ISM MCP Server
Click on "Install Server".
Wait a few minutes for the server to deploy. Once ready, it will show a "Started" state.
In the chat, type
@followed by the MCP server name and your instructions, e.g., "@ISM MCP Serverwhat's the latest ISM version?"
That's it! The server will respond to your query, and you can continue using it as needed.
Here is a step-by-step guide with screenshots.
ism-mcp
A Model Context Protocol server that serves the Australian Cyber Security Centre (ACSC) Information Security Manual (ISM) to MCP-capable LLM clients (Claude Desktop, VS Code, Cursor, Continue, etc.).
Data is sourced live from the official ASD/ACSC OSCAL mirror:
Each git tag in that repository is one published ISM release. The server discovers tags dynamically via the GitHub API, so:
All historical versions back to
v2022.09.14are available.The current version is whichever tag is newest.
Future versions automatically appear the moment ASD publishes a new tag — no code changes or redeploys required.
Catalog and profile JSON is cached on disk (default
~/.cache/ism-mcp/, override with ISM_MCP_CACHE_DIR). Tag listings are
refreshed every six hours (override with ISM_MCP_TAGS_TTL_MS).
Capabilities
Tools
Tool | Purpose |
| Enumerate every published ISM release (tag, id, SHA, date). |
| OSCAL metadata + control/group counts for a version. |
| Hierarchical chapter/guideline structure with control counts. |
| Paginated list of controls, filterable by applicability / group / label prefix. |
| Full-text search across labels, titles, statements, and group paths. |
| Full detail for a single control by OSCAL id or human label (e.g. |
| Diff two ISM releases — added, removed, and modified controls. |
| List the eight OSCAL profiles (NC / OS / P / S / TS + E8 ML1/2/3). |
| Resolved set of controls for a given baseline or Essential Eight maturity level. |
| Inspect the local cache. |
Resources (templates)
ism://catalog/{version}— full OSCAL catalog JSON (uselatestor e.g.2026.03.24).ism://catalog/{version}/control/{controlId}— a single control rendered as Markdown.ism://profile/{version}/{profile}— OSCAL resolved-profile catalog for a baseline.
Prompts
ism_compliance_check— generate a structured compliance assessment of a system against a baseline.ism_change_brief— produce a change-management brief between two ISM releases.
Install / build
npm install
npm run buildThe compiled entrypoint is dist/index.js and is exposed as the ism-mcp bin.
Run
The server speaks MCP over stdio:
node dist/index.jsFor interactive exploration, use the official inspector:
npm run inspectWire it into a client
VS Code (.vscode/mcp.json or settings)
{
"servers": {
"ism": {
"command": "node",
"args": ["/absolute/path/to/ism-mcp/dist/index.js"],
},
},
}Claude Desktop (claude_desktop_config.json)
{
"mcpServers": {
"ism": {
"command": "node",
"args": ["/absolute/path/to/ism-mcp/dist/index.js"],
},
},
}Optional environment
Variable | Purpose |
| Override on-disk cache directory. |
| Tag-list cache TTL in milliseconds (default 6h). |
Example prompts to try
"What ISM versions are available?"
"Show me GOV-01 from the latest ISM, in Markdown."
"Search for ISM controls about multi-factor authentication that apply to PROTECTED."
"Compare ISM 2025.12.9 with the latest release and summarise the changes."
"List the controls in the Essential Eight ML2 baseline for the latest ISM."
Data and licensing
The ISM is published by the Australian Signals Directorate. See the upstream repository and https://www.cyber.gov.au for terms of use. This server is an unaffiliated tool that consumes the publicly published OSCAL data.
CI / CD
Three GitHub Actions workflows ship with the repo:
.github/workflows/ci.yml— type-checks, builds, and runs the offline smoke test on every push and PR..github/workflows/release.yml— dispatched by CI after a successfulmainbuild when a new version tag is created (or by manual dispatch), bundles the latest data, builds, packs the tarball, generates checksums, creates a GitHub Release with the tarball anddata/index.jsonattached, updates a rollinglatestgit tag to the released commit, and (optionally) publishes to npm. If Cloudflare credentials are configured, it deploys a Cloudflare Worker that serves the site and exposes the MCP Streamable HTTP endpoint at/mcp(manual dispatch can disable this viadeploy_cloudflare=false)..github/workflows/upstream-sync.yml— checks the upstream ACSC ISM OSCAL repository on a daily schedule (or manual dispatch). When a new ISM tag is published upstream, it rebundlesdata/, bumps the package patch version, commits the update tomain, and lets CI trigger the tagged release and Cloudflare deployment.
One-time repository setup
Settings → Actions → General → Workflow permissions: Read and write.
(Optional) configure repository credentials for npm publish on release.
Update the
repository,homepage, andbugsfields inpackage.json(replaceOWNER).(Optional) configure Cloudflare account credentials in repository secrets to enable Workers deployment on release.
Cutting a release
# bump version
npm version patch # or minor / major
git push --follow-tagsManual releases run CI first; when CI succeeds on main, it creates the version tag and dispatches release.yml, which builds an offline-ready ism-mcp-<version>.tgz, attaches it to the GitHub Release, and (optionally) publishes the package to npm and deploys the Cloudflare Worker endpoint.
Upstream ISM releases are also checked automatically once per day. If a new upstream tag is detected, the sync workflow rebundles the data, bumps the package version, pushes the update to main, and the existing CI and release workflows take over from there.
For remote AI clients, add the remote MCP server with this URL:
https://ism.mcp.zta.au/mcp
{
"servers": {
"ism": {
"type": "http",
"url": "https://ism.mcp.zta.au/mcp",
},
},
}Remote MCP / HTTP transport
Beyond stdio, ism-mcp also speaks MCP Streamable HTTP so it can be hosted as a remote endpoint that AI tools query over the network.
# run as an HTTP server on :8080
MCP_TRANSPORT=http PORT=8080 node dist/index.js
# or via flag
node dist/index.js --httpEndpoints:
POST /mcp— JSON-RPC over Streamable HTTP (per-session viaMcp-Session-Idheader).GET /health— liveness probe.GET /— plain-text usage hint.
Environment variables:
Variable | Purpose |
|
|
| Bind address (defaults: |
| URL path for the MCP endpoint (default |
Connect a client to the remote endpoint
Hosted endpoint: https://ism.mcp.zta.au/mcp
// VS Code .vscode/mcp.json
{
"servers": {
"ism": {
"type": "http",
"url": "https://ism.mcp.zta.au/mcp",
},
},
}Maintenance
Resources
Unclaimed servers have limited discoverability.
Looking for Admin?
If you are the server author, to access and configure the admin panel.
Latest Blog Posts
MCP directory API
We provide all the information about MCP servers via our MCP API.
curl -X GET 'https://glama.ai/api/mcp/v1/servers/RusticEagle/ism-mcp'
If you have feedback or need assistance with the MCP directory API, please join our Discord server