Kieran Jessup - Cyber Security Architect

pretengineer

home whoami blog projects tools
Home / Blog / Compliance

Posts tagged: Compliance

4 posts

October 29, 2025
ism blue implementation

ISM-0534 Implementation Guide: Disabling Unused Physical Ports

ISM-0534 implementation guide: Disable unused physical ports on network devices. Complete configuration guidance for switches, routers, and network infrastructure. Step-by-step instructions for blue team security implementation and compliance.

Read More →
February 1, 2025
ism monitoring logging

Practical ISM E01: Guidelines for system monitoring

Learn how to implement comprehensive logging and monitoring policies that meet Australian Government ISM requirements, including control implementation, log management, and security monitoring best practices.

Read More →
January 27, 2025
ISM-1717 ISM Security

ISM-1717 Implementation Guide: Security.txt File Requirements

ISM-1717 security.txt implementation guide: Complete requirements for hosting security contact files at /.well-known/security.txt. RFC 9116 compliance, web server configuration, and security policy implementation for organizations and cybersecurity compliance.

Read More →
January 1, 2025
ism assessment compliance

Draft: Assessing systems against the ISM

Learn how to assess systems against the Australian Government Information Security Manual (ISM) controls, including methodology, tools, and best practices for compliance evaluation.

Read More →