A compliant government cloud environment isn't one thing — it's four: verified identities, secure remote access, a correctly configured cloud environment, and continuous compliance monitoring. ClearStack ships all four together, pre-configured, tested, and ready to run. This page explains what each layer does and why it matters.
Most breaches come from the same places: someone using a compromised login, a staff member connecting over an insecure network, a misconfigured cloud resource, or a threat that wasn't noticed until it was too late. ClearStack addresses all four — before your first workload runs.
| Control ID | Control name | E8 mapping | Status |
|---|---|---|---|
| ISM-0974 | Multi-factor authentication for all users | E8 ML3 — MFA | Enforced |
| ISM-1173 | Phishing-resistant MFA for privileged users | E8 ML3 — MFA | Enforced |
| ISM-1401 | Privileged access workstations | E8 — Admin mgmt | Configured |
| ISM-1507 | Just-in-time privileged access | E8 — Admin mgmt | Enforced via PIM |
| ISM-0428 | Audit logging of privileged access | E8 — Logging | Configured |
Verified identities and access control are the foundation — every ClearStack environment starts here.
| Control ID | Control name | E8 mapping | Status |
|---|---|---|---|
| ISM-0521 | Network access controls | — | Enforced |
| ISM-1260 | Zero-trust architecture | — | Implemented |
| ISM-0585 | Logging of network access events | E8 — Logging | Configured |
| ISM-1055 | Blocking access from untrusted devices | E8 ML2 | Enforced |
| ISM-1231 | Web content filtering | — | Configured |
Your VPN is replaced on day one. Layers 1 and 2 are designed together — they only work properly in combination.
version-manifest.json. Compliance Workbook reads it to surface update-available banners — no publisher access to your subscription required.
| Control ID | Control name | E8 mapping | Status |
|---|---|---|---|
| ISM-1053 | System monitoring — cloud resources | E8 — Logging | Configured |
| ISM-0109 | Centralised logging | E8 ML2 — Logging | Enforced |
| ISM-1146 | Azure Policy for configuration compliance | — | Deployed |
| ISM-0988 | Configuration drift detection | E8 — Patching | Active |
| ISM-1407 | ISM update currency tracking | — | Via version manifest |
ACSC publishes ISM updates approximately every six months. ClearStack targets delivery of updated policy sets within 45 business days of each ACSC publish date. The version manifest surfaces update availability in your compliance dashboard without requiring any publisher access to your environment. Version EOL policy: MINOR versions — 180 days. MAJOR versions — 365 days.
This is where production workloads run. It includes the live compliance dashboard and automatic ISM update tracking.
| Control ID | Control name | E8 mapping | Status |
|---|---|---|---|
| ISM-0573 | Network segmentation | — | Enforced |
| ISM-1082 | Firewall rule management | — | Configured |
| ISM-0109 | SIEM — security event monitoring | E8 ML3 — Logging | Via Sentinel |
| ISM-1425 | Private endpoint for PaaS services | — | Policy enforced |
| ISM-1586 | Multi-subscription security governance | — | Configured |
Most small agencies don't need Layer 4 at launch. Layers 1–3 (Professional) cover the vast majority of ACSC ISM PROTECTED requirements and are the right starting point. Layer 4 becomes relevant when you have multiple separate workloads that need isolation from each other, a security team with a formal monitoring mandate, or an active IRAP assessment for PROTECTED classification. We'll tell you directly during scoping whether you need it — we're not here to oversell.
For agencies with multiple workloads, a security operations mandate, or an IRAP assessment in scope.