Skip to content
arrow_back
search
ISM-0161 policy ASD Information Security Manual (ISM)

Ensure Security of Unused IT Equipment and Media

IT equipment and media are protected against unauthorized access when not actively being used.

record_voice_over

Plain language

This control is about making sure that computers, hard drives, and other tech devices are safely locked away when you're not using them. It’s important because if someone can get to them when you're not watching, they could steal important information or mess up your business operations.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

May 2024

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

IT equipment and media are secured when not in use.
policy ASD Information Security Manual (ISM) ISM-0161
priority_high

Why it matters

If unused IT equipment or removable media aren’t secured when not in use, they can be stolen or accessed, leading to data exposure and disruption.

settings

Operational notes

Lock unused devices and removable media in secure storage (e.g., cabinets/rooms), restrict key/access lists, and audit holdings regularly to confirm they remain secured.

Mapping detail

Mapping

Direction

Controls