Skip to content
arrow_back
search
ISM-0198 policy ASD Information Security Manual (ISM)

Consultation for Penetrating Audio Secure Rooms

Before entering top secret audio rooms, consult ASIO and follow their guidance.

record_voice_over

Plain language

When you need to enter a room that is set up to handle top secret audio information, you must first check with the Australian Security Intelligence Organisation (ASIO) and follow their advice. This is important because if someone gained access to sensitive information without proper procedures, it could lead to a serious breach of security, potentially compromising national safety.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

TS

ISM last updated

Nov 2021

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

When penetrating a TOP SECRET audio secure room, the Australian Security Intelligence Organisation is consulted and all directions provided are complied with.
policy ASD Information Security Manual (ISM) ISM-0198
priority_high

Why it matters

Not consulting ASIO before penetrating a TOP SECRET audio secure room can cause unauthorised disclosure and compromise national security operations.

settings

Operational notes

Before penetrating a TOP SECRET audio secure room, consult ASIO and follow all directions. Record approvals, dates, contacts and actions taken.

build

Implementation tips

  • Office managers should reach out to ASIO before planning any work involving top secret audio secure rooms. Call ASIO directly to ensure you get the correct advice and guidelines before proceeding with any entry or work in those rooms.
  • Security personnel should keep an updated contact list for key ASIO representatives. This list should be easily accessible, so consultations can happen promptly before accessing or altering audio secure rooms.
  • Facilities managers should document and distribute the procedures provided by ASIO to all relevant staff members. Create a simple checklist of steps to follow when accessing these rooms, including who to notify and what actions to take.
  • IT administrators should ensure any cabling work in audio secure rooms complies with ASIO guidelines. Obtain the specific technical instructions from ASIO, and verify that all contractors understand these requirements.
  • Management should schedule regular training sessions for employees on handling secure audio environments. Invite ASIO representatives to provide training or insights, ensuring everyone understands the importance and methods of maintaining security.
fact_check

Audit / evidence tips

  • Askthe consultation records with ASIO: Request emails or meeting notes detailing the guidance provided by ASIO before accessing top secret audio secure rooms

    Goodis a documented agreement or directive from ASIO with clear actions listed

  • Askthe procedure or checklist staff use to ensure compliance with ASIO guidance

    Goodwould be a detailed checklist with staff initials and date stamps showing completed actions

  • Askthem to explain how they ensure ASIO guidelines are followed before entering top secret audio rooms. Listen for clear, consistent recounts of protocols and names of ASIO contacts

    Goodincludes specific examples of past interactions with ASIO and outcomes

  • Goodsession would involve interactive participation and reiteration of key ASIO principles

  • Goodshows regular, documented contact with ASIO, indicating proactive management

link

Cross-framework mappings

How ISM-0198 relates to controls across ISO/IEC 27001, Essential Eight, and ASD ISM.

ISO 27001

Control Notes Details
layers Partially meets (1) expand_less
Annex A 7.3 ISM-0198 requires that when an organisation intends to penetrate (i.e

These mappings show relationships between controls across frameworks. They do not imply full equivalence or certification.

Mapping detail

Mapping

Direction

Controls