Seal Removable Covers on TOP SECRET Cables
Use special seals to secure TOP SECRET cable covers in shared spaces to prevent tampering.
Plain language
In places where many people have access, all covers that can be removed from cables carrying top-secret information need to be sealed with special tamper-evident seals. This helps prevent anyone from interfering with these cables unnoticed, which could lead to a leak of highly sensitive information.
Framework
ASD Information Security Manual (ISM)
Control effect
Preventative
Classifications
TS
ISM last updated
May 2022
Control Stack last updated
19 Mar 2026
E8 maturity levels
N/A
Section
Cabling infrastructureOfficial control statement
In shared facilities, uniquely identifiable SCEC-approved tamper-evident seals are used to seal all removable covers on TOP SECRET cable reticulation systems.
Why it matters
Without uniquely identifiable SCEC-approved tamper-evident seals on removable TOP SECRET cable covers, interference may go undetected, enabling leakage.
Operational notes
Regularly inspect uniquely identifiable SCEC-approved tamper-evident seals on removable TOP SECRET cable covers in shared facilities; replace immediately if tampering is suspected.
Implementation tips
- The IT manager should identify all the cable covers that protect top-secret cables in shared areas. Create a detailed map or list showing where each cable cover is located for quick reference.
-
Look atsuppliers who provide seals certified for security use in Australia, and keep a record of purchases
- Facilities management should train staff on how to apply these seals. Organise a short workshop demonstrating the correct sealing process and how to check that a seal hasn't been tampered with.
- An assigned security officer should perform regular checks on all sealed covers. Schedule routine inspections to ensure that all seals are intact and note any anomalies immediately for further investigation.
- Management should implement a reporting process for when seals are missing or tampered with. Staff should have clear instructions on who to notify and what steps to take if they believe a seal has been compromised.
Audit / evidence tips
-
Askthe map or list of all top-secret cable covers in shared spaces
Goodincludes a comprehensive, up-to-date map or list verified against the actual layout
-
Goodincludes invoices or procurement records specifying the seal characteristics
-
Goodis where staff show confidence and clarity in their procedures
-
Goodis a thorough and documented inspection routine
-
Goodincludes detailed incident logs with clear resolution actions
Cross-framework mappings
How ISM-0195 relates to controls across ISO/IEC 27001, Essential Eight, and ASD ISM.
ISO 27001
| Control | Notes | Details |
|---|---|---|
| layers Partially meets (1) expand_less | ||
| Annex A 7.12 | ISM-0195 requires the use of uniquely identifiable SCEC-approved tamper-evident seals to secure all removable covers on TOP SECRET cable ... | |
| link Related (1) expand_less | ||
| Annex A 7.5 | Annex A 7.5 requires implementing protections against intentional physical threats, including tampering with infrastructure | |
These mappings show relationships between controls across frameworks. They do not imply full equivalence or certification.