The Information Security Manual is mandated by the Australian Signals Directorate, the federal statutory agency of the Australian government responsible for intelligence and cybersecurity.
The manual comprises guidelines that focus on different aspects of enterprise IT security, including networking, communication, cryptography, enterprise mobility, etc. In its own words, "the purpose of the Information Security Manual (ISM) is to outline a cybersecurity framework that an organization can apply, using their risk management framework, to protect their systems and data from cyber threats."
Ensuring compliance with the NIS2 Directive with PAM
PAM Maturity Model eBook
PAM Buyer’s Guide eBook
Disclaimer: The complete implementation of ISM guidelines requires a variety of process, policy, people, and technology controls. The solutions mentioned above are some of the ways in which privileged access management controls help with the ISM requirements. Coupled with other appropriate solutions, processes, people controls, and policies, ManageEngine's PAM solutions can help organizations align with ISM requisites. This material is provided for informational purposes only, and should not be considered as legal advice for ISM compliance. ManageEngine makes no warranties, express, implied, or statutory, as to the information in this material. Please contact your legal advisor to learn how ISM impacts your organization and what you need to do to comply with the ISM compliance.