurs.</p>
               </part>
            </control>
            <control id="ism-1091" class="ISM-control">
               <title>Control: ism-1091</title>
               <prop name="sort-id"
                      value="catalog[1].group[22].group[1].group[8].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="6"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1091_smt">
                  <p>Keying material is changed when compromised or suspected of being compromised.</p>
               </part>
            </control>
         </group>
      </group>
      <group>
         <title>ASD-Approved Cryptographic Algorithms</title>
         <prop name="sort-id" value="catalog[1].group[22].group[2]"/>
         <part name="overview">
            <h1>High assurance cryptographic algorithms</h1>
            <p>High assurance cryptographic algorithms, which are not covered in this section, can be used for the protection of SECRET and TOP SECRET data if they are suitably implemented in ASD-approved HACE. Further information on high assurance cryptographic algorithms can be obtained from the ACSC.</p>
            <h1>ASD-Approved Cryptographic Algorithms</h1>
            <p>There is no guarantee of an algorithm’s resistance to currently unknown attacks. However, the algorithms listed in this section have been extensively scrutinised by industry and academic communities in a practical and theoretical setting. Approval for the use of the algorithms listed in this section is limited to cases where they are implemented in accordance with these guidelines.</p>
            <p>The approved asymmetric/public key algorithms are:</p>
            <ul>
               <li>Diffie-Hellman (DH) for agreeing on encryption session keys</li>
               <li>Digital Signature Algorithm (DSA) for digital signatures</li>
               <li>Elliptic Curve Diffie-Hellman (ECDH) for key exchange</li>
               <li>Elliptic Curve Digital Signature Algorithm (ECDSA) for digital signatures</li>
               <li>Rivest-Shamir-Adleman (RSA) for digital signatures and passing encryption session keys or similar keys.</li>
            </ul>
            <p>The only approved hashing algorithm is Secure Hashing Algorithm 2 (SHA-2).</p>
            <p>The only approved symmetric encryption algorithm is Advanced Encryption Standard (AES).</p>
            <p>Where there is a range of key sizes for an algorithm, some of the smaller key sizes are not approved as they do not provide an adequate safety margin against possible future attacks. For example, advances in integer factorisation methods could render smaller RSA moduli vulnerable.</p>
            <p>The targets used for the effective security strength of algorithms listed within this section are 112 bits for PROTECTED and below data, 128 bits for SECRET data and 192 bits for TOP SECRET data. However, some key sizes and curves are preferred in order to ensure interoperability with the United States’ initial Commercial National Security Algorithm Suite (now referred to as CNSA 1.0).</p>
            <h1>Further information</h1>
            <p>Further information on the United States’ <a href="#e8a28fa5-4ea1-4ef5-a870-4d59e40fab37">Commercial National Security Algorithm Suite</a> is available from the United States’ National Security Agency.</p>
         </part>
         <group>
            <title>Using ASD-Approved Cryptographic Algorithms</title>
            <prop name="sort-id" value="catalog[1].group[22].group[2].group[01]"/>
            <part name="overview">
               <p>If cryptographic equipment or software implements unapproved algorithms, it is possible that these algorithms could be used without a user’s knowledge. In combination with an assumed level of security confidence, this can represent a security risk. As such, an organisation can ensure that only AACAs or high assurance cryptographic algorithms can be used by disabling all unapproved algorithms (preferred) or by advising users not to use the unapproved algorithms via usage policies.</p>
            </part>
            <control id="ism-0471" class="ISM-control">
               <title>Control: ism-0471</title>
               <prop name="sort-id"
                      value="catalog[1].group[22].group[2].group[01].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="7"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0471_smt">
                  <p>Only AACAs or high assurance cryptographic algorithms are used by cryptographic equipment and software.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Asymmetric/public key algorithms</title>
            <prop name="sort-id" value="catalog[1].group[22].group[2].group[02]"/>
            <part name="overview">
               <p>DH and DSA are vulnerable to different types of attacks than ECDH and ECDSA. As a result, ECDH and ECDSA offer more effective security per bit increase. This leads to smaller data requirements which in turn means that elliptic curve variants have become de facto global standards. For reduced data cost, and to promote interoperability, ECDH and ECDSA should be used where possible.</p>
            </part>
            <control id="ism-0994" class="ISM-control">
               <title>Control: ism-0994</title>
               <prop name="sort-id"
                      value="catalog[1].group[22].group[2].group[02].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="6"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0994_smt">
                  <p>ECDH and ECDSA are used in preference to DH and DSA.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Using Diffie-Hellman</title>
            <prop name="sort-id" value="catalog[1].group[22].group[2].group[03]"/>
            <part name="overview">
               <p>A modulus of 2048 bits for correctly implemented DH provides 112 bits of effective security strength. Taking into account projected technological advances, it is assessed that 112 bits of effective security strength will remain secure until 2030.</p>
               <p>When DH in a prime field is used, the prime modulus impacts the security of the algorithm. The security considerations when creating such a prime modulus can be found in NIST SP 800-56A Rev. 3, along with a collection of commonly used secure moduli.</p>
            </part>
            <control id="ism-0472" class="ISM-control">
               <title>Control: ism-0472</title>
               <prop name="sort-id"
                      value="catalog[1].group[22].group[2].group[03].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="6"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="O"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="P"/>
               <part name="statement" id="ism-0472_smt">
                  <p>When using DH for agreeing on encryption session keys, a modulus of at least 2048 bits is used, preferably 3072 bits.</p>
               </part>
            </control>
            <control id="ism-1759" class="ISM-control">
               <title>Control: ism-1759</title>
               <prop name="sort-id"
                      value="catalog[1].group[22].group[2].group[03].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-1759_smt">
                  <p>When using DH for agreeing on encryption session keys, a modulus of at least 3072 bits is used, preferably 3072 bits.</p>
               </part>
            </control>
            <control id="ism-1629" class="ISM-control">
               <title>Control: ism-1629</title>
               <prop name="sort-id"
                      value="catalog[1].group[22].group[2].group[03].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1629_smt">
                  <p>When using DH for agreeing on encryption session keys, a modulus and associated parameters are selected according to NIST SP 800-56A Rev. 3.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Using the Digital Signature Algorithm</title>
            <prop name="sort-id" value="catalog[1].group[22].group[2].group[04]"/>
            <part name="overview">
               <p>A modulus of 2048 bits for correctly implemented DSA provides 112 bits of effective security strength. Taking into account projected technological advances, it is assessed that 112 bits of effective security strength will remain secure until 2030.</p>
            </part>
            <control id="ism-0473" class="ISM-control">
               <title>Control: ism-0473</title>
               <prop name="sort-id"
                      value="catalog[1].group[22].group[2].group[04].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="5"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-20"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="O"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="P"/>
               <part name="statement" id="ism-0473_smt">
                  <p>When using DSA for digital signatures, a modulus of at least 2048 bits is used.</p>
               </part>
            </control>
            <control id="ism-1630" class="ISM-control">
               <title>Control: ism-1630</title>
               <prop name="sort-id"
                      value="catalog[1].group[22].group[2].group[04].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="O"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="P"/>
               <part name="statement" id="ism-1630_smt">
                  <p>When using DSA for digital signatures, a modulus and associated parameters are generated according to FIPS 186-4.</p>
               </part>
            </control>
            <control id="ism-1760" class="ISM-control">
               <title>Control: ism-1760</title>
               <prop name="sort-id"
                      value="catalog[1].group[22].group[2].group[04].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-1760_smt">
                  <p>DSA is not used for digital signatures.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Using Elliptic Curve Cryptography</title>
            <prop name="sort-id" value="catalog[1].group[22].group[2].group[05]"/>
            <part name="overview">
               <p>The curve used within an elliptic curve algorithm impacts the security of the algorithm. As such, only suitable curves from FIPS 186-4 should be used.</p>
            </part>
            <control id="ism-1446" class="ISM-control">
               <title>Control: ism-1446</title>
               <prop name="sort-id"
                      value="catalog[1].group[22].group[2].group[05].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1446_smt">
                  <p>When using elliptic curve cryptography, a curve from FIPS 186-4 is used.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Using Elliptic Curve Diffie-Hellman</title>
            <prop name="sort-id" value="catalog[1].group[22].group[2].group[06]"/>
            <part name="overview">
               <p>When using a curve from FIPS 186-4, a base point order and key size of at least 224 bits for correctly implemented ECDH provides 112 bits of effective security strength. Security of a curve selected from another source cannot be assumed to have the same security using base point order and key size alone.</p>
            </part>
            <control id="ism-0474" class="ISM-control">
               <title>Control: ism-0474</title>
               <prop name="sort-id"
                      value="catalog[1].group[22].group[2].group[06].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="6"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="O"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="P"/>
               <part name="statement" id="ism-0474_smt">
                  <p>When using ECDH for agreeing on encryption session keys, a base point order and key size of at least 224 bits is used, preferably the NIST P-384 curve.</p>
               </part>
            </control>
            <control id="ism-1761" class="ISM-control">
               <title>Control: ism-1761</title>
               <prop name="sort-id"
                      value="catalog[1].group[22].group[2].group[06].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <part name="statement" id="ism-1761_smt">
                  <p>When using ECDH for agreeing on encryption session keys, NIST P-256, P-384 or P-521 curves are used, preferably the NIST P-384 curve.</p>
               </part>
            </control>
            <control id="ism-1762" class="ISM-control">
               <title>Control: ism-1762</title>
               <prop name="sort-id"
                      value="catalog[1].group[22].group[2].group[06].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-1762_smt">
                  <p>When using ECDH for agreeing on encryption session keys, NIST P-384 or P-521 curves are used, preferably the NIST P-384 curve.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Using the Elliptic Curve Digital Signature Algorithm</title>
            <prop name="sort-id" value="catalog[1].group[22].group[2].group[07]"/>
            <part name="overview">
               <p>When using a curve from FIPS 186-4, a base point order and key size of 224 bits for correctly implemented ECDSA provides 112 bits of effective security strength. Security of a curve selected from another source cannot be assumed to have the same security using base point order and key size alone.</p>
            </part>
            <control id="ism-0475" class="ISM-control">
               <title>Control: ism-0475</title>
               <prop name="sort-id"
                      value="catalog[1].group[22].group[2].group[07].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="6"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="O"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="P"/>
               <part name="statement" id="ism-0475_smt">
                  <p>When using ECDSA for digital signatures, a base point order and key size of at least 224 bits is used, preferably the P-384 curve.</p>
               </part>
            </control>
            <control id="ism-1763" class="ISM-control">
               <title>Control: ism-1763</title>
               <prop name="sort-id"
                      value="catalog[1].group[22].group[2].group[07].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <part name="statement" id="ism-1763_smt">
                  <p>When using ECDSA for digital signatures, NIST P-256, P-384 or P-521 curves are used, preferably the NIST P-384 curve.</p>
               </part>
            </control>
            <control id="ism-1764" class="ISM-control">
               <title>Control: ism-1764</title>
               <prop name="sort-id"
                      value="catalog[1].group[22].group[2].group[07].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-1764_smt">
                  <p>When using ECDSA for digital signatures, NIST P-384 or P-521 curves are used, preferably the NIST P-384 curve.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Using Rivest-Shamir-Adleman</title>
            <prop name="sort-id" value="catalog[1].group[22].group[2].group[08]"/>
            <part name="overview">
               <p>A modulus of 2048 bits for correctly implemented RSA provides 112 bits of effective security strength. Taking into account projected technological advances, it is assessed that 112 bits of effective security strength will remain secure until 2030.</p>
            </part>
            <control id="ism-0476" class="ISM-control">
               <title>Control: ism-0476</title>
               <prop name="sort-id"
                      value="catalog[1].group[22].group[2].group[08].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="7"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="O"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="P"/>
               <part name="statement" id="ism-0476_smt">
                  <p>When using RSA for digital signatures, and passing encryption session keys or similar keys, a modulus of at least 2048 bits is used, preferably 3072 bits.</p>
               </part>
            </control>
            <control id="ism-1765" class="ISM-control">
               <title>Control: ism-1765</title>
               <prop name="sort-id"
                      value="catalog[1].group[22].group[2].group[08].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-1765_smt">
                  <p>When using RSA for digital signatures, and passing encryption session keys or similar keys, a modulus of at least 3072 bits is used, preferably 3072 bits.</p>
               </part>
            </control>
            <control id="ism-0477" class="ISM-control">
               <title>Control: ism-0477</title>
               <prop name="sort-id"
                      value="catalog[1].group[22].group[2].group[08].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="8"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0477_smt">
                  <p>When using RSA for digital signatures, and for passing encryption session keys or similar keys, a different key pair is used for digital signatures and passing encrypted session keys.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Using hashing algorithms</title>
            <prop name="sort-id" value="catalog[1].group[22].group[2].group[09]"/>
            <part name="overview">
               <p>For most purposes, a hashing algorithm with an output size of 224 bits provides 112 bits of effective security strength. Similarly, a hashing algorithm with an output size of 256 bits provides 128 bits of effective security strength, and an output size of 384 bits provides 192 bits of effective security strength. Only hashing algorithms from the SHA-2 family are approved for use.</p>
            </part>
            <control id="ism-1766" class="ISM-control">
               <title>Control: ism-1766</title>
               <prop name="sort-id"
                      value="catalog[1].group[22].group[2].group[09].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="O"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="P"/>
               <part name="statement" id="ism-1766_smt">
                  <p>When using SHA-2 for hashing, an output size of at least 224 bits is used, preferably SHA-384.</p>
               </part>
            </control>
            <control id="ism-1767" class="ISM-control">
               <title>Control: ism-1767</title>
               <prop name="sort-id"
                      value="catalog[1].group[22].group[2].group[09].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <part name="statement" id="ism-1767_smt">
                  <p>When using SHA-2 for hashing, an output size of at least 256 bits is used, preferably SHA-384.</p>
               </part>
            </control>
            <control id="ism-1768" class="ISM-control">
               <title>Control: ism-1768</title>
               <prop name="sort-id"
                      value="catalog[1].group[22].group[2].group[09].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-1768_smt">
                  <p>When using SHA-2 for hashing, an output size of at least 384 bits is used, preferably SHA-384.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Using symmetric encryption algorithms</title>
            <prop name="sort-id" value="catalog[1].group[22].group[2].group[10]"/>
            <part name="overview">
               <p>The use of Electronic Codebook Mode with block ciphers allows repeated patterns in plaintext to appear as repeated patterns in ciphertext. Most plaintext, including written language and formatted files, contains significant repeated patterns. As such, an adversary can use this to deduce possible meanings of ciphertext. The use of other modes, such as Cipher Block Chaining, Cipher Feedback, Galois/Counter Mode or Output Feedback, can prevent such attacks, although each has different properties which can make them inappropriate for certain use cases. AES is the only approved symmetric encryption algorithm.</p>
            </part>
            <control id="ism-1769" class="ISM-control">
               <title>Control: ism-1769</title>
               <prop name="sort-id"
                      value="catalog[1].group[22].group[2].group[10].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="O"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="P"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <part name="statement" id="ism-1769_smt">
                  <p>When using AES for encryption, AES-128, AES-192 or AES-256 is used, preferably AES-256.</p>
               </part>
            </control>
            <control id="ism-1770" class="ISM-control">
               <title>Control: ism-1770</title>
               <prop name="sort-id"
                      value="catalog[1].group[22].group[2].group[10].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-1770_smt">
                  <p>When using AES for encryption, AES-192 or AES-256 is used, preferably AES-256.</p>
               </part>
            </control>
            <control id="ism-0479" class="ISM-control">
               <title>Control: ism-0479</title>
               <prop name="sort-id"
                      value="catalog[1].group[22].group[2].group[10].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="5"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0479_smt">
                  <p>Symmetric cryptographic algorithms are not used in Electronic Codebook Mode.</p>
               </part>
            </control>
         </group>
      </group>
      <group>
         <title>ASD-Approved Cryptographic Protocols</title>
         <prop name="sort-id" value="catalog[1].group[22].group[3]"/>
         <part name="overview">
            <h1>High assurance cryptographic protocols</h1>
            <p>High assurance cryptographic protocols, which are not covered in this section, can be used for the protection of SECRET and TOP SECRET data if they are suitably implemented in ASD-approved HACE. Further information on high assurance cryptographic protocols can be obtained from the ACSC.</p>
            <h1>ASD-Approved Cryptographic Protocols</h1>
            <p>There is no guarantee of a protocol’s resistance to currently unknown attacks. However, the protocols listed in this section have been extensively scrutinised by industry and academic communities in a practical and theoretical setting. Approval for the use of the protocols listed in this section is limited to cases where they are implemented in accordance with these guidelines.</p>
            <p>The AACPs are:</p>
            <ul>
               <li>Transport Layer Security (TLS)</li>
               <li>Secure Shell (SSH)</li>
               <li>Secure/Multipurpose Internet Mail Extension (S/MIME)</li>
               <li>OpenPGP Message Format</li>
               <li>Internet Protocol Security (IPsec)</li>
               <li>Wi-Fi Protected Access 2</li>
               <li>Wi-Fi Protected Access 3.</li>
            </ul>
            <h1>Further information</h1>
            <p>Further information on AACPs can be found in the following sections of these guidelines.</p>
            <p>Further information on the use of Wi-Fi Protected Access 2 and Wi-Fi Protected Access 3 can be found in the wireless networks section of the <a href="#f145ff5b-d396-4248-8f48-621349d6f0ed">Guidelines for Networking</a>.</p>
         </part>
         <group>
            <title>Using ASD-Approved Cryptographic Protocols</title>
            <prop name="sort-id" value="catalog[1].group[22].group[3].group[1]"/>
            <part name="overview">
               <p>If cryptographic equipment or software implements unapproved protocols, it is possible that these protocols could be used without a user’s knowledge. In combination with an assumed level of security confidence, this can represent a security risk. As such, an organisation can ensure that only AACPs or high assurance cryptographic protocols can be used by disabling unapproved protocols (preferred) or by advising users not to use unapproved protocols via usage policies.</p>
            </part>
            <control id="ism-0481" class="ISM-control">
               <title>Control: ism-0481</title>
               <prop name="sort-id"
                      value="catalog[1].group[22].group[3].group[1].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="6"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0481_smt">
                  <p>Only AACPs or high assurance cryptographic protocols are used by cryptographic equipment and software.</p>
               </part>
            </control>
         </group>
      </group>
      <group>
         <title>Transport Layer Security</title>
         <prop name="sort-id" value="catalog[1].group[22].group[4]"/>
         <part name="overview">
            <h1>Using Transport Layer Security</h1>
            <p>When using ICT equipment or software that implements TLS, controls for using AACAs and AACPs in the ASD-Approved Cryptographic Algorithms and ASD-Approved Cryptographic Protocols sections of these guidelines will also need to be consulted.</p>
            <h1>Further information</h1>
            <p>Further information on implementing TLS can be found in in the ACSC’s <a href="#b8cdbf18-31cb-4e10-bb43-e8488ee8c2f6">Implementing Certificates, TLS, HTTPS and Opportunistic TLS</a> publication.</p>
            <p>Further information on TLS filtering in gateways can be found in the web content filters section of the <a href="#e8bde527-526c-4a6a-b66f-05228f09dd7b">Guidelines for Gateways</a>.</p>
         </part>
         <group>
            <title>Configuring Transport Layer Security</title>
            <prop name="sort-id" value="catalog[1].group[22].group[4].group[1]"/>
            <part name="overview">
               <p>The terms Secure Sockets Layer and TLS have traditionally been used interchangeably. However, Secure Sockets Layer and earlier versions of TLS are no longer considered suitable for use as an AACP. As such, an organisation implementing TLS should implement TLS version 1.3. In addition, a number of security risks exist when TLS is configured in an insecure manner. To mitigate these security risks, TLS should be configured as per the configuration settings below.</p>
            </part>
            <control id="ism-1139" class="ISM-control">
               <title>Control: ism-1139</title>
               <prop name="sort-id"
                      value="catalog[1].group[22].group[4].group[1].control[01]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="6"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1139_smt">
                  <p>Only the latest version of TLS is used for TLS connections.</p>
               </part>
            </control>
            <control id="ism-1369" class="ISM-control">
               <title>Control: ism-1369</title>
               <prop name="sort-id"
                      value="catalog[1].group[22].group[4].group[1].control[02]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1369_smt">
                  <p>AES-GCM is used for encryption of TLS connections.</p>
               </part>
            </control>
            <control id="ism-1370" class="ISM-control">
               <title>Control: ism-1370</title>
               <prop name="sort-id"
                      value="catalog[1].group[22].group[4].group[1].control[03]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1370_smt">
                  <p>Only server-initiated secure renegotiation is used for TLS connections.</p>
               </part>
            </control>
            <control id="ism-1372" class="ISM-control">
               <title>Control: ism-1372</title>
               <prop name="sort-id"
                      value="catalog[1].group[22].group[4].group[1].control[04]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1372_smt">
                  <p>DH or ECDH is used for key establishment of TLS connections.</p>
               </part>
            </control>
            <control id="ism-1448" class="ISM-control">
               <title>Control: ism-1448</title>
               <prop name="sort-id"
                      value="catalog[1].group[22].group[4].group[1].control[05]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1448_smt">
                  <p>When using DH or ECDH for key establishment of TLS connections, the ephemeral variant is used.</p>
               </part>
            </control>
            <control id="ism-1373" class="ISM-control">
               <title>Control: ism-1373</title>
               <prop name="sort-id"
                      value="catalog[1].group[22].group[4].group[1].control[06]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1373_smt">
                  <p>Anonymous DH is not used for TLS connections.</p>
               </part>
            </control>
            <control id="ism-1374" class="ISM-control">
               <title>Control: ism-1374</title>
               <prop name="sort-id"
                      value="catalog[1].group[22].group[4].group[1].control[07]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1374_smt">
                  <p>SHA-2-based certificates are used for TLS connections.</p>
               </part>
            </control>
            <control id="ism-1375" class="ISM-control">
               <title>Control: ism-1375</title>
               <prop name="sort-id"
                      value="catalog[1].group[22].group[4].group[1].control[08]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1375_smt">
                  <p>SHA-2 is used for the Hash-based Message Authentication Code (HMAC) and pseudorandom function (PRF) for TLS connections.</p>
               </part>
            </control>
            <control id="ism-1553" class="ISM-control">
               <title>Control: ism-1553</title>
               <prop name="sort-id"
                      value="catalog[1].group[22].group[4].group[1].control[09]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1553_smt">
                  <p>TLS compression is disabled for TLS connections.</p>
               </part>
            </control>
            <control id="ism-1453" class="ISM-control">
               <title>Control: ism-1453</title>
               <prop name="sort-id"
                      value="catalog[1].group[22].group[4].group[1].control[10]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-18"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1453_smt">
                  <p>Perfect Forward Secrecy (PFS) is used for TLS connections.</p>
               </part>
            </control>
         </group>
      </group>
      <group>
         <title>Secure Shell</title>
         <prop name="sort-id" value="catalog[1].group[22].group[5]"/>
         <part name="overview">
            <h1>Using Secure Shell</h1>
            <p>When using ICT equipment or software that implements SSH, controls for using AACAs and AACPs in the ASD-Approved Cryptographic Algorithms and ASD-Approved Cryptographic Protocols sections of these guidelines will also need to be consulted.</p>
            <h1>Further information</h1>
            <p>Further information on <a href="#f832363c-d81e-4908-afd9-cf45047dd19c">configuring OpenSSH</a> is available from the OpenSSH project.</p>
         </part>
         <group>
            <title>Configuring Secure Shell</title>
            <prop name="sort-id" value="catalog[1].group[22].group[5].group[1]"/>
            <part name="overview">
               <p>SSH version 1 was found to have a number of security vulnerabilities, and was subsequently replaced by SSH version 2. As such, an organisation implementing SSH should disable the use of SSH version 1. In addition, a number of security risks exist when SSH is configured in an insecure manner. To mitigate these security risks, SSH should be configured as per the configuration settings below.</p>
               <p>The configuration settings below are based on OpenSSH. An organisation using other implementations of SSH should adapt these settings to suit their SSH implementation.</p>
            </part>
            <control id="ism-1506" class="ISM-control">
               <title>Control: ism-1506</title>
               <prop name="sort-id"
                      value="catalog[1].group[22].group[5].group[1].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1506_smt">
                  <p>The use of SSH version 1 is disabled for SSH connections.</p>
               </part>
            </control>
            <control id="ism-0484" class="ISM-control">
               <title>Control: ism-0484</title>
               <prop name="sort-id"
                      value="catalog[1].group[22].group[5].group[1].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="6"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0484_smt">
                  <p>The SSH daemon is configured to:</p>
                  <ul>
                     <li>only listen on the required interfaces (ListenAddress xxx.xxx.xxx.xxx)</li>
                     <li>have a suitable login banner (Banner x)</li>
                     <li>have a login authentication timeout of no more than 60 seconds (LoginGraceTime 60)</li>
                     <li>disable host-based authentication (HostbasedAuthentication no)</li>
                     <li>disable rhosts-based authentication (IgnoreRhosts yes)</li>
                     <li>disable the ability to login directly as root (PermitRootLogin no)</li>
                     <li>disable empty passwords (PermitEmptyPasswords no)</li>
                     <li>disable connection forwarding (AllowTCPForwarding no)</li>
                     <li>disable gateway ports (GatewayPorts no)</li>
                     <li>disable X11 forwarding (X11Forwarding no).</li>
                  </ul>
               </part>
            </control>
         </group>
         <group>
            <title>Authentication mechanisms</title>
            <prop name="sort-id" value="catalog[1].group[22].group[5].group[2]"/>
            <part name="overview">
               <p>As public key-based authentication schemes offer stronger authentication than passphrase-based authentication schemes, due to being much less susceptible to brute-force attacks, they should be used for SSH connections. Furthermore, in order to protect SSH private keys, access to such keys should be protected via the use of passphrases or key encryption keys.</p>
            </part>
            <control id="ism-0485" class="ISM-control">
               <title>Control: ism-0485</title>
               <prop name="sort-id"
                      value="catalog[1].group[22].group[5].group[2].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-18"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0485_smt">
                  <p>Public key-based authentication is used for SSH connections.</p>
               </part>
            </control>
            <control id="ism-1449" class="ISM-control">
               <title>Control: ism-1449</title>
               <prop name="sort-id"
                      value="catalog[1].group[22].group[5].group[2].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-18"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1449_smt">
                  <p>SSH private keys are protected with a passphrase or a key encryption key.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Automated remote access</title>
            <prop name="sort-id" value="catalog[1].group[22].group[5].group[3]"/>
            <part name="overview">
               <p>If using logins without a passphrase for automated purposes, a number of security risks may arise, specifically:</p>
               <ul>
                  <li>if access from unknown Internet Protocol (IP) addresses is not restricted, an adversary could automatically authenticate to systems without needing to know any passphrases</li>
                  <li>if port forwarding is not disabled, or it is not configured securely, access may be gained to forwarded ports, thereby, creating a communication channel between an adversary and a host</li>
                  <li>if agent credential forwarding is enabled, an adversary could connect to the stored authentication credentials and use them to connect to other trusted hosts, or even intranet hosts if port forwarding has been allowed as well</li>
                  <li>if X11 display remoting is not disabled, an adversary could gain control of displays as well as keyboard and mouse control functions</li>
                  <li>if console access is allowed, every user who logs into the console could run programs that are normally restricted to authenticated users.</li>
               </ul>
               <p>To assist in mitigating these security risks, it is essential that the ‘forced command’ option is used to specify what command is executed and parameter checking is enabled.</p>
            </part>
            <control id="ism-0487" class="ISM-control">
               <title>Control: ism-0487</title>
               <prop name="sort-id"
                      value="catalog[1].group[22].group[5].group[3].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0487_smt">
                  <p>When using logins without a passphrase for SSH connections, the following are disabled:</p>
                  <ul>
                     <li>access from IP addresses that do not require access</li>
                     <li>port forwarding</li>
                     <li>agent credential forwarding</li>
                     <li>X11 display remoting</li>
                     <li>console access.</li>
                  </ul>
               </part>
            </control>
            <control id="ism-0488" class="ISM-control">
               <title>Control: ism-0488</title>
               <prop name="sort-id"
                      value="catalog[1].group[22].group[5].group[3].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0488_smt">
                  <p>If using remote access without the use of a passphrase for SSH connections, the ‘forced command’ option is used to specify what command is executed and parameter checking is enabled.</p>
               </part>
            </control>
         </group>
         <group>
            <title>SSH-agent</title>
            <prop name="sort-id" value="catalog[1].group[22].group[5].group[4]"/>
            <part name="overview">
               <p>SSH-agent and similar key caching programs manage private keys stored on workstations and servers. Specifically, when an SSH-agent launches, it requests a user’s passphrase to unlock the user’s private key. Subsequent access to remote systems is then performed by the SSH-agent and does not require the user to re-enter their passphrase. Screen locks and expiring key caches can be used to ensure that a user’s private key is not left unlocked for a long period of time.</p>
            </part>
            <control id="ism-0489" class="ISM-control">
               <title>Control: ism-0489</title>
               <prop name="sort-id"
                      value="catalog[1].group[22].group[5].group[4].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="5"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0489_smt">
                  <p>When SSH-agent or similar key caching programs are used, it is limited to workstations and servers with screen locks and key caches that are set to expire within four hours of inactivity.</p>
               </part>
            </control>
         </group>
      </group>
      <group>
         <title>Secure/Multipurpose Internet Mail Extension</title>
         <prop name="sort-id" value="catalog[1].group[22].group[6]"/>
         <part name="overview">
            <h1>Using Secure/Multipurpose Internet Mail Extension</h1>
            <p>When using ICT equipment or software that implements S/MIME, controls for using AACAs and AACPs in the ASD-Approved Cryptographic Algorithms and ASD-Approved Cryptographic Protocols sections of these guidelines will also need to be consulted.</p>
         </part>
         <group>
            <title>Configuring Secure/Multipurpose Internet Mail Extension</title>
            <prop name="sort-id" value="catalog[1].group[22].group[6].group[1]"/>
            <part name="overview">
               <p>S/MIME version 2.0 required the use of weaker cryptography than approved for use in these guidelines. As such, S/MIME version 3.0 was the first version to be approved for use as an AACP.</p>
            </part>
            <control id="ism-0490" class="ISM-control">
               <title>Control: ism-0490</title>
               <prop name="sort-id"
                      value="catalog[1].group[22].group[6].group[1].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0490_smt">
                  <p>Versions of S/MIME earlier than S/MIME version 3.0 are not used for S/MIME connections.</p>
               </part>
            </control>
         </group>
      </group>
      <group>
         <title>Internet Protocol Security</title>
         <prop name="sort-id" value="catalog[1].group[22].group[7]"/>
         <part name="overview">
            <h1>Using Internet Protocol Security</h1>
            <p>When using ICT equipment or software that implements IPsec, controls for using AACAs and AACPs in the ASD-Approved Cryptographic Algorithms and ASD-Approved Cryptographic Protocols sections of these guidelines will also need to be consulted.</p>
         </part>
         <group>
            <title>Mode of operation</title>
            <prop name="sort-id" value="catalog[1].group[22].group[7].group[1]"/>
            <part name="overview">
               <p>IPsec can be operated in tunnel mode or transport mode. The tunnel mode of operation is preferred as it provides full encapsulation of IP packets while the transport mode of operation only encapsulates the payload of IP packets.</p>
            </part>
            <control id="ism-0494" class="ISM-control">
               <title>Control: ism-0494</title>
               <prop name="sort-id"
                      value="catalog[1].group[22].group[7].group[1].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-18"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0494_smt">
                  <p>Tunnel mode is used for IPsec connections; however, if using transport mode, an IP tunnel is used.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Protocol selection</title>
            <prop name="sort-id" value="catalog[1].group[22].group[7].group[2]"/>
            <part name="overview">
               <p>IPsec contains two major protocols, the Authentication Header (AH) protocol and the Encapsulating Security Payload (ESP) protocol. In order to provide a secure Virtual Private Network style connection, both authentication and encryption are needed. While the AH and ESP protocols can both provide authentication, for the IP packet and the payload respectively, only the ESP protocol can provide encryption.</p>
               <p>As the combined use of the AH protocol and the ESP protocol is not supported by Internet Key Exchange (IKE) version 2, the ESP protocol should be used for authentication and encryption of IPsec connections.</p>
            </part>
            <control id="ism-0496" class="ISM-control">
               <title>Control: ism-0496</title>
               <prop name="sort-id"
                      value="catalog[1].group[22].group[7].group[2].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="5"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0496_smt">
                  <p>The ESP protocol is used for authentication and encryption of IPsec connections.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Key exchange</title>
            <prop name="sort-id" value="catalog[1].group[22].group[7].group[3]"/>
            <part name="overview">
               <p>There are several methods for establishing shared keying material for IPsec connections, including manual keying and the IKE protocol. As the IKE protocol addresses a number of security risks associated with manual keying, it is the preferred method for key establishment. Note, as IKE version 1 has been deprecated, IKE version 2 should be used.</p>
            </part>
            <control id="ism-1233" class="ISM-control">
               <title>Control: ism-1233</title>
               <prop name="sort-id"
                      value="catalog[1].group[22].group[7].group[3].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1233_smt">
                  <p>IKE version 2 is used for key exchange when establishing IPsec connections.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Encryption algorithms</title>
            <prop name="sort-id" value="catalog[1].group[22].group[7].group[4]"/>
            <part name="overview">
               <p>The only approved encryption algorithm for IPsec connections is AES. IKE version 2 supports the use of AES with Cipher Block Chaining, Counter Mode, Counter with Cipher Block Chaining Message Authentication Code, and Galois/Counter Mode. Note, however, supported modes may vary between different cryptographic equipment and software.</p>
            </part>
            <control id="ism-1771" class="ISM-control">
               <title>Control: ism-1771</title>
               <prop name="sort-id"
                      value="catalog[1].group[22].group[7].group[4].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1771_smt">
                  <p>AES is used for encrypting IPsec connections, preferably ENCR_AES_GCM_16.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Pseudorandom function algorithms</title>
            <prop name="sort-id" value="catalog[1].group[22].group[7].group[5]"/>
            <part name="overview">
               <p>IKE version 2 requires the use of a PRF in order to generate random data for cryptographic operations. The approved algorithms that can be used for PRF are HMAC-SHA256, HMAC-SHA384 and HMAC-SHA512.</p>
            </part>
            <control id="ism-1772" class="ISM-control">
               <title>Control: ism-1772</title>
               <prop name="sort-id"
                      value="catalog[1].group[22].group[7].group[5].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1772_smt">
                  <p>PRF_HMAC_SHA2_256, PRF_HMAC_SHA2_384 or PRF_HMAC_SHA2_512 is used for IPsec connections, preferably PRF_HMAC_SHA2_512.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Integrity algorithms</title>
            <prop name="sort-id" value="catalog[1].group[22].group[7].group[6]"/>
            <part name="overview">
               <p>The approved integrity algorithms for IPsec connections are HMAC-SHA256, HMAC-SHA384 and HMAC-SHA512. However, if using AES with Galois/Counter Mode as the encryption algorithm, it can also be used for authentication purposes. In such cases, the integrity algorithm should be configured as NONE.</p>
            </part>
            <control id="ism-0998" class="ISM-control">
               <title>Control: ism-0998</title>
               <prop name="sort-id"
                      value="catalog[1].group[22].group[7].group[6].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="5"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0998_smt">
                  <p>AUTH_HMAC_SHA2_256_128, AUTH_HMAC_SHA2_384_192, AUTH_HMAC_SHA2_512_256 or NONE (only with AES-GCM) is used for authenticating IPsec connections, preferably NONE.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Diffie-Hellman groups</title>
            <prop name="sort-id" value="catalog[1].group[22].group[7].group[7]"/>
            <part name="overview">
               <p>A sufficiently large DH modulus provides greater security for key exchanges when establishing IPsec connections.</p>
            </part>
            <control id="ism-0999" class="ISM-control">
               <title>Control: ism-0999</title>
               <prop name="sort-id"
                      value="catalog[1].group[22].group[7].group[7].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="6"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0999_smt">
                  <p>DH or ECDH is used for key establishment of IPsec connections, preferably 384-bit random ECP group, 3072-bit MODP Group or 4096-bit MODP Group.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Security association lifetimes</title>
            <prop name="sort-id" value="catalog[1].group[22].group[7].group[8]"/>
            <part name="overview">
               <p>Using a security association lifetime of less than four hours (14400 seconds) can provide a balance between security and usability.</p>
            </part>
            <control id="ism-0498" class="ISM-control">
               <title>Control: ism-0498</title>
               <prop name="sort-id"
                      value="catalog[1].group[22].group[7].group[8].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0498_smt">
                  <p>A security association lifetime of less than four hours (14400 seconds) is used for IPsec connections.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Perfect Forward Secrecy</title>
            <prop name="sort-id" value="catalog[1].group[22].group[7].group[9]"/>
            <part name="overview">
               <p>Using PFS reduces the impact of the compromise of a security association.</p>
            </part>
            <control id="ism-1000" class="ISM-control">
               <title>Control: ism-1000</title>
               <prop name="sort-id"
                      value="catalog[1].group[22].group[7].group[9].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Sep-18"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1000_smt">
                  <p>PFS is used for IPsec connections.</p>
               </part>
            </control>
         </group>
      </group>
   </group>
   <group>
      <title>Guidelines for Gateways</title>
      <prop name="sort-id" value="catalog[1].group[23]"/>
      <group>
         <title>Gateways</title>
         <prop name="sort-id" value="catalog[1].group[23].group[1]"/>
         <part name="overview">
            <h1>Introduction to gateways</h1>
            <p>Gateways securely manage data flows between connected networks from different security domains. In doing so, gateways take on the highest sensitivity or classification of connected security domains.</p>
            <p>This section describes controls applicable to all types of gateways. Additional sections of these guidelines should also be consulted depending on the types of gateways being deployed and the security domains involved. For example, the Cross Domain Solutions section should be consulted for gateways between different security domains where at least one security domain is classified SECRET or TOP SECRET.</p>
            <p>Personnel involved in the planning, design, implementation or assessment of gateways should also refer to the Australian Cyber Security Centre (ACSC)’s <a href="#3df21b72-0559-4bbf-a990-5ee509f70747">gateway security guidance package</a> of publications.</p>
            <h1>Further information</h1>
            <p>Further information on cyber supply chain risk management can be found in the cyber supply chain risk management section of the <a href="#f37a4848-0791-4870-b316-5536c2681c28">Guidelines for Procurement and Outsourcing</a>.</p>
            <p>Further information on the procurement of outsourced services can be found in the managed services and cloud services section of the <a href="#f37a4848-0791-4870-b316-5536c2681c28">Guidelines for Procurement and Outsourcing</a>.</p>
            <p>Further information on designing, configuring and managing networks can be found in the network design and configuration section of the <a href="#f145ff5b-d396-4248-8f48-621349d6f0ed">Guidelines for Networking</a>.</p>
            <p>Further information on privileged access to systems can be found in the access to systems and their resources section of the <a href="#7d16ae67-87a7-4861-b939-e13ec279b5a2">Guidelines for Personnel Security</a>.</p>
            <p>Further information on cyber security awareness training can be found in the cyber security awareness training section of the <a href="#7d16ae67-87a7-4861-b939-e13ec279b5a2">Guidelines for Personnel Security</a>.</p>
            <p>Further information on authenticating users can be found in the authentication hardening section of the <a href="#de7525f3-a466-40a5-abdd-3ae24a6d1b44">Guidelines for System Hardening</a>.</p>
            <p>Further information on authenticating ICT equipment can be found in the network design and configuration section of the <a href="#f145ff5b-d396-4248-8f48-621349d6f0ed">Guidelines for Networking</a>.</p>
            <p>Further information on <a href="#7da35efd-7196-4aba-bd79-30c19e8ef48b">RPKI</a> and <a href="#355b47b5-6253-4be5-ba7c-274833d84b75">ROA records</a> is available from the Asia Pacific Network Information Centre.</p>
            <p>Further information on event logging can be found in the event logging and monitoring section of the <a href="#edc24216-f52b-4513-bcda-5fa564661999">Guidelines for System Monitoring</a>.</p>
            <p>Further information on <a href="#84d3cbab-ab84-4981-a4f7-2bd469c8deaf">the purpose of IRAP</a>, and <a href="#bdd11ace-cb4e-470a-92ad-556c79b6c14a">a list of current IRAP assessors</a>, is available from the ACSC.</p>
         </part>
         <group>
            <title>Implementing gateways</title>
            <prop name="sort-id" value="catalog[1].group[23].group[1].group[1]"/>
            <part name="overview">
               <p>Gateways are critical for an organisation to reduce the security risks associated with providing external parties with access to their networks. In doing so, it is important that gateways are used not only between an organisation’s networks and public network infrastructure, but also between an organisation’s networks that belong to different security domains and between an organisation’s networks and other organisations’ networks that are connected via means other than public network infrastructure.</p>
               <p>When implementing gateways between an organisation’s networks and public network infrastructure, an organisation should place any services that external parties require access to within a demilitarised zone. This can mitigate security risks for an organisation when hosting such services in an internet-accessible manner.</p>
               <p>Finally, in architecting gateways, it is important that they only allow explicitly authorised data flows. In support of this, gateways should inspect and filter data flows at the transport and above network layers. Furthermore, gateways should be capable of performing ingress traffic filtering to detect and prevent Internet Protocol (IP) source address spoofing.</p>
            </part>
            <control id="ism-0628" class="ISM-control">
               <title>Control: ism-0628</title>
               <prop name="sort-id"
                      value="catalog[1].group[23].group[1].group[1].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="6"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0628_smt">
                  <p>Gateways are implemented between networks belonging to different security domains.</p>
               </part>
            </control>
            <control id="ism-0637" class="ISM-control">
               <title>Control: ism-0637</title>
               <prop name="sort-id"
                      value="catalog[1].group[23].group[1].group[1].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="6"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0637_smt">
                  <p>Gateways implement a demilitarised zone if external parties require access to an organisation’s services. </p>
               </part>
            </control>
            <control id="ism-0631" class="ISM-control">
               <title>Control: ism-0631</title>
               <prop name="sort-id"
                      value="catalog[1].group[23].group[1].group[1].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="7"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0631_smt">
                  <p>Gateways only allow explicitly authorised data flows.</p>
               </part>
            </control>
            <control id="ism-1192" class="ISM-control">
               <title>Control: ism-1192</title>
               <prop name="sort-id"
                      value="catalog[1].group[23].group[1].group[1].control[4]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1192_smt">
                  <p>Gateways inspect and filter data flows at the transport and above network layers.</p>
               </part>
            </control>
            <control id="ism-1427" class="ISM-control">
               <title>Control: ism-1427</title>
               <prop name="sort-id"
                      value="catalog[1].group[23].group[1].group[1].control[5]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1427_smt">
                  <p>Gateways perform ingress traffic filtering to detect and prevent IP source address spoofing.</p>
               </part>
            </control>
         </group>
         <group>
            <title>System administrators for gateways</title>
            <prop name="sort-id" value="catalog[1].group[23].group[1].group[2]"/>
            <part name="overview">
               <p>In identifying suitable system administrators for gateways, it is important that individuals comply with any citizenship requirements, undergo appropriate employment screening and, where necessary, hold an appropriate security clearance based on the sensitivity or classification of gateways. For example, all systems administrators for gateways between OFFICIAL and PROTECTED networks will need to hold baseline security clearances.</p>
               <p>In addition, when creating privileged accounts for performing administrative activities, it is important that the principle of least privilege is followed. In turn, this should be supported by the principle of separation of duties. Adhering to these two principles can ensure that system administrators for gateways are not given enough privileges to abuse gateways on their own.</p>
               <p>Finally, providing system administrators for gateways with formal training on the operation and management of gateways will ensure that they are fully aware of, and accept, their roles and responsibilities. In doing so, formal training should be conducted through tailored privileged user training.</p>
            </part>
            <control id="ism-1520" class="ISM-control">
               <title>Control: ism-1520</title>
               <prop name="sort-id"
                      value="catalog[1].group[23].group[1].group[2].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1520_smt">
                  <p>System administrators for gateways undergo appropriate employment screening and, where necessary, hold an appropriate security clearance based on the sensitivity or classification of gateways.</p>
               </part>
            </control>
            <control id="ism-0613" class="ISM-control">
               <title>Control: ism-0613</title>
               <prop name="sort-id"
                      value="catalog[1].group[23].group[1].group[2].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="6"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-0613_smt">
                  <p>System administrators for gateways that connect to Australian Eyes Only or Releasable To networks are Australian nationals.</p>
               </part>
            </control>
            <control id="ism-1773" class="ISM-control">
               <title>Control: ism-1773</title>
               <prop name="sort-id"
                      value="catalog[1].group[23].group[1].group[2].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-1773_smt">
                  <p>System administrators for gateways that connect to Australian Government Access Only networks are Australian nationals or seconded foreign nationals.</p>
               </part>
            </control>
            <control id="ism-0611" class="ISM-control">
               <title>Control: ism-0611</title>
               <prop name="sort-id"
                      value="catalog[1].group[23].group[1].group[2].control[4]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="5"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0611_smt">
                  <p>System administrators for gateways are assigned the minimum privileges required to perform their duties.</p>
               </part>
            </control>
            <control id="ism-0616" class="ISM-control">
               <title>Control: ism-0616</title>
               <prop name="sort-id"
                      value="catalog[1].group[23].group[1].group[2].control[5]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="5"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0616_smt">
                  <p>Separation of duties is implemented in performing administrative activities for gateways.</p>
               </part>
            </control>
            <control id="ism-0612" class="ISM-control">
               <title>Control: ism-0612</title>
               <prop name="sort-id"
                      value="catalog[1].group[23].group[1].group[2].control[6]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="5"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0612_smt">
                  <p>System administrators for gateways are formally trained on the operation and management of gateways.</p>
               </part>
            </control>
         </group>
         <group>
            <title>System administration of gateways</title>
            <prop name="sort-id" value="catalog[1].group[23].group[1].group[3]"/>
            <part name="overview">
               <p>In performing administrative activities for gateways, it is important that they are conducted via a secure path isolated from all connected networks. In doing so, this will minimise threats should connected networks be compromised by an adversary. Furthermore, where gateways exist between networks belonging to different security domains, any shared components should be managed by system administrators for the higher security domain, alternatively, it may be more appropriate to use system administrators from a mutually-agreed third party.</p>
            </part>
            <control id="ism-1774" class="ISM-control">
               <title>Control: ism-1774</title>
               <prop name="sort-id"
                      value="catalog[1].group[23].group[1].group[3].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1774_smt">
                  <p>Gateways are managed via a secure path isolated from all connected networks.</p>
               </part>
            </control>
            <control id="ism-0629" class="ISM-control">
               <title>Control: ism-0629</title>
               <prop name="sort-id"
                      value="catalog[1].group[23].group[1].group[3].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0629_smt">
                  <p>For gateways between networks belonging to different security domains, any shared components are managed by system administrators for the higher security domain or by system administrators from a mutually-agreed third party.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Authenticating to networks accessed via gateways</title>
            <prop name="sort-id" value="catalog[1].group[23].group[1].group[4]"/>
            <part name="overview">
               <p>Ensuring users and ICT equipment are authenticated to other networks accessed via gateways can reduce the likelihood of unauthorised access.</p>
            </part>
            <control id="ism-0619" class="ISM-control">
               <title>Control: ism-0619</title>
               <prop name="sort-id"
                      value="catalog[1].group[23].group[1].group[4].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="6"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0619_smt">
                  <p>Users authenticate to other networks accessed via gateways.</p>
               </part>
            </control>
            <control id="ism-0622" class="ISM-control">
               <title>Control: ism-0622</title>
               <prop name="sort-id"
                      value="catalog[1].group[23].group[1].group[4].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="6"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0622_smt">
                  <p>ICT equipment authenticates to other networks accessed via gateways.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Border Gateway Protocol route security</title>
            <prop name="sort-id" value="catalog[1].group[23].group[1].group[5]"/>
            <part name="overview">
               <p>Resource Public Key Infrastructure (RPKI) uses public key cryptography to authenticate routing data on the internet. This allows an organisation, particularly a telecommunications carrier or cloud service provider, to verify routing data they receive, transmit and process in order to determine routing calculations for internet traffic. By using RPKI, an organisation may reduce Border Gateway Protocol-related cyber threats, such as some types of denial-of-service attacks, accidental or deliberate rerouting of internet traffic, and opportunities for the undermining of IP address-based reputational services. RPKI Route Origin Authorization (ROA) records, which describe routes in terms of network/prefix and Autonomous Systems from which they are expected to originate, should be configured for the public IP addresses controlled by, or used by, an organisation. ROA records should also be configured for the unannounced IP address space controlled by an organisation.</p>
            </part>
            <control id="ism-1783" class="ISM-control">
               <title>Control: ism-1783</title>
               <prop name="sort-id"
                      value="catalog[1].group[23].group[1].group[5].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Jun-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1783_smt">
                  <p>Public IP addresses controlled by, or used by, an organisation are signed by valid ROA records.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Gateway event logging and alerting</title>
            <prop name="sort-id" value="catalog[1].group[23].group[1].group[6]"/>
            <part name="overview">
               <p>Gateway event logs can assist in monitoring the security posture of gateways, detecting malicious behaviour and contributing to investigations following cyber security incidents. To facilitate such activities, gateway event logs should be captured and stored centrally.</p>
            </part>
            <control id="ism-0634" class="ISM-control">
               <title>Control: ism-0634</title>
               <prop name="sort-id"
                      value="catalog[1].group[23].group[1].group[6].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="9"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Jun-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0634_smt">
                  <p>The following events are logged for gateways:</p>
                  <ul>
                     <li>data packets and data flows permitted through gateways</li>
                     <li>data packets and data flows attempting to leave gateways</li>
                     <li>real-time alerts for attempted intrusions.</li>
                  </ul>
               </part>
            </control>
            <control id="ism-1775" class="ISM-control">
               <title>Control: ism-1775</title>
               <prop name="sort-id"
                      value="catalog[1].group[23].group[1].group[6].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1775_smt">
                  <p>Gateway event logs are stored centrally.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Assessment of gateways</title>
            <prop name="sort-id" value="catalog[1].group[23].group[1].group[7]"/>
            <part name="overview">
               <p>Testing of gateways following configuration changes, and at regular intervals no more than six months apart, assists with validating that gateways conform to expected security configurations. In addition, gateways will need to undergo regular security assessments by an Infosec Registered Assessor Program (IRAP) assessor to determine their security posture and security risks associated with their use. Following an initial security assessment by an IRAP assessor, subsequent security assessments should focus on any new services that are being offered as well as any security-related changes that have occurred since the previous security assessment.</p>
            </part>
            <control id="ism-1037" class="ISM-control">
               <title>Control: ism-1037</title>
               <prop name="sort-id"
                      value="catalog[1].group[23].group[1].group[7].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="6"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Jun-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1037_smt">
                  <p>Gateways undergo testing following configuration changes, and at regular intervals no more than six months apart, to validate they conform to expected security configurations.</p>
               </part>
            </control>
            <control id="ism-0100" class="ISM-control">
               <title>Control: ism-0100</title>
               <prop name="sort-id"
                      value="catalog[1].group[23].group[1].group[7].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="11"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Jun-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0100_smt">
                  <p>Gateways undergo a security assessment by an IRAP assessor at least every 24 months.</p>
               </part>
            </control>
         </group>
      </group>
      <group>
         <title>Cross Domain Solutions</title>
         <prop name="sort-id" value="catalog[1].group[23].group[2]"/>
         <part name="overview">
            <h1>Introduction to Cross Domain Solutions</h1>
            <p>A Cross Domain Solution (CDS) is a system comprised of security-enforcing functions tailored to mitigate specific security risks associated with accessing or transferring data between different security domains. CDSs may be an integrated appliance or, more commonly, be composed of discrete technologies or sub-systems, with each sub-system consisting of hardware or software components.</p>
            <p>This section describes the controls applicable to CDSs and extends upon the prior gateways section. Additional sections of these guidelines should also be consulted depending on the types of CDSs being deployed.</p>
            <p>Personnel involved in the planning, design, implementation or assessment of CDSs should also refer to the ACSC’s <a href="#86847be4-3a06-4d2f-9952-447158593e0d">Introduction to Cross Domain Solutions</a> and <a href="#f32020e9-4cb3-486b-bcbb-6fb6719f58a5">Fundamentals of Cross Domain Solutions</a> publications.</p>
            <h1>Types of Cross Domain Solutions</h1>
            <p>This section defines two types of CDSs, Transfer CDSs and Access CDSs. These definitions are closely aligned with how CDSs are described and sold by vendors. Note, however, vendors may also offer combined Access and Transfer CDSs.</p>
            <p>In defining the functionality of different types of CDSs, Transfer CDSs facilitate the transfer of data in one direction (unidirectional) or multiple directions (bi-directional) between different security domains. In comparison, Access CDSs provide users with access to multiple security domains from a single device. However, while Access CDSs allow interaction with different security domains, they do not allow users to move data between the different security domains.</p>
            <h1>Further information</h1>
            <p>Further information on cyber supply chain risk management can be found in the cyber supply chain risk management section of the <a href="#f37a4848-0791-4870-b316-5536c2681c28">Guidelines for Procurement and Outsourcing</a>.</p>
            <p>Further information on evaluated products can be found in the evaluated product procurement section of the <a href="#a699a3aa-828d-479b-b50b-98127bb19437">Guidelines for Evaluated Products</a>.</p>
            <p>Further information on designing, configuring and managing networks can be found in the network design and configuration section of the <a href="#f145ff5b-d396-4248-8f48-621349d6f0ed">Guidelines for Networking</a>.</p>
            <p>Further information on event logging can be found in the event logging and monitoring section of the <a href="#edc24216-f52b-4513-bcda-5fa564661999">Guidelines for System Monitoring</a>.</p>
            <p>Further information on cyber security awareness training can be found in the cyber security awareness training section of the <a href="#7d16ae67-87a7-4861-b939-e13ec279b5a2">Guidelines for Personnel Security</a>. </p>
         </part>
         <group>
            <title>Implementing Cross Domain Solutions</title>
            <prop name="sort-id" value="catalog[1].group[23].group[2].group[1]"/>
            <part name="overview">
               <p>As there are significant security risks associated with connecting SECRET or TOP SECRET networks to other networks in different security domains, CDSs will need to be implemented.</p>
            </part>
            <control id="ism-0626" class="ISM-control">
               <title>Control: ism-0626</title>
               <prop name="sort-id"
                      value="catalog[1].group[23].group[2].group[1].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="6"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-0626_smt">
                  <p>CDSs are implemented between SECRET or TOP SECRET networks and any other networks belonging to different security domains.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Consultation on Cross Domain Solutions</title>
            <prop name="sort-id" value="catalog[1].group[23].group[2].group[2]"/>
            <part name="overview">
               <p>As CDSs can be complex to implement and manage securely, it is critical that when an organisation is planning, designing, implementing or introducing additional connectivity to CDSs that the ACSC is consulted and any directions provided by the ACSC are complied with.</p>
            </part>
            <control id="ism-0597" class="ISM-control">
               <title>Control: ism-0597</title>
               <prop name="sort-id"
                      value="catalog[1].group[23].group[2].group[2].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="7"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-0597_smt">
                  <p>When planning, designing, implementing or introducing additional connectivity to CDSs, the ACSC is consulted and any directions provided by the ACSC are complied with.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Separation of data flows</title>
            <prop name="sort-id" value="catalog[1].group[23].group[2].group[3]"/>
            <part name="overview">
               <p>To ensure that data flows are appropriately controlled within CDSs, it is important that isolated upward and downward network paths are implemented. This, in turn, should be supported by independent security-enforcing functions and protocol breaks at each network layer.</p>
            </part>
            <control id="ism-0635" class="ISM-control">
               <title>Control: ism-0635</title>
               <prop name="sort-id"
                      value="catalog[1].group[23].group[2].group[3].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="7"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-0635_smt">
                  <p>CDSs implement isolated upward and downward network paths.</p>
               </part>
            </control>
            <control id="ism-1522" class="ISM-control">
               <title>Control: ism-1522</title>
               <prop name="sort-id"
                      value="catalog[1].group[23].group[2].group[3].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-1522_smt">
                  <p>CDSs implement independent security-enforcing functions for upward and downward network paths.</p>
               </part>
            </control>
            <control id="ism-1521" class="ISM-control">
               <title>Control: ism-1521</title>
               <prop name="sort-id"
                      value="catalog[1].group[23].group[2].group[3].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-1521_smt">
                  <p>CDSs implement protocol breaks at each network layer.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Cross Domain Solution event logging</title>
            <prop name="sort-id" value="catalog[1].group[23].group[2].group[4]"/>
            <part name="overview">
               <p>CDSs should have comprehensive event logging capabilities to ensure accountability of users for all activities they undertake. Furthermore, effective event logging and monitoring practices can increase the likelihood that operational failures will be detected.</p>
               <p>In addition, CDS event logs can assist in monitoring the security posture of CDSs, detecting malicious behaviour and contributing to investigations following cyber security incidents. To facilitate such activities, CDS event logs should be captured and stored centrally.</p>
            </part>
            <control id="ism-0670" class="ISM-control">
               <title>Control: ism-0670</title>
               <prop name="sort-id"
                      value="catalog[1].group[23].group[2].group[4].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="5"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-0670_smt">
                  <p>All security-relevant events generated by CDSs are logged.</p>
               </part>
            </control>
            <control id="ism-1776" class="ISM-control">
               <title>Control: ism-1776</title>
               <prop name="sort-id"
                      value="catalog[1].group[23].group[2].group[4].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-1776_smt">
                  <p>CDS event logs are stored centrally.</p>
               </part>
            </control>
            <control id="ism-1523" class="ISM-control">
               <title>Control: ism-1523</title>
               <prop name="sort-id"
                      value="catalog[1].group[23].group[2].group[4].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-1523_smt">
                  <p>A sample of security-relevant events relating to data transfer policies are taken at least every three months and assessed against security policies for CDSs to identify any operational failures.</p>
               </part>
            </control>
         </group>
         <group>
            <title>User training</title>
            <prop name="sort-id" value="catalog[1].group[23].group[2].group[5]"/>
            <part name="overview">
               <p>To assist in preventing cyber security incidents, it is important that users know how to use CDSs securely. This can be achieved by training users on the secure use of CDSs before access is granted.</p>
            </part>
            <control id="ism-0610" class="ISM-control">
               <title>Control: ism-0610</title>
               <prop name="sort-id"
                      value="catalog[1].group[23].group[2].group[5].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="8"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-0610_smt">
                  <p>Users are trained on the secure use of CDSs before access is granted.</p>
               </part>
            </control>
         </group>
      </group>
      <group>
         <title>Firewalls</title>
         <prop name="sort-id" value="catalog[1].group[23].group[3]"/>
         <part name="overview">
            <h1>Further information</h1>
            <p>Further information on cyber supply chain risk management can be found in the cyber supply chain risk management section of the <a href="#f37a4848-0791-4870-b316-5536c2681c28">Guidelines for Procurement and Outsourcing</a>.</p>
            <p>Further information on evaluated products can be found in the evaluated product procurement section of the <a href="#a699a3aa-828d-479b-b50b-98127bb19437">Guidelines for Evaluated Products</a>.</p>
         </part>
         <group>
            <title>Using firewalls</title>
            <prop name="sort-id" value="catalog[1].group[23].group[3].group[1]"/>
            <part name="overview">
               <p>When implementing gateways between an organisation’s networks and public network infrastructure, an organisation should implement firewalls to protect themselves from intrusions that may originate from the public network infrastructure. In addition, when an organisation’s networks connect to another organisation’s networks, both organisations should implement independent firewalls to protect themselves from intrusions that may originate from each other’s networks. Note, this requirement may not be necessary in cases where shared network infrastructure is used only as a transport medium and encryption is applied to all network traffic.</p>
            </part>
            <control id="ism-1528" class="ISM-control">
               <title>Control: ism-1528</title>
               <prop name="sort-id"
                      value="catalog[1].group[23].group[3].group[1].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1528_smt">
                  <p>Evaluated firewalls are used between an organisation’s networks and public network infrastructure.</p>
               </part>
            </control>
            <control id="ism-0639" class="ISM-control">
               <title>Control: ism-0639</title>
               <prop name="sort-id"
                      value="catalog[1].group[23].group[3].group[1].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="9"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0639_smt">
                  <p>Evaluated firewalls are used between networks belonging to different security domains.</p>
               </part>
            </control>
         </group>
      </group>
      <group>
         <title>Diodes</title>
         <prop name="sort-id" value="catalog[1].group[23].group[4]"/>
         <part name="overview">
            <h1>Further information</h1>
            <p>Further information on cyber supply chain risk management can be found in the cyber supply chain risk management section of the <a href="#f37a4848-0791-4870-b316-5536c2681c28">Guidelines for Procurement and Outsourcing</a>.</p>
            <p>Further information on evaluated products can be found in the evaluated product procurement section of the <a href="#a699a3aa-828d-479b-b50b-98127bb19437">Guidelines for Evaluated Products</a>.</p>
         </part>
         <group>
            <title>Using diodes</title>
            <prop name="sort-id" value="catalog[1].group[23].group[4].group[1]"/>
            <part name="overview">
               <p>Diodes enforce one-way data flows, thereby, making it more difficult for an adversary to use the same network path to both launch an intrusion and exfiltrate data afterwards. As such, diodes should be used for controlling the data flow of unidirectional gateways.</p>
            </part>
            <control id="ism-0643" class="ISM-control">
               <title>Control: ism-0643</title>
               <prop name="sort-id"
                      value="catalog[1].group[23].group[4].group[1].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="7"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0643_smt">
                  <p>Evaluated diodes are used for controlling the data flow of unidirectional gateways between an organisation’s networks and public network infrastructure.</p>
               </part>
            </control>
            <control id="ism-0645" class="ISM-control">
               <title>Control: ism-0645</title>
               <prop name="sort-id"
                      value="catalog[1].group[23].group[4].group[1].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="7"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-0645_smt">
                  <p>Evaluated diodes used for controlling the data flow of unidirectional gateways between SECRET or TOP SECRET networks and public network infrastructure complete a high assurance evaluation.</p>
               </part>
            </control>
            <control id="ism-1157" class="ISM-control">
               <title>Control: ism-1157</title>
               <prop name="sort-id"
                      value="catalog[1].group[23].group[4].group[1].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="5"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1157_smt">
                  <p>Evaluated diodes are used for controlling the data flow of unidirectional gateways between networks.</p>
               </part>
            </control>
            <control id="ism-1158" class="ISM-control">
               <title>Control: ism-1158</title>
               <prop name="sort-id"
                      value="catalog[1].group[23].group[4].group[1].control[4]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="6"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-1158_smt">
                  <p>Evaluated diodes used for controlling the data flow of unidirectional gateways between SECRET or TOP SECRET networks and any other networks complete a high assurance evaluation.</p>
               </part>
            </control>
         </group>
      </group>
      <group>
         <title>Web proxies</title>
         <prop name="sort-id" value="catalog[1].group[23].group[5]"/>
         <part name="overview">
            <h1>Further information</h1>
            <p>Further information on cyber supply chain risk management can be found in the cyber supply chain risk management section of the <a href="#f37a4848-0791-4870-b316-5536c2681c28">Guidelines for Procurement and Outsourcing</a>.</p>
            <p>Further information on event logging can be found in the event logging and monitoring section of the <a href="#edc24216-f52b-4513-bcda-5fa564661999">Guidelines for System Monitoring</a>.</p>
         </part>
         <group>
            <title>Web usage policy</title>
            <prop name="sort-id" value="catalog[1].group[23].group[5].group[1]"/>
            <part name="overview">
               <p>As there are many security risks associated with the use of web services, it is important that an organisation develops, implements and maintains a web usage policy governing its use.</p>
            </part>
            <control id="ism-0258" class="ISM-control">
               <title>Control: ism-0258</title>
               <prop name="sort-id"
                      value="catalog[1].group[23].group[5].group[1].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0258_smt">
                  <p>A web usage policy is developed, implemented and maintained.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Using web proxies</title>
            <prop name="sort-id" value="catalog[1].group[23].group[5].group[2]"/>
            <part name="overview">
               <p>Web proxies are a key component in enforcing web usage policies and preventing cyber security incidents.</p>
            </part>
            <control id="ism-0260" class="ISM-control">
               <title>Control: ism-0260</title>
               <prop name="sort-id"
                      value="catalog[1].group[23].group[5].group[2].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0260_smt">
                  <p>All web access, including that by internal servers, is conducted through web proxies.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Web proxy event logging</title>
            <prop name="sort-id" value="catalog[1].group[23].group[5].group[3]"/>
            <part name="overview">
               <p>Web proxy event logs can assist in monitoring the security posture of networks, detecting malicious behaviour and contributing to investigations following cyber security incidents. To facilitate such activities, web proxy event logs should be captured and stored centrally.</p>
            </part>
            <control id="ism-0261" class="ISM-control">
               <title>Control: ism-0261</title>
               <prop name="sort-id"
                      value="catalog[1].group[23].group[5].group[3].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="5"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0261_smt">
                  <p>The following details are logged for websites accessed via web proxies:</p>
                  <ul>
                     <li>address</li>
                     <li>date and time</li>
                     <li>user</li>
                     <li>amount of data uploaded and downloaded</li>
                     <li>internal and external IP addresses.</li>
                  </ul>
               </part>
            </control>
            <control id="ism-1777" class="ISM-control">
               <title>Control: ism-1777</title>
               <prop name="sort-id"
                      value="catalog[1].group[23].group[5].group[3].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="1"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1777_smt">
                  <p>Web proxy event logs are stored centrally.</p>
               </part>
            </control>
         </group>
      </group>
      <group>
         <title>Web content filters</title>
         <prop name="sort-id" value="catalog[1].group[23].group[6]"/>
         <part name="overview">
            <h1>Further information</h1>
            <p>Further information on cyber supply chain risk management can be found in the cyber supply chain risk management section of the <a href="#f37a4848-0791-4870-b316-5536c2681c28">Guidelines for Procurement and Outsourcing</a>.</p>
            <p>Further information on content filtering techniques can be found in the content filtering section of these guidelines.</p>
            <p>Further information and <a href="#6b4353e0-7281-49f4-a520-f35a4cceec71">examples of client-side JavaScript controls</a> are available from the NoScript project.</p>
         </part>
         <group>
            <title>Using web content filters</title>
            <prop name="sort-id" value="catalog[1].group[23].group[6].group[1]"/>
            <part name="overview">
               <p>Effective web content filters can greatly reduce the likelihood of malicious code, or other inappropriate content, being accessed by users. Furthermore, web content filters can disrupt or prevent an adversary from communicating with their malicious code if they manage to deploy it on an organisation’s networks.</p>
            </part>
            <control id="ism-0963" class="ISM-control">
               <title>Control: ism-0963</title>
               <prop name="sort-id"
                      value="catalog[1].group[23].group[6].group[1].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="7"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0963_smt">
                  <p>Web content filtering is implemented to filter potentially harmful web-based content.</p>
               </part>
            </control>
            <control id="ism-0961" class="ISM-control">
               <title>Control: ism-0961</title>
               <prop name="sort-id"
                      value="catalog[1].group[23].group[6].group[1].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="8"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0961_smt">
                  <p>Client-side active content is restricted by web content filters to an organisation-approved list of domain names.</p>
               </part>
            </control>
            <control id="ism-1237" class="ISM-control">
               <title>Control: ism-1237</title>
               <prop name="sort-id"
                      value="catalog[1].group[23].group[6].group[1].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1237_smt">
                  <p>Web content filtering is applied to outbound web traffic where appropriate.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Transport Layer Security filtering</title>
            <prop name="sort-id" value="catalog[1].group[23].group[6].group[2]"/>
            <part name="overview">
               <p>As encrypted Hypertext Transfer Protocol Secure connections can bypass traditional web content filtering techniques, an organisation should implement Transport Layer Security (TLS) inspection. Note, an organisation may choose to allow some web traffic, such as that for internet banking, to go uninspected to protect the privacy of users.</p>
            </part>
            <control id="ism-0263" class="ISM-control">
               <title>Control: ism-0263</title>
               <prop name="sort-id"
                      value="catalog[1].group[23].group[6].group[2].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="8"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0263_smt">
                  <p>TLS traffic communicated through gateways is decrypted and inspected.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Allowing and blocking access to domain names</title>
            <prop name="sort-id" value="catalog[1].group[23].group[6].group[3]"/>
            <part name="overview">
               <p>Defining an organisation-approved list of domain names, and blocking all others, removes one of the most common data exfiltration paths used by an adversary. In doing so, even a relatively permissive list of allowed domain names, such as the entire Australian top-level domain (‘*.au’) or the top 1,000 websites from the Alexa website ranking, offers better security than relying solely on a list of malicious domain names.</p>
               <p>Furthermore, in cases where an organisation chooses to implement a relatively permissive list of allowed domain names, or list of website categories, security risks can be further mitigated by blocking dynamic domain names, or domain names that can be registered anonymously for free, as these are often used by an adversary due to their lack of attribution. Finally, as users rarely have a requirement to access websites via their IP addresses instead of their domain names, the presence of such activities could indicate malicious code attempting to communicate with an adversary’s command and control infrastructure and should be blocked.</p>
            </part>
            <control id="ism-0958" class="ISM-control">
               <title>Control: ism-0958</title>
               <prop name="sort-id"
                      value="catalog[1].group[23].group[6].group[3].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="8"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0958_smt">
                  <p>An organisation-approved list of domain names, or list of website categories, is implemented for all Hypertext Transfer Protocol and Hypertext Transfer Protocol Secure traffic communicated through gateways.</p>
               </part>
            </control>
            <control id="ism-1236" class="ISM-control">
               <title>Control: ism-1236</title>
               <prop name="sort-id"
                      value="catalog[1].group[23].group[6].group[3].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1236_smt">
                  <p>Malicious domain names, dynamic domain names and domain names that can be registered anonymously for free are blocked by web content filters.</p>
               </part>
            </control>
            <control id="ism-1171" class="ISM-control">
               <title>Control: ism-1171</title>
               <prop name="sort-id"
                      value="catalog[1].group[23].group[6].group[3].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1171_smt">
                  <p>Attempts to access websites through their IP addresses instead of their domain names are blocked by web content filters.</p>
               </part>
            </control>
         </group>
      </group>
      <group>
         <title>Content filtering</title>
         <prop name="sort-id" value="catalog[1].group[23].group[7]"/>
         <part name="overview">
            <h1>Content filtering techniques</h1>
            <p>The following content filtering techniques should be considered as part of an organisation’s content filtering implementation for gateways and CDSs:</p>
            <ul>
               <li>
                  <strong>Antivirus scans:</strong> Scans files for viruses and other malicious code.</li>
               <li>
                  <strong>Automated dynamic analysis:</strong> Analyses executable files run in a sandbox to detect suspicious behaviour.</li>
               <li>
                  <strong>File extension checks:</strong> Checks file extensions to determine purported file types.</li>
               <li>
                  <strong>File format checks:</strong> Checks files conform to defined file format specifications.</li>
               <li>
                  <strong>File type checks:</strong> Checks file headers to determine actual file types.</li>
               <li>
                  <strong>Keyword checks:</strong> Checks files for keywords that could indicate undesirable content.</li>
               <li>
                  <strong>Metadata checks:</strong> Checks files for metadata that should be removed.</li>
               <li>
                  <strong>Protective marking checks:</strong> Checks files for protective markings that may indicate undesirable content.</li>
               <li>
                  <strong>Manual inspections:</strong> Involves the manual inspection of files for suspicious or undesirable content that an automated system may miss, which is particularly important for multimedia and content rich files.</li>
            </ul>
            <h1>Further information</h1>
            <p>Further information on cyber supply chain risk management can be found in the cyber supply chain risk management section of the <a href="#f37a4848-0791-4870-b316-5536c2681c28">Guidelines for Procurement and Outsourcing</a>.</p>
            <p>Further information on performing data transfers can be found in the data transfers section of the <a href="#1eefdaf7-3991-4ba2-9439-79565f508c44">Guidelines for Data Transfers</a>.</p>
         </part>
         <group>
            <title>Performing content filtering</title>
            <prop name="sort-id" value="catalog[1].group[23].group[7].group[01]"/>
            <part name="overview">
               <p>Content filters perform an important function within gateways and CDSs by reducing the likelihood of unauthorised content or malicious code from entering or exiting networks. In performing content filtering checks, some content will be readily identifiable as malicious, or cannot be inspected, while other content, such as active content, may be deemed suspicious depending on what is considered normal behaviour for content passing through gateways and CDSs within an organisation. Finally, when content filters are used by CDSs, their assurance requirements necessitate rigorous security testing to ensure they perform as expected and cannot be bypassed.</p>
            </part>
            <control id="ism-0659" class="ISM-control">
               <title>Control: ism-0659</title>
               <prop name="sort-id"
                      value="catalog[1].group[23].group[7].group[01].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="6"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0659_smt">
                  <p>Files imported or exported via gateways or CDSs undergo content filtering checks.</p>
               </part>
            </control>
            <control id="ism-0651" class="ISM-control">
               <title>Control: ism-0651</title>
               <prop name="sort-id"
                      value="catalog[1].group[23].group[7].group[01].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="5"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0651_smt">
                  <p>Files identified by content filtering checks as malicious, or that cannot be inspected, are blocked.</p>
               </part>
            </control>
            <control id="ism-0652" class="ISM-control">
               <title>Control: ism-0652</title>
               <prop name="sort-id"
                      value="catalog[1].group[23].group[7].group[01].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0652_smt">
                  <p>Files identified by content filtering checks as suspicious are quarantined until reviewed and subsequently approved or not approved for release.</p>
               </part>
            </control>
            <control id="ism-1524" class="ISM-control">
               <title>Control: ism-1524</title>
               <prop name="sort-id"
                      value="catalog[1].group[23].group[7].group[01].control[4]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-1524_smt">
                  <p>Content filters used by CDSs undergo rigorous security testing to ensure they perform as expected and cannot be bypassed.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Encrypted files</title>
            <prop name="sort-id" value="catalog[1].group[23].group[7].group[02]"/>
            <part name="overview">
               <p>As encryption can be used to bypass content filtering checks, this poses a security risk in that malicious code could enter networks, or data could be exfiltrated from networks, undetected. In addition, encrypted files could mask data at a higher classification than that authorised to pass through gateways or CDSs, which could result in a data spill. As such, encrypted files should be decrypted in order to undergo content filtering checks.</p>
               <p>Note, where a requirement to preserve the confidentiality of encrypted files exists, an organisation may consider a dedicated system to allow encrypted files to be decrypted in an appropriately secure environment before being subjected to all applicable content filtering checks.</p>
            </part>
            <control id="ism-1293" class="ISM-control">
               <title>Control: ism-1293</title>
               <prop name="sort-id"
                      value="catalog[1].group[23].group[7].group[02].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1293_smt">
                  <p>Encrypted files imported or exported via gateways or CDSs are decrypted in order to undergo content filtering checks.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Archive files</title>
            <prop name="sort-id" value="catalog[1].group[23].group[7].group[03]"/>
            <part name="overview">
               <p>Archive files can be used to bypass content filtering checks if content filters do not handle such files correctly. Ensuring content filters recognise archive files will ensure the embedded files they contain are subject to the same content filtering checks as un-archived files.</p>
               <p>Archive files can be constructed in a manner which can result in a denial of service to content filters due to processor, memory or disk space exhaustion. To limit the likelihood of such situations, content filters can specify resource constraints while unpacking archive files. If these constraints are exceeded, content filtering checks should be terminated.</p>
            </part>
            <control id="ism-1289" class="ISM-control">
               <title>Control: ism-1289</title>
               <prop name="sort-id"
                      value="catalog[1].group[23].group[7].group[03].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1289_smt">
                  <p>Archive files imported or exported via gateways or CDSs are unpacked in order to undergo content filtering checks.</p>
               </part>
            </control>
            <control id="ism-1290" class="ISM-control">
               <title>Control: ism-1290</title>
               <prop name="sort-id"
                      value="catalog[1].group[23].group[7].group[03].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1290_smt">
                  <p>Archive files are unpacked in a controlled manner to ensure content filter performance or availability is not adversely affected.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Antivirus scanning</title>
            <prop name="sort-id" value="catalog[1].group[23].group[7].group[04]"/>
            <part name="overview">
               <p>Antivirus scanning can be used to detect malicious files. In doing so, multiple different scanning engines should be used to increase the likelihood of identifying any malicious files.</p>
            </part>
            <control id="ism-1288" class="ISM-control">
               <title>Control: ism-1288</title>
               <prop name="sort-id"
                      value="catalog[1].group[23].group[7].group[04].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1288_smt">
                  <p>Files imported or exported via gateways or CDSs undergo antivirus scanning using multiple different scanning engines.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Automated dynamic analysis</title>
            <prop name="sort-id" value="catalog[1].group[23].group[7].group[05]"/>
            <part name="overview">
               <p>Analysing executable files in a sandbox can be an effective method to detect suspicious behaviour upon file execution, such as network traffic, creation or modification of files, or system configuration changes.</p>
            </part>
            <control id="ism-1389" class="ISM-control">
               <title>Control: ism-1389</title>
               <prop name="sort-id"
                      value="catalog[1].group[23].group[7].group[05].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1389_smt">
                  <p>Executable files imported via gateways or CDSs are automatically executed in a sandbox to detect any suspicious behaviour.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Allowing specific content types</title>
            <prop name="sort-id" value="catalog[1].group[23].group[7].group[06]"/>
            <part name="overview">
               <p>Creating and enforcing an organisation-approved list of allowed file types, can reduce the attack surface of networks. For example, a content filter in an email gateway might only allow Microsoft Office files and Portable Document Format (PDF) files.</p>
            </part>
            <control id="ism-0649" class="ISM-control">
               <title>Control: ism-0649</title>
               <prop name="sort-id"
                      value="catalog[1].group[23].group[7].group[06].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="8"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0649_smt">
                  <p>Files imported or exported via gateways or CDSs are filtered for allowed file types.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Content validation</title>
            <prop name="sort-id" value="catalog[1].group[23].group[7].group[07]"/>
            <part name="overview">
               <p>Content validation, such as file format checks, aims to ensure that files conform to defined file format specifications. In performing content validation, any malformed content may indicate the presence of unauthorised content or malicious code, such as that designed to exploit known security vulnerabilities in operating systems or applications.</p>
            </part>
            <control id="ism-1284" class="ISM-control">
               <title>Control: ism-1284</title>
               <prop name="sort-id"
                      value="catalog[1].group[23].group[7].group[07].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1284_smt">
                  <p>Files imported or exported via gateways or CDSs undergo content validation.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Content conversion</title>
            <prop name="sort-id" value="catalog[1].group[23].group[7].group[08]"/>
            <part name="overview">
               <p>Content conversion can be an effective method to render malicious code harmless by converting one file type to another file type. Note, however, some file types will not benefit from content conversion. Examples of content conversion include:</p>
               <ul>
                  <li>converting Microsoft Word documents to PDF files</li>
                  <li>converting Microsoft PowerPoint presentations to image files</li>
                  <li>converting Microsoft Excel spreadsheets to comma-separated values files</li>
                  <li>converting PDF documents to plain text files.</li>
               </ul>
            </part>
            <control id="ism-1286" class="ISM-control">
               <title>Control: ism-1286</title>
               <prop name="sort-id"
                      value="catalog[1].group[23].group[7].group[08].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1286_smt">
                  <p>Files imported or exported via gateways or CDSs undergo content conversion.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Content sanitisation</title>
            <prop name="sort-id" value="catalog[1].group[23].group[7].group[09]"/>
            <part name="overview">
               <p>Content sanitisation is the process of rendering files safe by removing or altering active content while leaving the original content as intact as possible, such as by removing macros from Microsoft Office files or removing JavaScript sections from PDF files.</p>
            </part>
            <control id="ism-1287" class="ISM-control">
               <title>Control: ism-1287</title>
               <prop name="sort-id"
                      value="catalog[1].group[23].group[7].group[09].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1287_smt">
                  <p>Files imported or exported via gateways or CDSs undergo content sanitisation.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Validating file integrity</title>
            <prop name="sort-id" value="catalog[1].group[23].group[7].group[10]"/>
            <part name="overview">
               <p>If files passing through gateways or CDSs contain a form of integrity protection, such as a digital signature or cryptographic checksum, content filters should verify their integrity. In doing so, the failure of any integrity checks may indicate that files have been tampered with.</p>
            </part>
            <control id="ism-0677" class="ISM-control">
               <title>Control: ism-0677</title>
               <prop name="sort-id"
                      value="catalog[1].group[23].group[7].group[10].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="7"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-23"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0677_smt">
                  <p>Files imported or exported via gateways or CDSs that have a digital signature or cryptographic checksum are validated.</p>
               </part>
            </control>
         </group>
      </group>
      <group>
         <title>Peripheral switches</title>
         <prop name="sort-id" value="catalog[1].group[23].group[8]"/>
         <part name="overview">
            <h1>Further information</h1>
            <p>Further information on cyber supply chain risk management can be found in the cyber supply chain risk management section of the <a href="#f37a4848-0791-4870-b316-5536c2681c28">Guidelines for Procurement and Outsourcing</a>.</p>
            <p>Further information on evaluated products can be found in the evaluated product procurement section of the <a href="#a699a3aa-828d-479b-b50b-98127bb19437">Guidelines for Evaluated Products</a>.</p>
         </part>
         <group>
            <title>Using peripheral switches</title>
            <prop name="sort-id" value="catalog[1].group[23].group[8].group[1]"/>
            <part name="overview">
               <p>When accessing different systems through peripheral switches, it is important that sufficient assurance is obtained in their operation to ensure that data does not pass between connected systems. As such, the level of assurance needed in peripheral switches is determined by the difference in sensitivity or classification of systems they are connected to. Note, there is no requirement for evaluated peripheral switches to be used when all connected systems belong to the same security domain.</p>
            </part>
            <control id="ism-0591" class="ISM-control">
               <title>Control: ism-0591</title>
               <prop name="sort-id"
                      value="catalog[1].group[23].group[8].group[1].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="8"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0591_smt">
                  <p>Evaluated peripheral switches are used when sharing peripherals between systems.</p>
               </part>
            </control>
            <control id="ism-1457" class="ISM-control">
               <title>Control: ism-1457</title>
               <prop name="sort-id"
                      value="catalog[1].group[23].group[8].group[1].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="4"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-1457_smt">
                  <p>Evaluated peripheral switches used for sharing peripherals between SECRET and TOP SECRET systems, or between SECRET or TOP SECRET systems belonging to different security domains, preferably complete a high assurance evaluation.</p>
               </part>
            </control>
            <control id="ism-1480" class="ISM-control">
               <title>Control: ism-1480</title>
               <prop name="sort-id"
                      value="catalog[1].group[23].group[8].group[1].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="2"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-1480_smt">
                  <p>Evaluated peripheral switches used for sharing peripherals between SECRET or TOP SECRET systems and any non-SECRET or TOP SECRET systems complete a high assurance evaluation.</p>
               </part>
            </control>
         </group>
      </group>
   </group>
   <group>
      <title>Guidelines for Data Transfers</title>
      <prop name="sort-id" value="catalog[1].group[24]"/>
      <group>
         <title>Data transfers</title>
         <prop name="sort-id" value="catalog[1].group[24].group[1]"/>
         <part name="overview">
            <h1>Performing data transfers</h1>
            <p>This section describes controls applicable to both manual data transfers and data transfers using gateways or Cross Domain Solutions (CDSs). For data transfers using gateways or CDSs, the content filtering section of the <a href="#e8bde527-526c-4a6a-b66f-05228f09dd7b">Guidelines for Gateways</a> is also applicable.</p>
            <h1>Further information</h1>
            <p>Further information on manual data transfers using removable media can be found in the media usage section of the <a href="#b594c9c0-b42f-4f06-b643-38023275a5c7">Guidelines for Media</a>.</p>
            <p>Further information on data transfers using gateways or CDSs can be found in the content filtering section of the <a href="#e8bde527-526c-4a6a-b66f-05228f09dd7b">Guidelines for Gateways</a>.</p>
         </part>
         <group>
            <title>Data transfer processes and procedures</title>
            <prop name="sort-id" value="catalog[1].group[24].group[1].group[1]"/>
            <part name="overview">
               <p>Ensuring that data transfer processes and procedures are developed, implemented and maintained can facilitate consistent data transfers. In addition, in order to reduce the likelihood of Australian Eyes Only (AUSTEO), Australian Government Access Only (AGAO) and Releasable To (REL) data crossing into unsuitable foreign systems, it is important that additional processes and procedures are developed, implemented and maintained to prevent this from occurring. Note, depending on protective markings applied to REL data, it may be suitable for export to some foreign systems but not to others.</p>
            </part>
            <control id="ism-0663" class="ISM-control">
               <title>Control: ism-0663</title>
               <prop name="sort-id"
                      value="catalog[1].group[24].group[1].group[1].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="7"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0663_smt">
                  <p>Data transfer processes, and supporting data transfer procedures, are developed, implemented and maintained.</p>
               </part>
            </control>
            <control id="ism-1535" class="ISM-control">
               <title>Control: ism-1535</title>
               <prop name="sort-id"
                      value="catalog[1].group[24].group[1].group[1].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="5"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-1535_smt">
                  <p>Processes, and supporting procedures, are developed, implemented and maintained to prevent AUSTEO, AGAO and REL data in both textual and non-textual formats from being exported to unsuitable foreign systems.</p>
               </part>
            </control>
         </group>
         <group>
            <title>User responsibilities</title>
            <prop name="sort-id" value="catalog[1].group[24].group[1].group[2]"/>
            <part name="overview">
               <p>When users transfer data to or from systems, they should understand the potential consequences of their actions. This could include transferring data onto systems not authorised to handle the data, or the unintended introduction of malicious code to systems. As such, users should be held accountable for all data transfers that they perform.</p>
            </part>
            <control id="ism-0661" class="ISM-control">
               <title>Control: ism-0661</title>
               <prop name="sort-id"
                      value="catalog[1].group[24].group[1].group[2].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="8"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0661_smt">
                  <p>Users transferring data to and from systems are held accountable for data transfers they perform.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Manual import of data</title>
            <prop name="sort-id" value="catalog[1].group[24].group[1].group[3]"/>
            <part name="overview">
               <p>When manually importing data to systems, such as via the use of removable media, the data should be scanned for malicious and active content to reduce the likelihood of causing a malicious code infection. In cases where security checks fail, data should be quarantined until it can be reviewed and subsequently approved or not approved for release.</p>
            </part>
            <control id="ism-0657" class="ISM-control">
               <title>Control: ism-0657</title>
               <prop name="sort-id"
                      value="catalog[1].group[24].group[1].group[3].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="6"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-0657_smt">
                  <p>When manually importing data to systems, the data is scanned for malicious and active content.</p>
               </part>
            </control>
            <control id="ism-1778" class="ISM-control">
               <title>Control: ism-1778</title>
               <prop name="sort-id"
                      value="catalog[1].group[24].group[1].group[3].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1778_smt">
                  <p>When manually importing data to systems, all data that fails security checks is quarantined until reviewed and subsequently approved or not approved for release.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Authorising export of data</title>
            <prop name="sort-id" value="catalog[1].group[24].group[1].group[4]"/>
            <part name="overview">
               <p>Data exported from SECRET and TOP SECRET systems should be reviewed and authorised by a trusted source beforehand, such as an organisation’s Chief Information Security Officer or one of their delegates. In doing so, all data authorised for export should be digitally signed by the trusted source.</p>
            </part>
            <control id="ism-0664" class="ISM-control">
               <title>Control: ism-0664</title>
               <prop name="sort-id"
                      value="catalog[1].group[24].group[1].group[4].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="7"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-0664_smt">
                  <p>Data exported from SECRET and TOP SECRET systems is reviewed and authorised by a trusted source beforehand.</p>
               </part>
            </control>
            <control id="ism-0675" class="ISM-control">
               <title>Control: ism-0675</title>
               <prop name="sort-id"
                      value="catalog[1].group[24].group[1].group[4].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="6"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-0675_smt">
                  <p>Data authorised for export from SECRET and TOP SECRET systems is digitally signed by a trusted source.</p>
               </part>
            </control>
            <control id="ism-0665" class="ISM-control">
               <title>Control: ism-0665</title>
               <prop name="sort-id"
                      value="catalog[1].group[24].group[1].group[4].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="6"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-21"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-0665_smt">
                  <p>Trusted sources for SECRET and TOP SECRET systems are limited to people and services that have been authorised as such by an organisation’s Chief Information Security Officer.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Manual export of data</title>
            <prop name="sort-id" value="catalog[1].group[24].group[1].group[5]"/>
            <part name="overview">
               <p>When manually exporting data from systems, such as via the use of removable media, the data should be checked for unsuitable protective markings to reduce the likelihood of causing a data spill. In addition, data manually exported from SECRET and TOP SECRET systems will require additional assurances, for example, by validating digital signatures and checking for keywords within all textual data. Finally, in cases where security checks fail, data should be quarantined until it can be reviewed and subsequently approved or not approved for release.</p>
            </part>
            <control id="ism-1187" class="ISM-control">
               <title>Control: ism-1187</title>
               <prop name="sort-id"
                      value="catalog[1].group[24].group[1].group[5].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="3"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1187_smt">
                  <p>When manually exporting data from systems, the data is checked for unsuitable protective markings.</p>
               </part>
            </control>
            <control id="ism-0669" class="ISM-control">
               <title>Control: ism-0669</title>
               <prop name="sort-id"
                      value="catalog[1].group[24].group[1].group[5].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="6"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Dec-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-0669_smt">
                  <p>When manually exporting data from SECRET and TOP SECRET systems, digital signatures are validated and keyword checks are performed within all textual data.</p>
               </part>
            </control>
            <control id="ism-1779" class="ISM-control">
               <title>Control: ism-1779</title>
               <prop name="sort-id"
                      value="catalog[1].group[24].group[1].group[5].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1779_smt">
                  <p>When manually exporting data from systems, all data that fails security checks is quarantined until reviewed and subsequently approved or not approved for release.</p>
               </part>
            </control>
         </group>
         <group>
            <title>Monitoring data import and export</title>
            <prop name="sort-id" value="catalog[1].group[24].group[1].group[6]"/>
            <part name="overview">
               <p>To ensure the ongoing confidentiality and integrity of systems and data, it is important to log all data transfers. This applies to all forms of data transfers, such as those performed using removable media, gateways or CDSs. Ideally, data transfer logs should contain information on who authorised the data transfer, what data was transferred, where the data was transferred from or to, when the data was transferred, why the data was transferred, and how the data was transferred. Monitoring of such activities, via periodic verification of data transfer logs, can assist in identifying abuse of data transfer privileges and any unusual usage patterns that may indicate attempts by an adversary to surreptitiously import malicious code or exfiltrate data from SECRET and TOP SECRET systems.</p>
            </part>
            <control id="ism-1586" class="ISM-control">
               <title>Control: ism-1586</title>
               <prop name="sort-id"
                      value="catalog[1].group[24].group[1].group[6].control[1]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="0"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Aug-20"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1586_smt">
                  <p>Data transfer logs are used to record all data imports and exports from systems.</p>
               </part>
            </control>
            <control id="ism-1294" class="ISM-control">
               <title>Control: ism-1294</title>
               <prop name="sort-id"
                      value="catalog[1].group[24].group[1].group[6].control[2]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="5"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="ALL"/>
               <part name="statement" id="ism-1294_smt">
                  <p>Data transfer logs for systems are partially verified at least monthly.</p>
               </part>
            </control>
            <control id="ism-0660" class="ISM-control">
               <title>Control: ism-0660</title>
               <prop name="sort-id"
                      value="catalog[1].group[24].group[1].group[6].control[3]"/>
               <prop name="revision"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="9"/>
               <prop name="updated"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="Mar-22"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="S"/>
               <prop name="applicability"
                      ns="https://cyber.gov.au/ns/ism/oscal/1.0"
                      value="TS"/>
               <part name="statement" id="ism-0660_smt">
                  <p>Data transfer logs for SECRET and TOP SECRET systems are fully verified at least monthly.</p>
               </part>
            </control>
         </group>
      </group>
   </group>
   <group>
      <title>Cyber Security Terminology</title>
      <prop name="sort-id" value="catalog[1].group[25]"/>
      <group>
         <title>Glossary of abbreviations</title>
         <prop name="sort-id" value="catalog[1].group[25].group[1]"/>
         <part name="overview">
            <table>
               <tr>
                  <th>Abbreviation</th>
                  <th>Meaning</th>
               </tr>
               <tr>
                  <td>AACA</td>
                  <td>ASD-Approved Cryptographic Algorithm</td>
               </tr>
               <tr>
                  <td>AACP</td>
                  <td>ASD-Approved Cryptographic Protocol</td>
               </tr>
               <tr>
                  <td>ACSC</td>
                  <td>Australian Cyber Security Centre</td>
               </tr>
               <tr>
                  <td>AD DS</td>
                  <td>Active Directory Domain Services</td>
               </tr>
               <tr>
                  <td>AES</td>
                  <td>Advanced Encryption Standard</td>
               </tr>
               <tr>
                  <td>AGAO</td>
                  <td>Australian Government Access Only</td>
               </tr>
               <tr>
                  <td>AGD</td>
                  <td>Attorney-General's Department</td>
               </tr>
               <tr>
                  <td>AH</td>
                  <td>Authentication Header</td>
               </tr>
               <tr>
                  <td>AISEP</td>
                  <td>Australian Information Security Evaluation Program</td>
               </tr>
               <tr>
                  <td>ASD</td>
                  <td>Australian Signals Directorate</td>
               </tr>
               <tr>
                  <td>API</td>
                  <td>application programming interface</td>
               </tr>
               <tr>
                  <td>ASIO</td>
                  <td>Australian Security Intelligence Organisation</td>
               </tr>
               <tr>
                  <td>ATA</td>
                  <td>Advanced Technology Attachment</td>
               </tr>
               <tr>
                  <td>AUSTEO</td>
                  <td>Australian Eyes Only</td>
               </tr>
               <tr>
                  <td>CCRA</td>
                  <td>Common Criteria Recognition Arrangement</td>
               </tr>
               <tr>
                  <td>CDN</td>
                  <td>content delivery network</td>
               </tr>
               <tr>
                  <td>CDS</td>
                  <td>Cross Domain Solution</td>
               </tr>
               <tr>
                  <td>CISO</td>
                  <td>Chief Information Security Officer</td>
               </tr>
               <tr>
                  <td>DH</td>
                  <td>Diffie-Hellman</td>
               </tr>
               <tr>
                  <td>DKIM</td>
                  <td>DomainKeys Identified Mail</td>
               </tr>
               <tr>
                  <td>DMA</td>
                  <td>Direct Memory Access</td>
               </tr>
               <tr>
                  <td>DMARC</td>
                  <td>Domain-based Message Authentication, Reporting and Conformance</td>
               </tr>
               <tr>
                  <td>DNS</td>
                  <td>Domain Name System</td>
               </tr>
               <tr>
                  <td>DSA</td>
                  <td>Digital Signature Algorithm</td>
               </tr>
               <tr>
                  <td>EAL</td>
                  <td>Evaluation Assurance Level</td>
               </tr>
               <tr>
                  <td>EAP</td>
                  <td>Extensible Authentication Protocol</td>
               </tr>
               <tr>
                  <td>EAP-TLS</td>
                  <td>Extensible Authentication Protocol-Transport Layer Security</td>
               </tr>
               <tr>
                  <td>ECDSA</td>
                  <td>Elliptic Curve Digital Signature Algorithm</td>
               </tr>
               <tr>
                  <td>ECDH</td>
                  <td>Elliptic Curve Diffie-Hellman</td>
               </tr>
               <tr>
                  <td>EEPROM</td>
                  <td>electrically erasable programmable read-only memory</td>
               </tr>
               <tr>
                  <td>EPROM</td>
                  <td>erasable programmable read-only memory</td>
               </tr>
               <tr>
                  <td>ESP</td>
                  <td>Encapsulating Security Payload</td>
               </tr>
               <tr>
                  <td>FIPS</td>
                  <td>Federal Information Processing Standard</td>
               </tr>
               <tr>
                  <td>FT</td>
                  <td>Fast Basic Service Set Transition</td>
               </tr>
               <tr>
                  <td>HACE</td>
                  <td>High Assurance Cryptographic Equipment</td>
               </tr>
               <tr>
                  <td>HIPS</td>
                  <td>Host-based Intrusion Prevention System</td>
               </tr>
               <tr>
                  <td>HMAC</td>
                  <td>Hashed Message Authentication Code</td>
               </tr>
               <tr>
                  <td>HSTS</td>
                  <td>Hypertext Transfer Protocol Strict Transport Security</td>
               </tr>
               <tr>
                  <td>HTML</td>
                  <td>Hypertext Markup Language</td>
               </tr>
               <tr>
                  <td>HTTP</td>
                  <td>Hypertext Transfer Protocol</td>
               </tr>
               <tr>
                  <td>HTTPS</td>
                  <td>Hypertext Transfer Protocol Secure</td>
               </tr>
               <tr>
                  <td>ICT</td>
                  <td>Information and Communications Technology</td>
               </tr>
               <tr>
                  <td>IEC</td>
                  <td>International Electrotechnical Commission</td>
               </tr>
               <tr>
                  <td>IKE</td>
                  <td>Internet Key Exchange</td>
               </tr>
               <tr>
                  <td>IP</td>
                  <td>Internet Protocol</td>
               </tr>
               <tr>
                  <td>IPsec</td>
                  <td>Internet Protocol Security</td>
               </tr>
               <tr>
                  <td>IPv4</td>
                  <td>Internet Protocol version 4</td>
               </tr>
               <tr>
                  <td>IPv6</td>
                  <td>Internet Protocol version 6</td>
               </tr>
               <tr>
                  <td>IR</td>
                  <td>infrared</td>
               </tr>
               <tr>
                  <td>IRAP</td>
                  <td>Infosec Registered Assessors Program</td>
               </tr>
               <tr>
                  <td>ISM</td>
                  <td>Information Security Manual</td>
               </tr>
               <tr>
                  <td>ISO</td>
                  <td>International Organization for Standardization</td>
               </tr>
               <tr>
                  <td>LAN</td>
                  <td>Local Area Network</td>
               </tr>
               <tr>
                  <td>MAC</td>
                  <td>Media Access Control</td>
               </tr>
               <tr>
                  <td>MFD</td>
                  <td>multifunction device</td>
               </tr>
               <tr>
                  <td>MTA-STS</td>
                  <td>Mail Transfer Agent Strict Transport Security</td>
               </tr>
               <tr>
                  <td>NAA</td>
                  <td>National Archives of Australia</td>
               </tr>
               <tr>
                  <td>NIDS</td>
                  <td>Network-based Intrusion Detection System</td>
               </tr>
               <tr>
                  <td>NIPS</td>
                  <td>Network-based Intrusion Prevention System</td>
               </tr>
               <tr>
                  <td>NIST</td>
                  <td>National Institute of Standards and Technology</td>
               </tr>
               <tr>
                  <td>OWASP</td>
                  <td>Open Web Application Security Project</td>
               </tr>
               <tr>
                  <td>PDF</td>
                  <td>Portable Document Format</td>
               </tr>
               <tr>
                  <td>PFS</td>
                  <td>Perfect Forward Secrecy</td>
               </tr>
               <tr>
                  <td>PMK</td>
                  <td>Pairwise Master Key</td>
               </tr>
               <tr>
                  <td>PP</td>
                  <td>Protection Profile</td>
               </tr>
               <tr>
                  <td>PRF</td>
                  <td>pseudorandom function</td>
               </tr>
               <tr>
                  <td>PSPF</td>
                  <td>Protective Security Policy Framework</td>
               </tr>
               <tr>
                  <td>PSTN</td>
                  <td>Public Switched Telephone Network</td>
               </tr>
               <tr>
                  <td>RADIUS</td>
                  <td>Remote Access Dial-In User Service</td>
               </tr>
               <tr>
                  <td>REL</td>
                  <td>Releasable To</td>
               </tr>
               <tr>
                  <td>RF</td>
                  <td>Radio Frequency</td>
               </tr>
               <tr>
                  <td>ROA</td>
                  <td>Route Origin Authorization</td>
               </tr>
               <tr>
                  <td>RPKI</td>
                  <td>Resource Public Key Infrastructure</td>
               </tr>
               <tr>
                  <td>RSA</td>
                  <td>Rivest-Sharmir-Adleman</td>
               </tr>
               <tr>
                  <td>SCEC</td>
                  <td>Security Construction and Equipment Committee</td>
               </tr>
               <tr>
                  <td>SHA-2</td>
                  <td>Secure Hashing Algorithm 2</td>
               </tr>
               <tr>
                  <td>S/MIME</td>
                  <td>Secure/Multipurpose Internet Mail Extension</td>
               </tr>
               <tr>
                  <td>SNMP</td>
                  <td>Simple Network Management Protocol</td>
               </tr>
               <tr>
                  <td>SOE</td>
                  <td>Standard Operating Environment</td>
               </tr>
               <tr>
                  <td>SQL</td>
                  <td>Structured Query Language</td>
               </tr>
               <tr>
                  <td>SP</td>
                  <td>Special Publication</td>
               </tr>
               <tr>
                  <td>SPF</td>
                  <td>Sender Policy Framework</td>
               </tr>
               <tr>
                  <td>SPN</td>
                  <td>Service Principal Name</td>
               </tr>
               <tr>
                  <td>SSH</td>
                  <td>Secure Shell</td>
               </tr>
               <tr>
                  <td>SSID</td>
                  <td>Service Set Identifier</td>
               </tr>
               <tr>
                  <td>TLS</td>
                  <td>Transport Layer Security</td>
               </tr>
               <tr>
                  <td>USB</td>
                  <td>Universal Serial Bus</td>
               </tr>
               <tr>
                  <td>VLAN</td>
                  <td>Virtual Local Area Network</td>
               </tr>
               <tr>
                  <td>VPN</td>
                  <td>Virtual Private Network</td>
               </tr>
               <tr>
                  <td>WPA2</td>
                  <td>Wi-Fi Protected Access 2</td>
               </tr>
               <tr>
                  <td>WPA3</td>
                  <td>Wi-Fi Protected Access 3</td>
               </tr>
            </table>
         </part>
      </group>
      <group>
         <title>Glossary of cyber security terms</title>
         <prop name="sort-id" value="catalog[1].group[25].group[2]"/>
         <part name="overview">
            <table>
               <tr>
                  <th>Term</th>
                  <th>Meaning</th>
               </tr>
               <tr>
                  <td>access control</td>
                  <td>The process of granting or denying requests for access to systems, applications and data. Can also refer to the process of granting or denying requests for access to facilities.</td>
               </tr>
               <tr>
                  <td>Access Cross Domain Solution</td>
                  <td>A system permitting access to multiple security domains from a single client device.</td>
               </tr>
               <tr>
                  <td>accountable material</td>
                  <td>Accountable material requires the strictest control over its access and movement. Accountable material includes TOP SECRET data, some types of caveated data and any data designated as accountable material by its originator.</td>
               </tr>
               <tr>
                  <td>aggregation (of data)</td>
                  <td>A term used to describe compilations of data that may require a higher level of protection than their component parts.</td>
               </tr>
               <tr>
                  <td>application control</td>
                  <td>An approach in which only an explicitly defined set of trusted applications are allowed to execute on systems.</td>
               </tr>
               <tr>
                  <td>asset</td>
                  <td>Anything of value, such as ICT equipment, software or data.</td>
               </tr>
               <tr>
                  <td>attack surface</td>
                  <td>The amount of ICT equipment and software used in a system. The greater the attack surface the greater the chances of an adversary finding an exploitable security vulnerability.</td>
               </tr>
               <tr>
                  <td>ASD Enterprise Mobility Evaluation Program</td>
                  <td>The investigation, analysis, verification and validation of enterprise mobility solutions by the Australian Signals Directorate (ASD) to protect up to PROTECTED data.</td>
               </tr>
               <tr>
                  <td>Australian Information Security Evaluation Program</td>
                  <td>A program under which evaluations are performed by impartial bodies against the Common Criteria. The results of these evaluations are then certified by the Australian Certification Authority within the Australian Cyber Security Centre.</td>
               </tr>
               <tr>
                  <td>Australian Eyes Only data</td>
                  <td>Data not to be passed to, or accessed by, foreign nationals.</td>
               </tr>
               <tr>
                  <td>Australian Government Access Only data</td>
                  <td>Data not to be passed to, or accessed by, foreign nationals, with the exception of seconded foreign nationals.</td>
               </tr>
               <tr>
                  <td>authentication</td>
                  <td>Verifying the identity of a user, process or device as a prerequisite to allowing access to resources in a system.</td>
               </tr>
               <tr>
                  <td>Authentication Header</td>
                  <td>A protocol used in Internet Protocol Security (IPsec) that provides data integrity and data origin authenticity but not confidentiality.</td>
               </tr>
               <tr>
                  <td>authorising officer</td>
                  <td>An executive with the authority to formally accept the security risks associated with the operation of a system and to authorise it to operate.</td>
               </tr>
               <tr>
                  <td>availability</td>
                  <td>The assurance that systems and data are accessible and useable by authorised entities when required.</td>
               </tr>
               <tr>
                  <td>biometrics</td>
                  <td>Measurable physical characteristics used to identify or verify an individual.</td>
               </tr>
               <tr>
                  <td>cascaded connections</td>
                  <td>Cascaded connections occur when one network is connected to another, which is then connected to another, and so on.</td>
               </tr>
               <tr>
                  <td>caveat</td>
                  <td>A marking that indicates that the data has special requirements in addition to those indicated by its classification. This term covers codewords, source codewords, releasability indicators and special-handling caveats.</td>
               </tr>
               <tr>
                  <td>certification report</td>
                  <td>An artefact of Common Criteria evaluations that outlines the outcomes of a product’s evaluation.</td>
               </tr>
               <tr>
                  <td>Chief Information Security Officer</td>
                  <td>A senior executive who is responsible for coordinating communication between security and business functions as well as overseeing the application of controls and associated security risk management processes.</td>
               </tr>
               <tr>
                  <td>classification</td>
                  <td>The categorisation of systems and data according to the expected impact if it was to be compromised.</td>
               </tr>
               <tr>
                  <td>classified data</td>
                  <td>Data that would cause damage, serious damage or exceptionally grave damage to the national interest, an organisation or an individual if compromised (i.e. data assessed as PROTECTED, SECRET or TOP SECRET).</td>
               </tr>
               <tr>
                  <td>coercivity</td>
                  <td>A property of magnetic material, used as a measure of the amount of coercive force required to reduce the magnetic induction to zero from its remnant state.</td>
               </tr>
               <tr>
                  <td>Commercial Grade Cryptographic Equipment</td>
                  <td>A subset of ICT equipment which contains cryptographic components.</td>
               </tr>
               <tr>
                  <td>Common Criteria</td>
                  <td>An international standard for product evaluations.</td>
               </tr>
               <tr>
                  <td>Common Criteria Recognition Arrangement</td>
                  <td>An international agreement which facilitates the mutual recognition of Common Criteria evaluations by certificate producing schemes.</td>
               </tr>
               <tr>
                  <td>communications security</td>
                  <td>The controls applied to protect telecommunications from unauthorised interception and exploitation, as well as ensure the authenticity of such telecommunications.</td>
               </tr>
               <tr>
                  <td>conduit</td>
                  <td>A tube, duct or pipe used to protect cables.</td>
               </tr>
               <tr>
                  <td>confidentiality</td>
                  <td>The assurance that data is disclosed only to authorised entities.</td>
               </tr>
               <tr>
                  <td>connection forwarding</td>
                  <td>The use of network address translation to allow a port on a node inside a network to be accessed from outside the network. Alternatively, using a Secure Shell server to forward a Transmission Control Protocol connection to an arbitrary port on the local host.</td>
               </tr>
               <tr>
                  <td>content filter</td>
                  <td>A filter that examines content to assess conformance against a security policy.</td>
               </tr>
               <tr>
                  <td>continuous monitoring plan</td>
                  <td>A document that describes the plan for the continuous monitoring and assurance in the effectiveness of controls for a system.</td>
               </tr>
               <tr>
                  <td>control plane</td>
                  <td>The administrative interface that allows for the management and orchestration of a system's infrastructure and applications.</td>
               </tr>
               <tr>
                  <td>critical server</td>
                  <td>A server that provides critical network or security services. For example, a Microsoft Active Directory Domain Services domain controller or an authentication server.</td>
               </tr>
               <tr>
                  <td>Cross Domain Solution</td>
                  <td>A system capable of implementing comprehensive data flow security policies with a high level of trust between two or more differing security domains.</td>
               </tr>
               <tr>
                  <td>cryptographic algorithm</td>
                  <td>An algorithm used to perform cryptographic functions, such as encryption, integrity, authentication, digital signatures or key establishment.</td>
               </tr>
               <tr>
                  <td>cryptographic equipment</td>
                  <td>A generic term for commercial cryptographic equipment and High Assurance Cryptographic Equipment.</td>
               </tr>
               <tr>
                  <td>cryptographic hash</td>
                  <td>An algorithm (the hash function) which takes as input a string of any length (the message) and generates a fixed length string (the message digest or fingerprint) as output. The algorithm is designed to make it computationally infeasible to find any input which maps to a given digest, or to find two different messages that map to the same digest.</td>
               </tr>
               <tr>
                  <td>cryptographic protocol</td>
                  <td>An agreed standard for secure communication between two or more entities to provide confidentiality, integrity, authentication and non-repudiation of data.</td>
               </tr>
               <tr>
                  <td>cryptographic software</td>
                  <td>Software designed to perform cryptographic functions.</td>
               </tr>
               <tr>
                  <td>cryptographic system</td>
                  <td>A related set of hardware or software used for cryptographic communication, processing or storage and the administrative framework in which it operates.</td>
               </tr>
               <tr>
                  <td>cyber resilience</td>
                  <td>The ability to adapt to disruptions caused by cyber security incidents while maintaining continuous business operations. This includes the ability to detect, manage and recover from cyber security incidents.</td>
               </tr>
               <tr>
                  <td>cyber security</td>
                  <td>Measures used to protect the confidentiality, integrity and availability of systems and data.</td>
               </tr>
               <tr>
                  <td>cyber security event</td>
                  <td>An occurrence of a system, service or network state indicating a possible breach of security policy, failure of safeguards or a previously unknown situation that may be relevant to security.</td>
               </tr>
               <tr>
                  <td>cyber security incident</td>
                  <td>An unwanted or unexpected cyber security event, or a series of such events, that has either compromised business operations or has a significant probability of compromising business operations.</td>
               </tr>
               <tr>
                  <td>cyber threat</td>
                  <td>Any circumstance or event with the potential to harm systems or data.</td>
               </tr>
               <tr>
                  <td>data at rest</td>
                  <td>Data that resides on media or a system.</td>
               </tr>
               <tr>
                  <td>data in transit</td>
                  <td>Data that is being communicated across a communication medium.</td>
               </tr>
               <tr>
                  <td>data security</td>
                  <td>Measures used to protect the confidentiality, integrity and availability of data.</td>
               </tr>
               <tr>
                  <td>data spill</td>
                  <td>The accidental or deliberate exposure of data into an uncontrolled or unauthorised environment, or to people without a need-to-know.</td>
               </tr>
               <tr>
                  <td>declassification</td>
                  <td>A process whereby requirements for the protection of data are removed and an administrative decision is made to formally authorise its release into the public domain.</td>
               </tr>
               <tr>
                  <td>degausser</td>
                  <td>An electrical device or permanent magnet assembly which generates a coercive magnetic force for the purpose of degaussing magnetic storage devices.</td>
               </tr>
               <tr>
                  <td>degaussing</td>
                  <td>A process for reducing the magnetisation of a magnetic storage device to zero by applying a reverse (coercive) magnetic force, rendering any previously stored data unreadable.</td>
               </tr>
               <tr>
                  <td>demilitarised zone</td>
                  <td>A small network with one or more servers that is kept separate from the core network, typically on the outside of the firewall or as a separate network protected by the firewall. Demilitarised zones usually provide data to less trusted networks, such as the internet.</td>
               </tr>
               <tr>
                  <td>denial-of-service attack</td>
                  <td>An attempt by an adversary to prevent legitimate access to online services (typically a website), for example, by consuming the amount of available bandwidth or the processing capacity of the server hosting the online service.</td>
               </tr>
               <tr>
                  <td>device access control software</td>
                  <td>Software that can be used on a system to restrict access to communications ports. Device access control software can block all access to a communications port or allow access based on device types, manufacturer’s identification or even unique device identifiers.</td>
               </tr>
               <tr>
                  <td>digital preservation</td>
                  <td>The coordinated and ongoing set of processes and activities that ensure long-term, error-free storage of digital information, with means for retrieval and interpretation, for the entire time span the information is required.</td>
               </tr>
               <tr>
                  <td>digital signature</td>
                  <td>A cryptographic process that allows the proof of the source (with non-repudiation) and the verification of the integrity of that data.</td>
               </tr>
               <tr>
                  <td>diode</td>
                  <td>A device that allows data to flow in only one direction.</td>
               </tr>
               <tr>
                  <td>distributed-denial-of-service attack</td>
                  <td>A distributed form of denial-of-service attack.</td>
               </tr>
               <tr>
                  <td>dual-stack network device</td>
                  <td>ICT equipment that implements both Internet Protocol version 4 and Internet Protocol version 6 protocol stacks.</td>
               </tr>
               <tr>
                  <td>emanation security</td>
                  <td>The counter-measures employed to reduce sensitive or classified emanations from a facility and its systems to an acceptable level. Emanations can be in the form of Radio Frequency energy, sound waves or optical signals.</td>
               </tr>
               <tr>
                  <td>Encapsulating Security Payload</td>
                  <td>A protocol used for encryption and authentication in IPsec.</td>
               </tr>
               <tr>
                  <td>escort</td>
                  <td>A person who ensures that when maintenance or repairs are undertaken to ICT equipment that uncleared personnel are not exposed to data they are not authorised to access.</td>
               </tr>
               <tr>
                  <td>event</td>
                  <td>In the context of system logs, an event constitutes an evident change to the normal behaviour of a network, system or user.</td>
               </tr>
               <tr>
                  <td>facility</td>
                  <td>A physical space where business is performed. For example, a facility can be a building, a floor of a building or a designated space on the floor of a building.</td>
               </tr>
               <tr>
                  <td>fax machine</td>
                  <td>A device that allows copies of documents to be sent over a telephone network.</td>
               </tr>
               <tr>
                  <td>firewall</td>
                  <td>A network device that filters incoming and outgoing network data based on a series of rules.</td>
               </tr>
               <tr>
                  <td>firmware</td>
                  <td>Software embedded in ICT equipment.</td>
               </tr>
               <tr>
                  <td>fly lead</td>
                  <td>A lead that connects ICT equipment to the fixed infrastructure of a facility. For example, the lead that connects a workstation to a network wall socket.</td>
               </tr>
               <tr>
                  <td>foreign national</td>
                  <td>A person who is not an Australian citizen.</td>
               </tr>
               <tr>
                  <td>foreign system</td>
                  <td>A system that is not managed by, or on behalf of, the Australian Government.</td>
               </tr>
               <tr>
                  <td>fuzzing</td>
                  <td>Fuzzing (or fuzz testing) is a method used to discover errors or potential security vulnerabilities in software.</td>
               </tr>
               <tr>
                  <td>gateway</td>
                  <td>Gateways securely manage data flows between connected networks from different security domains.</td>
               </tr>
               <tr>
                  <td>hardware</td>
                  <td>A generic term for ICT equipment.</td>
               </tr>
               <tr>
                  <td>Hash-based Message Authentication Code Algorithms</td>
                  <td>A cryptographic construction that can be used to compute Message Authentication Codes using a hash function and a secret key.</td>
               </tr>
               <tr>
                  <td>High Assurance Cryptographic Equipment</td>
                  <td>Cryptographic equipment that has been authorised by ASD for the protection of SECRET and TOP SECRET data.</td>
               </tr>
               <tr>
                  <td>High Assurance Evaluation Program</td>
                  <td>The rigorous investigation, analysis, verification and validation of products by ASD to protect SECRET and TOP SECRET data.</td>
               </tr>
               <tr>
                  <td>high assurance ICT equipment</td>
                  <td>ICT equipment that has been designed and authorised for the protection of SECRET and TOP SECRET data.</td>
               </tr>
               <tr>
                  <td>high-value server</td>
                  <td>A server that provide important network services or contains important data repositories. For example, a Domain Name System server, database server, email server, file server or web server.</td>
               </tr>
               <tr>
                  <td>Host-based Intrusion Detection System</td>
                  <td>Software, resident on a system, which monitors system activities for malicious or unwanted behaviour.</td>
               </tr>
               <tr>
                  <td>Host-based Intrusion Prevention System</td>
                  <td>Software, resident on a system, which monitors system activities for malicious or unwanted behaviour and can react in real-time to block or prevent those activities.</td>
               </tr>
               <tr>
                  <td>hybrid hard drive</td>
                  <td>Non-volatile magnetic media that uses a cache to increase read/write speeds and reduce boot times. The cache is normally non-volatile flash memory media.</td>
               </tr>
               <tr>
                  <td>ICT equipment</td>
                  <td>Any device that can process, store or communicate data, such as computers, multifunction devices, network devices, smartphones, digital cameras, electronic storage media, smart devices and other radio devices.</td>
               </tr>
               <tr>
                  <td>incident response plan</td>
                  <td>A document that describes the plan for responding to cyber security incidents.</td>
               </tr>
               <tr>
                  <td>Infosec Registered Assessors Program</td>
                  <td>An initiative of the Australian Cyber Security Centre designed to register suitably qualified individuals to carry out security assessments for systems.</td>
               </tr>
               <tr>
                  <td>infrared device</td>
                  <td>Devices such as mice, keyboards and pointing devices that have an infrared communications capability.</td>
               </tr>
               <tr>
                  <td>integrity</td>
                  <td>The assurance that data has been created, amended or deleted only by authorised individuals.</td>
               </tr>
               <tr>
                  <td>interactive authentication</td>
                  <td>Authentication that involves the interaction of a person with a system.</td>
               </tr>
               <tr>
                  <td>Internet Protocol Security</td>
                  <td>A suite of protocols for secure communications through authentication or encryption of Internet Protocol (IP) packets as well as including protocols for cryptographic key establishment.</td>
               </tr>
               <tr>
                  <td>Internet Protocol telephony</td>
                  <td>The transport of telephone calls over IP networks.</td>
               </tr>
               <tr>
                  <td>Internet Protocol version 6</td>
                  <td>A protocol used for communicating over packet switched networks. Version 6 is the successor to version 4 which is widely used on the internet.</td>
               </tr>
               <tr>
                  <td>Intrusion Detection System</td>
                  <td>An automated system used to identify an infringement of security policy. IDS can be host-based or network-based.</td>
               </tr>
               <tr>
                  <td>jump server</td>
                  <td>A computer which is used to manage important or critical resources in a separate security domain. Also known as a jump host or jump box.</td>
               </tr>
               <tr>
                  <td>keying material</td>
                  <td>Cryptographic keys generated or used by cryptographic equipment or software.</td>
               </tr>
               <tr>
                  <td>key management</td>
                  <td>The use and management of cryptographic keys and associated hardware and software. It includes their generation, registration, distribution, installation, usage, protection, storage, access, recovery and destruction.</td>
               </tr>
               <tr>
                  <td>lockable commercial cabinet</td>
                  <td>A cabinet that is commercially available, of robust construction and is fitted with a commercial lock.</td>
               </tr>
               <tr>
                  <td>logging facility</td>
                  <td>A facility that includes software which generates events and their associated details, the transmission (if necessary) of event logs, and how they are stored.</td>
               </tr>
               <tr>
                  <td>malicious code</td>
                  <td>Any software that attempts to subvert the confidentiality, integrity or availability of a system.</td>
               </tr>
               <tr>
                  <td>malicious code infection</td>
                  <td>The occurrence of malicious code infecting a system.</td>
               </tr>
               <tr>
                  <td>media</td>
                  <td>A generic term for hardware, often portable in nature, which is used to store data.</td>
               </tr>
               <tr>
                  <td>media destruction</td>
                  <td>The process of physically damaging media with the intent of making data stored on it inaccessible. To destroy media effectively, only the actual material in which data is stored needs to be destroyed.</td>
               </tr>
               <tr>
                  <td>media disposal</td>
                  <td>The process of relinquishing control of media when it is no longer required.</td>
               </tr>
               <tr>
                  <td>media sanitisation</td>
                  <td>The process of erasing or overwriting data stored on media so that it cannot be retrieved or reconstructed.</td>
               </tr>
               <tr>
                  <td>memory-safe programming languages</td>
                  <td>Programming languages that prevent the introduction of security vulnerabilities related to memory use. Examples of memory-safe programming languages include C#, Go, Java, Ruby, Rust and Swift. Examples of non-memory-safe programming languages include Assembly and C/C++.</td>
               </tr>
               <tr>
                  <td>metadata</td>
                  <td>Descriptive data about the content and context used to identify data.</td>
               </tr>
               <tr>
                  <td>mobile device</td>
                  <td>A portable computing or communications device. For example, smartphones, tablets and laptops.</td>
               </tr>
               <tr>
                  <td>multifunction device</td>
                  <td>ICT equipment that combines printing, scanning, copying, faxing or voice messaging functionality in the one device. These devices are often designed to connect to computer and telephone networks simultaneously.</td>
               </tr>
               <tr>
                  <td>need-to-know</td>
                  <td>The principle of restricting an individual’s access to only the data they require to fulfil the duties of their role.</td>
               </tr>
               <tr>
                  <td>network access control</td>
                  <td>Security policies used to control access to a network and actions on a network. This can include authentication checks and authorisation controls.</td>
               </tr>
               <tr>
                  <td>network device</td>
                  <td>ICT equipment designed to facilitate the communication of data. For example, routers, switches and wireless access points.</td>
               </tr>
               <tr>
                  <td>network infrastructure</td>
                  <td>The infrastructure used to carry data between workstations and servers or other network devices.</td>
               </tr>
               <tr>
                  <td>network management traffic</td>
                  <td>Network traffic generated by system administrators over a network in order to control workstations and servers. This includes standard management protocols and other network traffic that contains data relating to the management of the network.</td>
               </tr>
               <tr>
                  <td>non-interactive authentication</td>
                  <td>Authentication between systems or services that does not involve the interaction of a person.</td>
               </tr>
               <tr>
                  <td>non-repudiation</td>
                  <td>Providing proof that a user performed an action, and in doing so preventing a user from denying that they did so.</td>
               </tr>
               <tr>
                  <td>non-volatile flash memory media</td>
                  <td>A specific type of electrically erasable programmable read-only memory.</td>
               </tr>
               <tr>
                  <td>non-volatile media</td>
                  <td>A type of media which retains its data when power is removed.</td>
               </tr>
               <tr>
                  <td>off-hook audio protection</td>
                  <td>A method of mitigating the possibility of an active handset inadvertently allowing background discussions to be heard by a remote party. This can be achieved through the use of a hold feature, mute feature, push-to-talk handset or equivalent.</td>
               </tr>
               <tr>
                  <td>online services</td>
                  <td>Services such as social media, online collaboration tools, web browsing, instant messaging, IP telephony, video conferencing, file sharing websites and peer-to-peer applications.</td>
               </tr>
               <tr>
                  <td>OpenPGP Message Format</td>
                  <td>An open-source implementation of Pretty Good Privacy, a widely available cryptographic toolkit.</td>
               </tr>
               <tr>
                  <td>passphrase</td>
                  <td>A sequence of words used for authentication.</td>
               </tr>
               <tr>
                  <td>password</td>
                  <td>A sequence of characters used for authentication.</td>
               </tr>
               <tr>
                  <td>password complexity</td>
                  <td>The use of different character sets, such as lower-case alphabetical characters (a-z), upper-case alphabetical characters (A-Z), numeric characters (0-9) and special characters.</td>
               </tr>
               <tr>
                  <td>patch</td>
                  <td>A piece of software designed to remedy security vulnerabilities, or improve the usability or performance of software and ICT equipment.</td>
               </tr>
               <tr>
                  <td>patch cable</td>
                  <td>A metallic (copper) or fibre-optic cable used for routing signals between two components in an enclosed container or rack.</td>
               </tr>
               <tr>
                  <td>patch panel</td>
                  <td>A group of sockets or connectors that allow manual configuration changes, generally by means of connecting patch cables.</td>
               </tr>
               <tr>
                  <td>penetration test</td>
                  <td>A penetration test is designed to exercise real-world scenarios in an attempt to achieve a specific goal, such as compromising critical systems or data.</td>
               </tr>
               <tr>
                  <td>Perfect Forward Secrecy</td>
                  <td>Additional security for security associations ensuring that if one security association is compromised subsequent security associations will not be compromised.</td>
               </tr>
               <tr>
                  <td>peripheral switch</td>
                  <td>A device used to share a set of peripherals between multiple computers. For example, a keyboard, video monitor and mouse.</td>
               </tr>
               <tr>
                  <td>plan of action and milestones</td>
                  <td>A document that describes security vulnerabilities in a system and the plans for their rectification.</td>
               </tr>
               <tr>
                  <td>position of trust</td>
                  <td>A position that involves duties that require a higher level of assurance than that provided by normal employment screening. In some cases additional screening may be required. Positions of trust can include, but are not limited to, an organisation’s Chief Information Security Officer and their delegates, system administrators or privileged users.</td>
               </tr>
               <tr>
                  <td>privileged accounts</td>
                  <td>Privileged accounts include privileged user accounts and privileged service accounts.</td>
               </tr>
               <tr>
                  <td>privileged operating environments</td>
                  <td>Privileged operating environments are those used exclusively for administrative activities.</td>
               </tr>
               <tr>
                  <td>privileged user</td>
                  <td>A user who can alter or circumvent a system’s controls. This can also apply to users who could have only limited privileges, such as software developers, who can still bypass controls. A privileged user can have the capability to modify system configurations, account privileges, event logs and security configurations for applications.</td>
               </tr>
               <tr>
                  <td>product</td>
                  <td>A generic term used to describe software or hardware.</td>
               </tr>
               <tr>
                  <td>PROTECTED area</td>
                  <td>An area that has been authorised to process, store or communicate PROTECTED data. Such areas are not necessarily tied to a specific level of security zone.</td>
               </tr>
               <tr>
                  <td>Protection Profile</td>
                  <td>A document that stipulates the security functionality that must be included in Common Criteria evaluation to meet a range of defined threats. Protection Profiles also define the activities to be taken to assess the security function of an evaluated product.</td>
               </tr>
               <tr>
                  <td>protective marking</td>
                  <td>An administrative label assigned to data that not only shows the value of the data but also defines the level of protection to be provided.</td>
               </tr>
               <tr>
                  <td>public data</td>
                  <td>Data that has been formally authorised for release into the public domain.</td>
               </tr>
               <tr>
                  <td>public network infrastructure</td>
                  <td>Network infrastructure that an organisation has no control over, such as the internet.</td>
               </tr>
               <tr>
                  <td>Public Switched Telephone Network</td>
                  <td>Public network infrastructure used for voice communications.</td>
               </tr>
               <tr>
                  <td>push-to-talk handsets</td>
                  <td>Handsets that have a button which is pressed by the user before audio can be communicated, thus providing off-hook audio protection.</td>
               </tr>
               <tr>
                  <td>quality of service</td>
                  <td>The ability to provide different priorities to different applications, users or data flows, or to guarantee a certain level of performance to a data flow.</td>
               </tr>
               <tr>
                  <td>Radio Frequency transmitter</td>
                  <td>A device designed to transmit electromagnetic radiation as part of a radio communication system.</td>
               </tr>
               <tr>
                  <td>reclassification</td>
                  <td>An administrative decision to change the controls used to protect data based on a reassessment of the potential impact of its unauthorised disclosure. The lowering of the controls for media containing sensitive or classified data often requires sanitisation or destruction processes to be undertaken prior to a formal decision to lower the controls protecting the data.</td>
               </tr>
               <tr>
                  <td>Releasable To data</td>
                  <td>Data not to be passed to, or accessed by, foreign nationals beyond those belonging to specific nations which the data has been authorised for release to.</td>
               </tr>
               <tr>
                  <td>remote access</td>
                  <td>Access to a system that originates from outside an organisation’s network and enters the network through a gateway, including over the internet.</td>
               </tr>
               <tr>
                  <td>removable media</td>
                  <td>Storage media that can be easily removed from a system and is designed for removal, such as Universal Serial Bus flash drives and optical media.</td>
               </tr>
               <tr>
                  <td>seconded foreign national</td>
                  <td>A representative of a foreign government on exchange or long-term posting.</td>
               </tr>
               <tr>
                  <td>SECRET area</td>
                  <td>An area that has been authorised to process, store or communicate SECRET data. Such areas are not necessarily tied to a specific level of security zone.</td>
               </tr>
               <tr>
                  <td>secure-by-default</td>
                  <td>A software development principle whereby products and services are configured for maximum security by default.</td>
               </tr>
               <tr>
                  <td>secure-by-design</td>
                  <td>A software development principle whereby security is designed into every stage of a product or service’s development.</td>
               </tr>
               <tr>
                  <td>secured space</td>
                  <td>An area certified to the physical security requirements for a Security Zone Two to Security Zone Five area, as defined in the Attorney-General’s Department’s <a href="#92679127-f61d-486a-a93e-df2a26dfb07a">Protective Security Policy Framework</a>, <a href="#5424f156-70cd-4ff9-a80e-ff459706bf55">Entity facilities</a> policy, to allow for the processing or storage of sensitive or classified data.</td>
               </tr>
               <tr>
                  <td>Secure/Multipurpose Internet Mail Extension</td>
                  <td>A protocol which allows the encryption and signing of email messages.</td>
               </tr>
               <tr>
                  <td>Secure Shell</td>
                  <td>A network protocol that can be used to securely log into, execute commands on, and transfer files between remote workstations and servers.</td>
               </tr>
               <tr>
                  <td>security assessment</td>
                  <td>An activity undertaken to assess controls for a system and its environment to determine if they have been implemented correctly and are operating as intended.</td>
               </tr>
               <tr>
                  <td>security assessment report</td>
                  <td>A document that describes that outcomes of a security assessment and contributes to the development of a plan of action and milestones.</td>
               </tr>
               <tr>
                  <td>security association</td>
                  <td>A collection of connection-specific parameters used for IPsec connections.</td>
               </tr>
               <tr>
                  <td>security association lifetime</td>
                  <td>The duration a security association is valid for.</td>
               </tr>
               <tr>
                  <td>Security Construction and Equipment Committee</td>
                  <td>An Australian Government interdepartmental committee responsible for the evaluation and endorsement of security equipment and services. The committee is chaired by the Australian Security Intelligence Organisation.</td>
               </tr>
               <tr>
                  <td>security documentation</td>
                  <td>An organisation’s cyber security strategy; system-specific security documentation; and any supporting diagrams, plans, policies, processes, procedures and registers.</td>
               </tr>
               <tr>
                  <td>security domain</td>
                  <td>A system or collection of systems operating under a consistent security policy that defines the classification, releasability and special handling caveats for data processed within the domain.</td>
               </tr>
               <tr>
                  <td>security posture</td>
                  <td>The level of security risk to which a system is exposed. A system with a strong security posture is exposed to a low level of security risk while a system with a weak security posture is exposed to a high level of security risk.</td>
               </tr>
               <tr>
                  <td>security risk</td>
                  <td>Any event that could result in the compromise, loss of integrity or unavailability of data or resources, or deliberate harm to people measured in terms of its likelihood and consequences.</td>
               </tr>
               <tr>
                  <td>security risk appetite</td>
                  <td>Statements that communicate the expectations of an organisation’s senior management about their security risk tolerance. These criteria help an organisation identify security risks, prepare appropriate treatments and provide a benchmark against which the success of mitigations can be measured.</td>
               </tr>
               <tr>
                  <td>security risk management</td>
                  <td>The process of identifying, assessing and taking steps to reduce security risks to an acceptable level.</td>
               </tr>
               <tr>
                  <td>security target</td>
                  <td>An artefact of Common Criteria evaluations that specifies conformance claims, threats and assumptions, security objectives, and security requirements for an evaluated product.</td>
               </tr>
               <tr>
                  <td>security vulnerability</td>
                  <td>A weakness in a system’s security requirements, design, implementation or operation that could be accidentally triggered or intentionally exploited and result in a violation of the system’s security policy.</td>
               </tr>
               <tr>
                  <td>sensitive data</td>
                  <td>Data that would cause limited damage to the national interest, an organisation or an individual if compromised.</td>
               </tr>
               <tr>
                  <td>server</td>
                  <td>A computer that provides services to users or other systems. For example, a file server, email server or database server.</td>
               </tr>
               <tr>
                  <td>service accounts</td>
                  <td>User accounts that are used to perform automated tasks without manual intervention, such as machine to machine communications. Service accounts will typically be configured to disallow interactive logins.</td>
               </tr>
               <tr>
                  <td>shared facility</td>
                  <td>Where an organisation’s facility resides within a larger facility that is shared with one or more different organisations.</td>
               </tr>
               <tr>
                  <td>shared responsibility model</td>
                  <td>A framework that describes the management and operational responsibilities between different parties for a system. Where responsibilities relating to specific controls are shared between multiple parties, enough detail is documented to provide clear demarcation between the parties.</td>
               </tr>
               <tr>
                  <td>softphone</td>
                  <td>An application that allows a workstation to act as a phone using a built-in or externally-connected microphone and speaker.</td>
               </tr>
               <tr>
                  <td>software</td>
                  <td>An element of a system including, but not limited to, an application or operating system.</td>
               </tr>
               <tr>
                  <td>solid state drive</td>
                  <td>Non-volatile media that uses non-volatile flash memory media to retain its data when power is removed and, unlike non-volatile magnetic media, contains no moving parts.</td>
               </tr>
               <tr>
                  <td>split tunnelling</td>
                  <td>Functionality that allows personnel to access both public network infrastructure and a Virtual Private Network connection at the same time, such as an organisation’s system and the internet.</td>
               </tr>
               <tr>
                  <td>Standard Operating Environment</td>
                  <td>A standardised build of an operating system and associated software that can be used for servers, workstations, laptops and mobile devices.</td>
               </tr>
               <tr>
                  <td>Standard Operating Procedure</td>
                  <td>Instructions for following a defined set of activities in a specific manner. For example, an approved data transfer process.</td>
               </tr>
               <tr>
                  <td>supplier</td>
                  <td>Organisations, such as application developers, ICT equipment manufacturers and service providers, that provide products and services. Suppliers can also include other organisations involved in distribution channels.</td>
               </tr>
               <tr>
                  <td>system</td>
                  <td>A related set of hardware and software used for the processing, storage or communication of data and the governance framework in which it operates.</td>
               </tr>
               <tr>
                  <td>system owner</td>
                  <td>The executive responsible for a system.</td>
               </tr>
               <tr>
                  <td>system classification</td>
                  <td>The classification of a system is the highest classification of data which the system is authorised to store, process or communicate.</td>
               </tr>
               <tr>
                  <td>system security plan</td>
                  <td>A document that describes a system and its associated controls.</td>
               </tr>
               <tr>
                  <td>system-specific security documentation</td>
                  <td>A system’s system security plan, incident response plan, continuous monitoring plan, security assessment report, and plan of action and milestones.</td>
               </tr>
               <tr>
                  <td>telemetry</td>
                  <td>The automatic measurement and transmission of data collected from remote sources. Such data is often used within systems to measure the use, performance and health of one or more functions or devices that make up the system.</td>
               </tr>
               <tr>
                  <td>telephone</td>
                  <td>A device that is used for point-to-point communication over a distance. This includes digital and IP telephony.</td>
               </tr>
               <tr>
                  <td>telephone system</td>
                  <td>A system designed primarily for the transmission of voice communications.</td>
               </tr>
               <tr>
                  <td>TOP SECRET area</td>
                  <td>An area that has been authorised to process, store or communicate TOP SECRET data. Such areas are not necessarily tied to a specific level of security zone.</td>
               </tr>
               <tr>
                  <td>Transfer Cross Domain Solution</td>
                  <td>A system that facilitates the transfer of data, in one or multiple directions (low to high or high to low), between different security domains.</td>
               </tr>
               <tr>
                  <td>transport mode</td>
                  <td>An IPsec mode that provides a secure connection between two endpoints by encapsulating an IP payload.</td>
               </tr>
               <tr>
                  <td>trusted source</td>
                  <td>A person or system formally identified as being capable of reliably producing data meeting certain defined parameters, such as a maximum data classification and reliably reviewing data produced by others to confirm compliance with certain defined parameters.</td>
               </tr>
               <tr>
                  <td>tunnel mode</td>
                  <td>An IPsec mode that provides a secure connection between two endpoints by encapsulating an entire IP packet.</td>
               </tr>
               <tr>
                  <td>unprivileged accounts</td>
                  <td>Unprivileged accounts include unprivileged user accounts and unprivileged service accounts.</td>
               </tr>
               <tr>
                  <td>unprivileged operating environments</td>
                  <td>Unprivileged operating environments are those used for non-administrative activities, such as reading emails and browsing the web.</td>
               </tr>
               <tr>
                  <td>unsecured space</td>
                  <td>An area not been certified to the physical security requirements for a Security Zone Two to Security Zone Five area, as defined in the Attorney-General’s Department’s <a href="#92679127-f61d-486a-a93e-df2a26dfb07a">Protective Security Policy Framework</a>, <a href="#5424f156-70cd-4ff9-a80e-ff459706bf55">Entity facilities</a> policy, to allow for the processing or storage of sensitive or classified data.</td>
               </tr>
               <tr>
                  <td>user</td>
                  <td>An individual that is authorised to access a system.</td>
               </tr>
               <tr>
                  <td>user accounts</td>
                  <td>User accounts include privileged user accounts and unprivileged user accounts.</td>
               </tr>
               <tr>
                  <td>validation</td>
                  <td>Confirmation (through the provision of strong, sound, objective evidence) that requirements for a specific intended use or application have been fulfilled.</td>
               </tr>
               <tr>
                  <td>verification</td>
                  <td>Confirmation, through the provision of objective evidence, that specified requirements have been fulfilled.</td>
               </tr>
               <tr>
                  <td>Virtual Local Area Network</td>
                  <td>Network devices and other ICT equipment grouped logically based on resources, security or business requirements instead of their physical location.</td>
               </tr>
               <tr>
                  <td>Virtual Private Network</td>
                  <td>A network that maintains privacy through a tunnelling protocol and security procedures. Virtual Private Networks may use encryption to protect network traffic.</td>
               </tr>
               <tr>
                  <td>virtualisation</td>
                  <td>Simulation of a hardware platform, operating system, application, storage device or network resource.</td>
               </tr>
               <tr>
                  <td>volatile media</td>
                  <td>A type of media, such as random-access memory, which gradually loses its data when power is removed.</td>
               </tr>
               <tr>
                  <td>vulnerability assessment</td>
                  <td>A vulnerability assessment can consist of a documentation-based review of a system’s design, an in-depth hands-on assessment or automated scanning with software tools. In each case, the goal is to identify as many security vulnerabilities as possible.</td>
               </tr>
               <tr>
                  <td>wear levelling</td>
                  <td>A technique used in non-volatile flash memory media to prolong the life of the media. As data can be written to and erased from memory blocks a finite number of times, wear-levelling helps to distribute writes evenly across each memory block, thereby decreasing wear and increasing its lifetime.</td>
               </tr>
               <tr>
                  <td>Wi-Fi Protected Access</td>
                  <td>A protocol designed for communicating data over wireless networks.</td>
               </tr>
               <tr>
                  <td>Wi-Fi Protected Access 2</td>
                  <td>A protocol designed to replace the Wi-Fi Protected Access protocol for communicating data over wireless networks.</td>
               </tr>
               <tr>
                  <td>Wi-Fi Protected Access 3</td>
                  <td>A protocol designed to replace the WPA2 protocol for communicating data over wireless networks.</td>
               </tr>
               <tr>
                  <td>wireless access point</td>
                  <td>A device which enables communications between wireless clients. It is typically also the device which connects wired and wireless networks.</td>
               </tr>
               <tr>
                  <td>wireless communications</td>
                  <td>The transmission of data over a communications path using electromagnetic waves rather than a wired medium.</td>
               </tr>
               <tr>
                  <td>wireless network</td>
                  <td>A network based on the 802.11 standards.</td>
               </tr>
               <tr>
                  <td>workstation</td>
                  <td>A stand-alone or networked single-user computer.</td>
               </tr>
               <tr>
                  <td>X11 Forwarding</td>
                  <td>X11, also known as the X Window System, is a basic method of video display used in a variety of operating systems. X11 Forwarding allows the video display from one device to be shown on another device.</td>
               </tr>
            </table>
            <p/>
         </part>
      </group>
   </group>
   <back-matter>
      <resource uuid="014064b7-5b77-4a79-af6c-79a16f4d0cb2">
         <title>ICT supply chain resource library</title>
         <rlink href="https://www.cisa.gov/ict-supply-chain-resource-library"/>
      </resource>
      <resource uuid="022fcd70-df8b-45ee-ae19-fb9cfe7b6cb6">
         <title>Events to monitor</title>
         <rlink href="https://learn.microsoft.com/en-au/windows-server/identity/ad-ds/plan/appendix-l--events-to-monitor"/>
      </resource>
      <resource uuid="02fb4cb5-e4c4-4097-97a2-f1b6aa04131a">
         <title>Assessing Security Vulnerabilities and Applying Patches</title>
         <rlink href="https://www.cyber.gov.au/acsc/view-all-content/publications/assessing-security-vulnerabilities-and-applying-patches"/>
      </resource>
      <resource uuid="03f761fa-7014-459c-aa16-02c303d50abb">
         <title>reporting security vulnerabilities</title>
         <rlink href="https://www.cyber.gov.au/acsc/report/report-a-cyber-security-vulnerability"/>
      </resource>
      <resource uuid="0508be6f-cb97-44da-b212-42416a0048b0">
         <title>random dice roller</title>
         <rlink href="https://www.random.org/dice/?num=5"/>
      </resource>
      <resource uuid="0c912487-72f0-4532-ba68-705590a63258">
         <title>Reliably Erasing Data From Flash-Based Solid State Drives</title>
         <rlink href="https://www.usenix.org/legacy/event/fast11/tech/full_papers/Wei.pdf"/>
      </resource>
      <resource uuid="0d7243fc-65f0-4b4e-9358-bf4f6e0e34d7">
         <title>Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations</title>
         <rlink href="https://csrc.nist.gov/publications/detail/sp/800-161/rev-1/final"/>
      </resource>
      <resource uuid="0e982561-93dc-4cf7-9a98-e91411e99ca6">
         <title>Bring Your Own Device for Executives</title>
         <rlink href="https://www.cyber.gov.au/acsc/view-all-content/publications/bring-your-own-device-executives"/>
      </resource>
      <resource uuid="131048c7-a2e7-4da3-9257-7a058b06c1f8">
         <title>Secure Administration</title>
         <rlink href="https://www.cyber.gov.au/acsc/view-all-content/publications/secure-administration"/>
      </resource>
      <resource uuid="16c8c2ed-5a37-40ac-a29e-3da92ad398dd">
         <title>Information Security Manual OSCAL catalog - successor version</title>
         <rlink media-type="application/xml"
                 href="https://www.cyber.gov.au/ism/oscal/v2023.03.3/successor-version/artifacts/ISM_catalog.xml"/>
         <rlink media-type="application/json"
                 href="https://www.cyber.gov.au/ism/oscal/v2023.03.3/successor-version/artifacts/ISM_catalog.json"/>
         <rlink media-type="application/oscal+yaml"
                 href="https://www.cyber.gov.au/ism/oscal/v2023.03.3/successor-version/artifacts/ISM_catalog.yaml"/>
      </resource>
      <resource uuid="18203e18-2aca-492e-be44-770b2f47242f">
         <title>AV-TEST</title>
         <rlink href="https://www.av-test.org/en/"/>
      </resource>
      <resource uuid="18274424-7086-419e-9fae-a6ba64870459">
         <title>OWASP Top Ten Proactive Controls</title>
         <rlink href="https://owasp.org/www-project-proactive-controls/"/>
      </resource>
      <resource uuid="188466f6-be12-49ce-b99a-981e54b1663e">
         <title>reporting cybercrime incidents</title>
         <rlink href="https://reportapp.cyber.gov.au/"/>
      </resource>
      <resource uuid="195abe87-bb1e-4006-8b42-eaecca4d51f1">
         <title>Guidelines for Cryptography</title>
         <rlink href="https://www.cyber.gov.au/acsc/view-all-content/advice/guidelines-cryptography"/>
      </resource>
      <resource uuid="197db872-c6a9-4b29-9888-1552e908252c">
         <title>FIPS 140-3 Derived Test Requirements (DTR): CMVP Validation Authority Updates to ISO/IEC 24759</title>
         <rlink href="https://csrc.nist.gov/publications/detail/sp/800-140/final"/>
      </resource>
      <resource uuid="19947ae5-678c-4dc0-a35e-283e4af1284c">
         <title>Supply chain security guidance</title>
         <rlink href="https://www.ncsc.gov.uk/collection/supply-chain-security"/>
      </resource>
      <resource uuid="1e4a57a2-2832-441d-8ea4-12a98d2be417">
         <title>Australian Privacy Principles guidelines</title>
         <rlink href="https://www.oaic.gov.au/privacy/australian-privacy-principles-guidelines"/>
      </resource>
      <resource uuid="1ecfc41e-f6a8-4c96-ac41-1587718ca459">
         <title>Network Infrastructure Security Guide</title>
         <rlink href="https://www.nsa.gov/Press-Room/News-Highlights/Article/Article/2949885/nsa-details-network-infrastructure-best-practices/"/>
      </resource>
      <resource uuid="1eefdaf7-3991-4ba2-9439-79565f508c44">
         <title>Guidelines for Data Transfers</title>
         <rlink href="https://www.cyber.gov.au/acsc/view-all-content/advice/guidelines-data-transfers"/>
      </resource>
      <resource uuid="219fa690-b9c0-4e76-9333-d5136a5582d1">
         <title>Information Security Manual OSCAL catalog - latest version</title>
         <rlink media-type="application/xml"
                 href="https://www.cyber.gov.au/ism/oscal/latest-version/artifacts/ISM_catalog.xml"/>
         <rlink media-type="application/json"
                 href="https://www.cyber.gov.au/ism/oscal/latest-version/artifacts/ISM_catalog.json"/>
         <rlink media-type="application/oscal+yaml"
                 href="https://www.cyber.gov.au/ism/oscal/latest-version/artifacts/ISM_catalog.yaml"/>
      </resource>
      <resource uuid="22ed0344-d91c-43e9-80e0-adfed1aa0851">
         <title>Information Security Manual OSCAL catalog - predecessor version</title>
         <rlink media-type="application/xml"
                 href="https://www.cyber.gov.au/ism/oscal/v2023.03.3/predecessor-version/artifacts/ISM_catalog.xml"/>
         <rlink media-type="application/json"
                 href="https://www.cyber.gov.au/ism/oscal/v2023.03.3/predecessor-version/artifacts/ISM_catalog.json"/>
         <rlink media-type="application/oscal+yaml"
                 href="https://www.cyber.gov.au/ism/oscal/v2023.03.3/predecessor-version/artifacts/ISM_catalog.yaml"/>
      </resource>
      <resource uuid="23d977b2-e64e-4ebc-a59f-cd95212045c5">
         <title>Implementing Network Segmentation and Segregation</title>
         <rlink href="https://www.cyber.gov.au/acsc/view-all-content/publications/implementing-network-segmentation-and-segregation"/>
      </resource>
      <resource uuid="24eb9af8-fb43-4772-a461-2c36dd0f6d7e">
         <title>recommended contents for a ‘security.txt’ file</title>
         <rlink href="https://securitytxt.org/"/>
      </resource>
      <resource uuid="26137381-dc34-485c-8331-3bc9876ed48c">
         <title>Software Memory Safety</title>
         <rlink href="https://www.nsa.gov/Press-Room/News-Highlights/Article/Article/3215760/nsa-releases-guidance-on-how-to-protect-against-software-memory-safety-issues/"/>
      </resource>
      <resource uuid="28cd91d2-e5cb-4896-bcfc-abb32e05e61d">
         <title>Cryptographic Module Validation Program</title>
         <rlink href="https://csrc.nist.gov/projects/cryptographic-module-validation-program"/>
      </resource>
      <resource uuid="29b04eaf-5f57-4ea1-a453-8047826dccf5">
         <title>Certified Products List</title>
         <rlink href="https://commoncriteriaportal.org/products/"/>
      </resource>
      <resource uuid="315744ea-3523-4c93-838d-fe2848ac4181">
         <title>Guide to Bluetooth Security</title>
         <rlink href="https://csrc.nist.gov/publications/detail/sp/800-121/rev-2/final"/>
      </resource>
      <resource uuid="32c8fa3a-45bb-4f88-baee-73a7696aa2ad">
         <title>Security Requirements for Cryptographic Modules</title>
         <rlink href="https://csrc.nist.gov/publications/detail/fips/140/3/final"/>
      </resource>
      <resource uuid="33d26cdd-51fc-45d3-a026-0814d51a4c7e">
         <title>Security Recommendations for Server-based Hypervisor Platforms</title>
         <rlink href="https://csrc.nist.gov/publications/detail/sp/800-125a/rev-1/final"/>
      </resource>
      <resource uuid="347eee88-cb61-44b9-81ce-ab97dd08387c">
         <title>Cloud Computing Security for Cloud Service Providers</title>
         <rlink href="https://www.cyber.gov.au/acsc/view-all-content/publications/cloud-computing-security-cloud-service-providers"/>
      </resource>
      <resource uuid="348be728-4459-4447-990e-1dfb3049c71f">
         <title>data retention</title>
         <rlink href="https://www.naa.gov.au/information-management/records-authorities/types-records-authorities/afda-express-version-2-functions"/>
      </resource>
      <resource uuid="355b47b5-6253-4be5-ba7c-274833d84b75">
         <title>ROA records</title>
         <rlink href="https://www.apnic.net/community/security/resource-certification/#routing"/>
      </resource>
      <resource uuid="37f65b5b-ce8c-4137-9c84-41678af1e70e">
         <title>Cyber Supply Chain Risk Management</title>
         <rlink href="https://www.cyber.gov.au/acsc/view-all-content/publications/cyber-supply-chain-risk-management"/>
      </resource>
      <resource uuid="39e186f3-d175-4eed-afe6-2b9a7a936a91">
         <title>MemtestG80</title>
         <rlink href="https://github.com/ihaque/memtestG80"/>
      </resource>
      <resource uuid="3a1a00f6-2f56-4d04-b99d-6f1682b95a98">
         <title>detect or prevent various stages of network intrusions</title>
         <rlink href="https://attackevals.mitre-engenuity.org/"/>
      </resource>
      <resource uuid="3a7b903b-ed0d-450d-9123-60f6f8fd5dd2">
         <title>Guidelines for Communications Systems</title>
         <rlink href="https://www.cyber.gov.au/acsc/view-all-content/advice/guidelines-communications-systems"/>
      </resource>
      <resource uuid="3ccea9a8-a728-4f5b-a0a8-43f2f206f76b">
         <title>Restricting Administrative Privileges</title>
         <rlink href="https://www.cyber.gov.au/acsc/view-all-content/publications/restricting-administrative-privileges"/>
      </resource>
      <resource uuid="3df21b72-0559-4bbf-a990-5ee509f70747">
         <title>gateway security guidance package</title>
         <rlink href="https://www.cyber.gov.au/acsc/government/gateway-security-guidance"/>
      </resource>
      <resource uuid="3e4cd135-5fa3-4a1e-a192-1793ff42067c">
         <title>Access to information</title>
         <rlink href="https://www.protectivesecurity.gov.au/publications-library/policy-9-access-information"/>
      </resource>
      <resource uuid="3e5a98e5-9219-46c8-81c2-e3a4d13407ce">
         <title>AD Forest Recovery - Resetting the krbtgt password</title>
         <rlink href="https://learn.microsoft.com/en-au/windows-server/identity/ad-ds/manage/ad-forest-recovery-resetting-the-krbtgt-password"/>
      </resource>
      <resource uuid="3ec0f0b2-5565-46ad-a1e8-e39cb2219bd2">
         <title>The Trustworthy Computing Security Development Lifecycle</title>
         <rlink href="https://learn.microsoft.com/en-au/previous-versions/ms995349(v=msdn.10)"/>
      </resource>
      <resource uuid="3f349d16-11a1-459a-a299-c9446aea7597">
         <title>Guidelines for Database Systems</title>
         <rlink href="https://www.cyber.gov.au/acsc/view-all-content/advice/guidelines-database-systems"/>
      </resource>
      <resource uuid="401ed034-e2bd-43b4-9fde-05d07618039a">
         <title>Center for Memory and Recording Research</title>
         <rlink href="https://cmrr.ucsd.edu/resources/secure-erase.html"/>
      </resource>
      <resource uuid="42e7d99d-9709-4355-a54d-98959c552aa1">
         <title>Cryptographic Algorithm Validation Program</title>
         <rlink href="https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program"/>
      </resource>
      <resource uuid="436de247-4c95-4449-89a4-fec912605e7d">
         <title>OWASP Top 10</title>
         <rlink href="https://owasp.org/www-project-top-ten/"/>
      </resource>
      <resource uuid="45899752-c83f-4976-bc99-03f6824a0793">
         <title>How to Manage Your Security When Engaging a Managed Service Provider</title>
         <rlink href="https://www.cyber.gov.au/acsc/view-all-content/publications/how-manage-your-security-when-engaging-managed-service-provider"/>
      </resource>
      <resource uuid="4a3a265f-7772-433b-9906-7f784052f28b">
         <title>recommended driver block rules</title>
         <rlink href="https://learn.microsoft.com/en-au/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-driver-block-rules"/>
      </resource>
      <resource uuid="4b0f2fa7-f9d6-48d8-b14c-527939808882">
         <title>Trustworthy Email</title>
         <rlink href="https://csrc.nist.gov/publications/detail/sp/800-177/rev-1/final"/>
      </resource>
      <resource uuid="4deea7ea-18a2-4fd7-8b25-0b3603215df2">
         <title>Guidelines for Physical Security</title>
         <rlink href="https://www.cyber.gov.au/acsc/view-all-content/advice/guidelines-physical-security"/>
      </resource>
      <resource uuid="4defa9a8-c5f5-4b39-8b0a-537f14d9d14d">
         <title>Guidelines for Communications Infrastructure</title>
         <rlink href="https://www.cyber.gov.au/acsc/view-all-content/advice/guidelines-communications-infrastructure"/>
      </resource>
      <resource uuid="4ea4e1e9-09f5-46c2-b003-352bc862d5ed">
         <title>Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy</title>
         <rlink href="https://csrc.nist.gov/publications/detail/sp/800-37/rev-2/final"/>
      </resource>
      <resource uuid="4eeff329-cea0-4baf-a80b-8b0b76436075">
         <title>Implementing Application Control</title>
         <rlink href="https://www.cyber.gov.au/acsc/view-all-content/publications/implementing-application-control"/>
      </resource>
      <resource uuid="506198a8-7ae8-4c95-8b7b-2a4833cfab4b">
         <title>Guidelines for Software Development</title>
         <rlink href="https://www.cyber.gov.au/acsc/view-all-content/advice/guidelines-software-development"/>
      </resource>
      <resource uuid="53da8dba-961e-4222-94e0-68cb9510384d">
         <title>digital preservation planning</title>
         <rlink href="https://www.naa.gov.au/information-management/information-management-legislation/digital-preservation-planning"/>
      </resource>
      <resource uuid="5424f156-70cd-4ff9-a80e-ff459706bf55">
         <title>Entity facilities</title>
         <rlink href="https://www.protectivesecurity.gov.au/publications-library/policy-16-entity-facilities"/>
      </resource>
      <resource uuid="55038d94-7587-4234-a18c-fb459fcdb295">
         <title>Domain Name System-Based Electronic Mail Security</title>
         <rlink href="https://csrc.nist.gov/publications/detail/sp/1800-6/final"/>
      </resource>
      <resource uuid="578d0434-6b3f-46f3-aad8-c7ac75c2ebcc">
         <title>Guidelines for Security Documentation</title>
         <rlink href="https://www.cyber.gov.au/acsc/view-all-content/advice/guidelines-security-documentation"/>
      </resource>
      <resource uuid="5796c2ee-4dbc-4084-ae80-2febc26d5807">
         <title>Travelling Overseas with Electronic Devices</title>
         <rlink href="https://www.cyber.gov.au/acsc/view-all-content/publications/travelling-overseas-electronic-devices"/>
      </resource>
      <resource uuid="57c58870-2ebb-4fce-b995-0c86cb64002f">
         <title>AISEP</title>
         <rlink href="https://www.cyber.gov.au/acsc/view-all-content/programs/australian-information-security-evaluation-program"/>
      </resource>
      <resource uuid="58282062-5c17-476a-98b1-105a627cd28d">
         <title>randomly generating passphrases</title>
         <rlink href="https://www.eff.org/dice"/>
      </resource>
      <resource uuid="58c9abfb-58fe-416e-a279-dfbfe123c99f">
         <title>Hardening Microsoft 365, Office 2021, Office 2019 and Office 2016</title>
         <rlink href="https://www.cyber.gov.au/acsc/view-all-content/publications/hardening-microsoft-365-office-2021-office-2019-and-office-2016"/>
      </resource>
      <resource uuid="5a2ed3ef-afcc-485e-8014-5107e9ed97e3">
         <title>recommended block rules</title>
         <rlink href="https://learn.microsoft.com/en-au/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-block-rules"/>
      </resource>
      <resource uuid="5d217b62-2aa7-4d9c-93cc-da3916279802">
         <title>Risk management – Guidelines</title>
         <rlink href="https://www.iso.org/standard/65694.html"/>
      </resource>
      <resource uuid="6136b137-0cc9-4d21-94ee-0abfac2b4e18">
         <title>Malicious Email Mitigation Strategies</title>
         <rlink href="https://www.cyber.gov.au/acsc/view-all-content/publications/malicious-email-mitigation-strategies"/>
      </resource>
      <resource uuid="616fce77-495b-472a-a552-7593ab64f188">
         <title>Security Configuration Guide – Samsung Galaxy S10, S20 and Note 20 Devices</title>
         <rlink href="https://www.cyber.gov.au/acsc/view-all-content/publications/security-configuration-guide-samsung-galaxy-s10-s20-and-note-20-devices"/>
      </resource>
      <resource uuid="626d3582-3caf-49d6-89d5-4b8fdbbf1f31">
         <title>reporting cyber security incidents</title>
         <rlink href="https://www.cyber.gov.au/acsc/report/report-a-cyber-security-incident"/>
      </resource>
      <resource uuid="626dab35-81ab-45fe-8c12-0faff1c23c07">
         <title>Guidelines for Cyber Security Roles</title>
         <rlink href="https://www.cyber.gov.au/acsc/view-all-content/advice/guidelines-cyber-security-roles"/>
      </resource>
      <resource uuid="629818d8-430c-4125-8fd2-5e3f988fce21">
         <title>MemTest86</title>
         <rlink href="https://www.memtest86.com/"/>
      </resource>
      <resource uuid="63b0d043-b6b3-4e2b-bca8-99b42cfd9904">
         <title>Selecting a Protective DNS Service</title>
         <rlink href="https://www.cisa.gov/uscert/ncas/current-activity/2021/03/04/joint-nsa-and-cisa-guidance-strengthening-cyber-defense-through"/>
      </resource>
      <resource uuid="6455b62e-c7af-4987-b87d-60b9575a59ff">
         <title>Information Security Manual OSCAL catalog</title>
         <rlink media-type="application/xml"
                 href="https://www.cyber.gov.au/ism/oscal/v2023.03.3/artifacts/ISM_catalog.xml"/>
         <rlink media-type="application/json"
                 href="https://www.cyber.gov.au/ism/oscal/v2023.03.3/artifacts/ISM_catalog.json"/>
         <rlink media-type="application/oscal+yaml"
                 href="https://www.cyber.gov.au/ism/oscal/v2023.03.3/artifacts/ISM_catalog.yaml"/>
      </resource>
      <resource uuid="672e85cc-2d40-46ba-9e94-c604b9731c75">
         <title>secure programming practices</title>
         <rlink href="https://www.sei.cmu.edu/our-work/secure-development/index.cfm"/>
      </resource>
      <resource uuid="69c67e26-82cf-426a-8358-0e486b5a9287">
         <title>Risk management – Risk assessment techniques</title>
         <rlink href="https://www.iso.org/standard/72140.html"/>
      </resource>
      <resource uuid="6b4353e0-7281-49f4-a520-f35a4cceec71">
         <title>examples of client-side JavaScript controls</title>
         <rlink href="https://noscript.net/"/>
      </resource>
      <resource uuid="6ba86dff-e078-4896-8884-344e491a9cc4">
         <title>Secure Cloud Strategy</title>
         <rlink href="https://www.dta.gov.au/our-projects/secure-cloud-strategy"/>
      </resource>
      <resource uuid="6e456a92-f405-4151-88ca-5621aa23519b">
         <title>Physical security for entity resources</title>
         <rlink href="https://www.protectivesecurity.gov.au/publications-library/policy-15-physical-security-entity-resources"/>
      </resource>
      <resource uuid="6e801c68-61f6-4c28-bf72-df91f7e232cc">
         <title>Hardening Microsoft Windows 10 version 21H1 Workstations</title>
         <rlink href="https://www.cyber.gov.au/acsc/view-all-content/publications/hardening-microsoft-windows-10-version-21H1-workstations"/>
      </resource>
      <resource uuid="6f1f2f2b-abe6-46e4-9c9d-8339f1d9dab7">
         <title>Secure Software Development Framework (SSDF) Version 1.1: Recommendations for Mitigating the Risk of Software Vulnerabilities</title>
         <rlink href="https://csrc.nist.gov/publications/detail/sp/800-218/final"/>
      </resource>
      <resource uuid="6fac5a84-b86e-405f-b2b3-8c13ecee4a02">
         <title>Privacy Act 1988</title>
         <rlink href="https://www.legislation.gov.au/Series/C2004A03712"/>
      </resource>
      <resource uuid="7000d51a-6cca-40a0-95d9-f1f15048ea68">
         <title>Australian cabling standards and regulations</title>
         <rlink href="https://www.acma.gov.au/cabling-standards-and-regulations"/>
      </resource>
      <resource uuid="70371e26-f3fb-4b05-85ea-7f6e1f2ee184">
         <title>The Minimum Elements For a Software Bill of Materials (SBOM)</title>
         <rlink href="https://www.ntia.doc.gov/report/2021/minimum-elements-software-bill-materials-sbom"/>
      </resource>
      <resource uuid="705a6552-7266-4d4a-9643-77a21c6a2104">
         <title>Data Spill Management Guide</title>
         <rlink href="https://www.cyber.gov.au/acsc/view-all-content/publications/data-spill-management-guide"/>
      </resource>
      <resource uuid="76068c96-8d89-4c37-9eef-03488d5e1b1d">
         <title>Questions to ask Managed Service Providers</title>
         <rlink href="https://www.cyber.gov.au/acsc/view-all-content/publications/questions-ask-managed-service-providers"/>
      </resource>
      <resource uuid="76087ab6-88d4-4610-9a98-6ddc5f7bd7e6">
         <title>OWASP API Security Top 10</title>
         <rlink href="https://owasp.org/www-project-api-security/"/>
      </resource>
      <resource uuid="78a48231-9963-4f78-962a-861c96c58ead">
         <title>Starting a Vulnerability Disclosure Program</title>
         <rlink href="https://developers.google.com/android/play-protect/starting-a-vdp"/>
      </resource>
      <resource uuid="79f7a013-97a3-44f2-ba90-fcad6c5e4094">
         <title>Information Security Manual</title>
         <prop name="published" value="2023-03-02T00:00:00+10:00"/>
         <prop name="version" value="2023.03.02"/>
         <rlink media-type="application/pdf"
                 href="https://www.cyber.gov.au/ism/pdf/v2023.03.02-pdf"/>
      </resource>
      <resource uuid="7d16ae67-87a7-4861-b939-e13ec279b5a2">
         <title>Guidelines for Personnel Security</title>
         <rlink href="https://www.cyber.gov.au/acsc/view-all-content/advice/guidelines-personnel-security"/>
      </resource>
      <resource uuid="7d22400c-ddef-4cbb-90f1-7502dc569e5b">
         <title>the use of PowerShell by blue teams</title>
         <rlink href="https://devblogs.microsoft.com/powershell/powershell-the-blue-team/"/>
      </resource>
      <resource uuid="7da35efd-7196-4aba-bd79-30c19e8ef48b">
         <title>RPKI</title>
         <rlink href="https://www.apnic.net/community/security/resource-certification/#resource-certification"/>
      </resource>
      <resource uuid="7ffd20ed-4f40-43be-a37b-97e7a1b31e2f">
         <title>The CERT Guide to Coordinated Vulnerability Disclosure</title>
         <rlink href="https://resources.sei.cmu.edu/library/asset-view.cfm?assetid=503330"/>
      </resource>
      <resource uuid="8132c47e-a2dc-4dd9-81d6-38db96e5cec6">
         <title>Hardening Linux Workstations and Servers</title>
         <rlink href="https://www.cyber.gov.au/acsc/view-all-content/publications/hardening-linux-workstations-and-servers"/>
      </resource>
      <resource uuid="81401de7-184d-4535-a3f7-4de1c336630f">
         <title>Guide for Conducting Risk Assessments</title>
         <rlink href="https://csrc.nist.gov/publications/detail/sp/800-30/rev-1/final"/>
      </resource>
      <resource uuid="824e4353-a9ae-4869-88fb-cb0675dc5d1c">
         <title>Mitigating the Use of Stolen Credentials</title>
         <rlink href="https://www.cyber.gov.au/acsc/view-all-content/publications/mitigating-use-stolen-credentials"/>
      </resource>
      <resource uuid="83e3a9b1-5057-4531-91dd-03c8d92634b0">
         <title>Implementing Multi-Factor Authentication</title>
         <rlink href="https://www.cyber.gov.au/acsc/view-all-content/publications/implementing-multi-factor-authentication"/>
      </resource>
      <resource uuid="84d3cbab-ab84-4981-a4f7-2bd469c8deaf">
         <title>the purpose of IRAP</title>
         <rlink href="https://www.cyber.gov.au/acsc/view-all-content/programs/irap"/>
      </resource>
      <resource uuid="85ee803a-b711-443b-98bf-b279de8fbed0">
         <title>Identifying Cyber Supply Chain Risks</title>
         <rlink href="https://www.cyber.gov.au/acsc/view-all-content/publications/identifying-cyber-supply-chain-risks"/>
      </resource>
      <resource uuid="86847be4-3a06-4d2f-9952-447158593e0d">
         <title>Introduction to Cross Domain Solutions</title>
         <rlink href="https://www.cyber.gov.au/acsc/view-all-content/publications/introduction-cross-domain-solutions"/>
      </resource>
      <resource uuid="86b273d9-e9d7-4919-9a41-631a5ae5bf88">
         <title>certification programs</title>
         <rlink href="https://www.wi-fi.org/certification/programs"/>
      </resource>
      <resource uuid="887c65c3-c853-41c6-89d5-3f297108889e">
         <title>Application Container Security Guide</title>
         <rlink href="https://csrc.nist.gov/publications/detail/sp/800-190/final"/>
      </resource>
      <resource uuid="8a0daed2-8840-443f-a83e-68252d2dcdc5">
         <title>Supply Chain Cyber Security: In Safe Hands</title>
         <rlink href="https://www.ncsc.govt.nz/resources/cyber-resilience-guidance/supply-chain/"/>
      </resource>
      <resource uuid="8a965432-7e2e-4020-86e4-b38837f9be60">
         <title>Using the Information Security Manual</title>
         <rlink href="https://www.cyber.gov.au/acsc/view-all-content/advice/using-australian-government-information-security-manual"/>
      </resource>
      <resource uuid="8bb7bf2c-a933-4a80-8ad7-ca4426839c5d">
         <title>Security governance for contracted goods and service providers</title>
         <rlink href="https://www.protectivesecurity.gov.au/publications-library/policy-6-security-governance-contracted-goods-and-service-providers"/>
      </resource>
      <resource uuid="8f1965a9-a6a1-4342-bfb8-797ea358db30">
         <title>Information technology – Security techniques – Vulnerability disclosure</title>
         <rlink href="https://www.iso.org/standard/72311.html"/>
      </resource>
      <resource uuid="8ffea524-0974-4b53-a8f5-41166073ede5">
         <title>Securing PowerShell in the Enterprise</title>
         <rlink href="https://www.cyber.gov.au/acsc/view-all-content/publications/securing-powershell-enterprise"/>
      </resource>
      <resource uuid="91b92563-d991-40fa-9adc-548df9f6c496">
         <title>group Managed Service Accounts</title>
         <rlink href="https://learn.microsoft.com/en-au/azure/active-directory/fundamentals/service-accounts-group-managed"/>
      </resource>
      <resource uuid="92679127-f61d-486a-a93e-df2a26dfb07a">
         <title>Protective Security Policy Framework</title>
         <rlink href="https://www.protectivesecurity.gov.au/"/>
      </resource>
      <resource uuid="941626b7-cfcc-4ab2-83a0-f9a91b2e453e">
         <title>Information security, cybersecurity and privacy protection – Guidance on managing information security risks</title>
         <rlink href="https://www.iso.org/standard/80585.html"/>
      </resource>
      <resource uuid="96e29819-9d5d-4082-aa0d-b8debe59ef32">
         <title>Risk management – Vocabulary</title>
         <rlink href="https://www.iso.org/standard/44651.html"/>
      </resource>
      <resource uuid="971c6452-6e97-4b4f-b5e4-64e457cb8320">
         <title>Cyber supply chain: An approach to assessing risk</title>
         <rlink href="https://cyber.gc.ca/en/guidance/cyber-supply-chain-approach-assessing-risk-itsap10070"/>
      </resource>
      <resource uuid="98951624-a06e-4d9a-96a3-f89ac944bcaa">
         <title>Protecting Against Business Email Compromise</title>
         <rlink href="https://www.cyber.gov.au/acsc/view-all-content/publications/protecting-against-business-email-compromise"/>
      </resource>
      <resource uuid="99c117f0-78e0-4196-adc8-705405d996bc">
         <title>Information technology – Security techniques – Vulnerability handling processes</title>
         <rlink href="https://www.iso.org/standard/69725.html"/>
      </resource>
      <resource uuid="9a69d597-080f-4d03-b32b-d926f0b87e33">
         <title>Good Practice Guide on Vulnerability Disclosure</title>
         <rlink href="https://www.enisa.europa.eu/publications/vulnerability-disclosure"/>
      </resource>
      <resource uuid="9a8f5a63-bcd5-45a8-9f9c-974fc796ac95">
         <title>Guidelines for Enterprise Mobility</title>
         <rlink href="https://www.cyber.gov.au/acsc/view-all-content/advice/guidelines-enterprise-mobility"/>
      </resource>
      <resource uuid="9d38f42d-eeff-4124-93db-4b29abaafb67">
         <title>MemtestCL</title>
         <rlink href="https://github.com/ihaque/memtestCL"/>
      </resource>
      <resource uuid="a07c439d-b2f4-4ee2-b56e-f17000f3722f">
         <title>Information technology – Security techniques – Security requirements for cryptographic modules</title>
         <rlink href="https://www.iso.org/standard/52906.html"/>
      </resource>
      <resource uuid="a699a3aa-828d-479b-b50b-98127bb19437">
         <title>Guidelines for Evaluated Products</title>
         <rlink href="https://www.cyber.gov.au/acsc/view-all-content/advice/guidelines-evaluated-products"/>
      </resource>
      <resource uuid="a9b6660b-fc4c-4a08-8db6-1130370b6b09">
         <title>Wi-Fi technologies</title>
         <rlink href="https://www.wi-fi.org/discover-wi-fi"/>
      </resource>
      <resource uuid="aaf83df2-02e3-4f9f-bdf5-33fbff42842d">
         <title>Information technology – Security techniques – Test requirements for cryptographic modules</title>
         <rlink href="https://www.iso.org/standard/72515.html"/>
      </resource>
      <resource uuid="ab73fa95-f213-4041-915e-a8ccbdf74331">
         <title>Guidelines for Email</title>
         <rlink href="https://www.cyber.gov.au/acsc/view-all-content/advice/guidelines-email"/>
      </resource>
      <resource uuid="ae426d0a-adb6-43b8-a463-faa33e83b679">
         <title>Active Directory accounts</title>
         <rlink href="https://learn.microsoft.com/en-au/windows-server/identity/ad-ds/manage/understand-default-user-accounts"/>
      </resource>
      <resource uuid="af0810aa-3486-4ca6-a48a-fad8ce9ac193">
         <title>greater visibility through PowerShell logging</title>
         <rlink href="https://www.mandiant.com/resources/blog/greater-visibility"/>
      </resource>
      <resource uuid="b0a56885-8484-42d6-af79-4c87237ede30">
         <title>NSA/CSS Evaluated Products List for Magnetic Degaussers</title>
         <rlink href="https://www.nsa.gov/Resources/Media-Destruction-Guidance/NSA-Evaluated-Products-Lists-EPLs/"/>
      </resource>
      <resource uuid="b13cb68a-a94a-4a69-b094-b1b68d10239e">
         <title>Domain Name System Security for Domain Resolvers</title>
         <rlink href="https://www.cyber.gov.au/acsc/view-all-content/publications/domain-name-system-security-domain-resolvers"/>
      </resource>
      <resource uuid="b151e338-c42f-41ef-9f99-2cb98f368637">
         <title>Best Practices for Securing Active Directory</title>
         <rlink href="https://learn.microsoft.com/en-au/windows-server/identity/ad-ds/plan/security-best-practices/best-practices-for-securing-active-directory"/>
      </resource>
      <resource uuid="b383a647-7627-4450-99b6-640ae554c2f1">
         <title>Guidelines on Electronic Mail Security</title>
         <rlink href="https://csrc.nist.gov/publications/detail/sp/800-45/version-2/final"/>
      </resource>
      <resource uuid="b3fa2724-3a61-4d68-843a-61cab9e28750">
         <title>Protecting Web Applications and Users</title>
         <rlink href="https://www.cyber.gov.au/acsc/view-all-content/publications/protecting-web-applications-and-users"/>
      </resource>
      <resource uuid="b43b0377-c2e4-4cdc-acec-a9ece7371e36">
         <title>Baseline Security Requirements for Network Security Zones (Version 2.0)</title>
         <rlink href="https://cyber.gc.ca/en/guidance/baseline-security-requirements-network-security-zones-version-20-itsp80022"/>
      </resource>
      <resource uuid="b594c9c0-b42f-4f06-b643-38023275a5c7">
         <title>Guidelines for Media</title>
         <rlink href="https://www.cyber.gov.au/acsc/view-all-content/advice/guidelines-media"/>
      </resource>
      <resource uuid="b6479d9a-43c9-41f2-9dbc-2bb689c8e6d8">
         <title>Anatomy of a Cloud Assessment and Authorisation</title>
         <rlink href="https://www.cyber.gov.au/acsc/view-all-content/publications/anatomy-cloud-assessment-and-authorisation"/>
      </resource>
      <resource uuid="b66f8d23-4209-4775-a1fd-bd4dc299a027">
         <title>Domain Name System Security for Domain Owners</title>
         <rlink href="https://www.cyber.gov.au/acsc/view-all-content/publications/domain-name-system-security-domain-owners"/>
      </resource>
      <resource uuid="b8cdbf18-31cb-4e10-bb43-e8488ee8c2f6">
         <title>Implementing Certificates, TLS, HTTPS and Opportunistic TLS</title>
         <rlink href="https://www.cyber.gov.au/acsc/view-all-content/publications/implementing-certificates-tls-https-and-opportunistic-tls"/>
      </resource>
      <resource uuid="b959caf4-8b60-4b82-9552-963754841bb7">
         <title>Cloud Computing Security for Tenants</title>
         <rlink href="https://www.cyber.gov.au/acsc/view-all-content/publications/cloud-computing-security-tenants"/>
      </resource>
      <resource uuid="bac2c6f2-9356-46d2-b7c4-9af7393008df">
         <title>Australian Privacy Principles</title>
         <rlink href="https://www.oaic.gov.au/privacy/australian-privacy-principles"/>
      </resource>
      <resource uuid="baf3f7d2-750f-43c8-b805-8fc10228a6fd">
         <title>Securing Content Management Systems</title>
         <rlink href="https://www.cyber.gov.au/acsc/view-all-content/publications/securing-content-management-systems"/>
      </resource>
      <resource uuid="bdd11ace-cb4e-470a-92ad-556c79b6c14a">
         <title>a list of current IRAP assessors</title>
         <rlink href="https://www.cyber.gov.au/acsc/view-all-content/programs/irap/irap-assessors"/>
      </resource>
      <resource uuid="bf76a2ec-3cf5-4a02-839a-7b2ea11cb3fc">
         <title>Intelligence Services Act 2001</title>
         <rlink href="https://www.legislation.gov.au/Series/C2004A00928"/>
      </resource>
      <resource uuid="c0558477-3987-493c-99de-eeceff99847d">
         <title>Security of Critical Infrastructure Act 2018</title>
         <rlink href="https://www.legislation.gov.au/Series/C2018A00029"/>
      </resource>
      <resource uuid="c17600e6-8b13-4d6e-a380-035b51a71b73">
         <title>The NIST Definition of Cloud Computing</title>
         <rlink href="https://csrc.nist.gov/publications/detail/sp/800-145/final"/>
      </resource>
      <resource uuid="c3e69683-1e95-40df-bd1f-f86a3fa3a9c1">
         <title>An Examination of the Redaction Functionality of Adobe Acrobat Pro DC 2017</title>
         <rlink href="https://www.cyber.gov.au/acsc/view-all-content/publications/examination-redaction-functionality-adobe-acrobat-pro-dc-2017"/>
      </resource>
      <resource uuid="c54cc4db-22f4-4d10-8977-2ce62b647bd2">
         <title>Preparing for and Responding to Denial-of-Service Attacks</title>
         <rlink href="https://www.cyber.gov.au/acsc/view-all-content/publications/preparing-and-responding-denial-service-attacks"/>
      </resource>
      <resource uuid="c6ca6620-ccd5-4c5d-b97c-9d92f1162948">
         <title>Guidelines for System Management</title>
         <rlink href="https://www.cyber.gov.au/acsc/view-all-content/advice/guidelines-system-management"/>
      </resource>
      <resource uuid="c78caaed-9931-4197-b21e-bc4e9979a51a">
         <title>Security Tips for Social Media and Messaging Apps</title>
         <rlink href="https://www.cyber.gov.au/acsc/view-all-content/publications/security-tips-social-media-and-messaging-apps"/>
      </resource>
      <resource uuid="c852e735-4920-4616-8e34-2fddfb49eea8">
         <title>AV-Comparatives</title>
         <rlink href="https://www.av-comparatives.org/"/>
      </resource>
      <resource uuid="cad720b4-e47a-437d-b272-6958e738131d">
         <title>Common Sense Guide to Mitigating Insider Threats</title>
         <rlink href="https://resources.sei.cmu.edu/library/asset-view.cfm?assetid=540644"/>
      </resource>
      <resource uuid="d0ace151-3c21-49af-bde7-eda58ab18a82">
         <title>cyber supply chain transparency</title>
         <rlink href="https://ntia.gov/page/software-bill-materials"/>
      </resource>
      <resource uuid="d0df96bb-7236-4784-8f54-2cb6335ad228">
         <title>exploit protection functionality</title>
         <rlink href="https://learn.microsoft.com/en-au/microsoft-365/security/defender-endpoint/exploit-protection?view=o365-worldwide"/>
      </resource>
      <resource uuid="d2910e61-da88-4d29-b860-83c25161fd18">
         <title>Security Configuration Guide – Apple iOS 14 Devices</title>
         <rlink href="https://www.cyber.gov.au/acsc/view-all-content/publications/security-configuration-guide-apple-ios-14-devices"/>
      </resource>
      <resource uuid="d2f005c5-2ad3-4b5e-9eb1-d0642f3560f4">
         <title>OWASP Application Security Verification Standard</title>
         <rlink href="https://owasp.org/www-project-application-security-verification-standard/"/>
      </resource>
      <resource uuid="d3572f80-d9d6-4023-b6e6-23720bb0d618">
         <title>How to Combat Fake Emails</title>
         <rlink href="https://www.cyber.gov.au/acsc/view-all-content/publications/how-combat-fake-emails"/>
      </resource>
      <resource uuid="d36ce452-ec21-4b05-89c1-f29a444a3dca">
         <title>End of Support for Microsoft Windows and Microsoft Windows Server</title>
         <rlink href="https://www.cyber.gov.au/acsc/view-all-content/publications/end-support-microsoft-windows-and-microsoft-windows-server"/>
      </resource>
      <resource uuid="d7e72166-b127-4249-bf93-3a7467c53f1d">
         <title>Cloud Computing Security Considerations</title>
         <rlink href="https://www.cyber.gov.au/acsc/view-all-content/publications/cloud-computing-security-considerations"/>
      </resource>
      <resource uuid="daae37ef-262f-4b20-bfb7-a27901f3c2db">
         <title>Security Configuration Guide – Viasat Mobile Dynamic Defense</title>
         <rlink href="https://www.cyber.gov.au/acsc/view-all-content/publications/security-configuration-guide-viasat-mobile-dynamic-defense"/>
      </resource>
      <resource uuid="db2e237c-2dbc-4a1f-bae7-9cb63a1f1dc3">
         <title>Guidelines for ICT Equipment</title>
         <rlink href="https://www.cyber.gov.au/acsc/view-all-content/advice/guidelines-ict-equipment"/>
      </resource>
      <resource uuid="dbd0372b-b758-46b1-bf05-d9676689d5b0">
         <title>Coordinated Vulnerability Disclosure: The Guideline</title>
         <rlink href="https://english.ncsc.nl/publications/publications/2019/juni/01/coordinated-vulnerability-disclosure-the-guideline"/>
      </resource>
      <resource uuid="dda788b6-183b-4e89-8254-8c4b5d0540a0">
         <title>Cloud Assessment and Authorisation – Frequently Asked Questions</title>
         <rlink href="https://www.cyber.gov.au/acsc/view-all-content/publications/cloud-assessment-and-authorisation-frequently-asked-questions"/>
      </resource>
      <resource uuid="de239dae-d1e8-4969-9680-ef3444d32a83">
         <title>Windows Event Logging and Forwarding</title>
         <rlink href="https://www.cyber.gov.au/acsc/view-all-content/publications/windows-event-logging-and-forwarding"/>
      </resource>
      <resource uuid="de7525f3-a466-40a5-abdd-3ae24a6d1b44">
         <title>Guidelines for System Hardening</title>
         <rlink href="https://www.cyber.gov.au/acsc/view-all-content/advice/guidelines-system-hardening"/>
      </resource>
      <resource uuid="ded13757-3c76-40cb-b46e-f84e46a1c1c7">
         <title>Defending Against the Malicious Use of the Tor Network</title>
         <rlink href="https://www.cyber.gov.au/acsc/view-all-content/publications/defending-against-malicious-use-tor-network"/>
      </resource>
      <resource uuid="df17ad0f-58d3-4bb8-814a-b60f34c5f841">
         <title>Emanation Security Program</title>
         <rlink href="https://www.cyber.gov.au/acsc/view-all-content/programs/emanation-security-program"/>
      </resource>
      <resource uuid="dfb52998-0e7e-420d-97e1-d1313c8f919a">
         <title>Microsoft Office Macro Security</title>
         <rlink href="https://www.cyber.gov.au/acsc/view-all-content/publications/microsoft-office-macro-security"/>
      </resource>
      <resource uuid="e0d3b5ea-6a5a-400c-8daa-8a8059816a06">
         <title>Archives Act 1983</title>
         <rlink href="https://www.legislation.gov.au/Series/C2004A02796"/>
      </resource>
      <resource uuid="e19a0c40-0a68-4fba-aea1-142fdd57dc75">
         <title>Web Conferencing Security</title>
         <rlink href="https://www.cyber.gov.au/acsc/view-all-content/publications/web-conferencing-security"/>
      </resource>
      <resource uuid="e1ebbfe4-ac16-4286-884e-907b2eada22b">
         <title>Sensitive and classified information</title>
         <rlink href="https://www.protectivesecurity.gov.au/publications-library/policy-8-sensitive-and-classified-information"/>
      </resource>
      <resource uuid="e4c07309-9ca8-40b7-9571-4f6c032180a1">
         <title>Telecommunications (Interception and Access) Act 1979</title>
         <rlink href="https://www.legislation.gov.au/Series/C2004A02124"/>
      </resource>
      <resource uuid="e4eee462-f6e5-4921-a8fe-26f3de6c6f45">
         <title>Marketing and Filtering Email Service Providers</title>
         <rlink href="https://www.cyber.gov.au/acsc/view-all-content/publications/marketing-and-filtering-email-service-providers"/>
      </resource>
      <resource uuid="e4ef23da-2683-4356-93c4-a2412c9d52ee">
         <title>High Assurance Evaluation Program</title>
         <rlink href="https://www.cyber.gov.au/acsc/view-all-content/programs/high-assurance-evaluation-program"/>
      </resource>
      <resource uuid="e7ce6e23-4bbb-45c1-a657-7e563c0837ed">
         <title>Information Security Manual</title>
         <rlink href="https://www.cyber.gov.au/acsc/view-all-content/ism"/>
      </resource>
      <resource uuid="e8a28fa5-4ea1-4ef5-a870-4d59e40fab37">
         <title>Commercial National Security Algorithm Suite</title>
         <rlink href="https://www.nsa.gov/Press-Room/News-Highlights/Article/Article/3148990/nsa-releases-future-quantum-resistant-qr-algorithm-requirements-for-national-se/"/>
      </resource>
      <resource uuid="e8bde527-526c-4a6a-b66f-05228f09dd7b">
         <title>Guidelines for Gateways</title>
         <rlink href="https://www.cyber.gov.au/acsc/view-all-content/advice/guidelines-gateways"/>
      </resource>
      <resource uuid="e8ec7a1f-775d-4b79-a164-0752278177fa">
         <title>Risk Management of Enterprise Mobility Including Bring Your Own Device (BYOD)</title>
         <rlink href="https://www.cyber.gov.au/acsc/view-all-content/publications/risk-management-enterprise-mobility-including-bring-your-own-device"/>
      </resource>
      <resource uuid="eb0009ec-5481-41cd-91e3-aee354042712">
         <title>Data Remanence in Semiconductor Devices</title>
         <rlink href="https://www.usenix.org/legacy/events/sec01/full_papers/gutmann/gutmann.pdf"/>
      </resource>
      <resource uuid="edc24216-f52b-4513-bcda-5fa564661999">
         <title>Guidelines for System Monitoring</title>
         <rlink href="https://www.cyber.gov.au/acsc/view-all-content/advice/guidelines-system-monitoring"/>
      </resource>
      <resource uuid="edd67903-94ef-4edd-9789-73e0141cd77c">
         <title>General requirements for the competence of testing and calibration laboratories</title>
         <rlink href="https://www.iso.org/standard/66912.html"/>
      </resource>
      <resource uuid="efddc783-51dc-48ac-a53e-a5dd56c17fd0">
         <title>Detecting Socially Engineered Messages</title>
         <rlink href="https://www.cyber.gov.au/acsc/view-all-content/publications/detecting-socially-engineered-messages"/>
      </resource>
      <resource uuid="f145ff5b-d396-4248-8f48-621349d6f0ed">
         <title>Guidelines for Networking</title>
         <rlink href="https://www.cyber.gov.au/acsc/view-all-content/advice/guidelines-networking"/>
      </resource>
      <resource uuid="f32020e9-4cb3-486b-bcbb-6fb6719f58a5">
         <title>Fundamentals of Cross Domain Solutions</title>
         <rlink href="https://www.cyber.gov.au/acsc/view-all-content/publications/fundamentals-cross-domain-solutions"/>
      </resource>
      <resource uuid="f37a4848-0791-4870-b316-5536c2681c28">
         <title>Guidelines for Procurement and Outsourcing</title>
         <rlink href="https://www.cyber.gov.au/acsc/view-all-content/advice/guidelines-procurement-and-outsourcing"/>
      </resource>
      <resource uuid="f48c0d05-5173-4c8e-8748-e5591518c1fb">
         <title>Computer Security Incident Handling Guide</title>
         <rlink href="https://csrc.nist.gov/publications/detail/sp/800-61/rev-2/final"/>
      </resource>
      <resource uuid="f74ba095-a7f7-4b8c-9e60-5fe84f2a2d0b">
         <title>changing credentials for this service account</title>
         <rlink href="https://www.microsoft.com/en-us/security/blog/2015/02/11/krbtgt-account-password-reset-scripts-now-available-for-customers/"/>
      </resource>
      <resource uuid="f7e13f7b-eb48-4294-bd01-9c22c756d96b">
         <title>Security Equipment Evaluated Products List</title>
         <rlink href="https://www.scec.gov.au/catalogue"/>
      </resource>
      <resource uuid="f832363c-d81e-4908-afd9-cf45047dd19c">
         <title>configuring OpenSSH</title>
         <rlink href="https://man.openbsd.org/sshd_config"/>
      </resource>
      <resource uuid="f9fb4c57-8c12-4edf-9e34-cb422664aae9">
         <title>Mitigating Pass-the-Hash (PtH) Attacks and Other Credential Theft Techniques, Version 1 and 2</title>
         <rlink href="https://www.microsoft.com/en-au/download/confirmation.aspx?id=36036"/>
      </resource>
      <resource uuid="fe0138db-e83b-4a23-85d3-d84e1c22816f">
         <title>Guidelines for Cyber Security Incidents</title>
         <rlink href="https://www.cyber.gov.au/acsc/view-all-content/advice/guidelines-cyber-security-incidents"/>
      </resource>
      <resource uuid="ffc8a1f6-f4e3-4ff5-a7f9-f41f766274eb">
         <title>Recommendation for Key Management: Part 1 – General</title>
         <rlink href="https://csrc.nist.gov/publications/detail/sp/800-57-part-1/rev-5/final"/>
      </resource>
   </back-matter>
</catalog>
