Label IT Equipment with Protective Markings
Ensure regular IT equipment is labelled to show its sensitivity level, but this doesn't apply to high assurance equipment.
🏛️ Framework
ASD Information Security Manual (ISM)
🧭 Control effect
Preventative
🔐 Classifications
NC, OS, P, S, TS
🗓️ ISM last updated
May 2024
✏️ Control Stack last updated
22 Feb 2026
🎯 E8 maturity levels
N/A
Section
IT equipment usageTopic
Labelling It EquipmentIT equipment, with the exception of high assurance IT equipment, is labelled with protective markings reflecting its sensitivity or classification.
Source: ASD Information Security Manual (ISM)
Plain language
This control is all about marking your IT equipment to show how sensitive the data is that it can handle, except for some high-security gear. It's like putting labels on your office files so everyone knows how careful they need to be. If you don't label equipment, staff might accidentally treat sensitive data casually, leading to security breaches and data loss.
Why it matters
Without protective markings on IT equipment, sensitive assets can be mishandled or misrouted, increasing the risk of data exposure and unauthorised access.
Operational notes
Audit equipment labels after deployments, repairs and relocations, and ensure protective markings match the asset’s current sensitivity/classification and records.
Implementation tips
- The IT manager should create a labelling policy: Decide consistent labels for different sensitivity levels like 'Confidential' or 'Public'. Make sure the policy is clear and everyone understands it.
- Office managers should train staff: Organise short sessions to explain why equipment labelling is important and how it should be done. Everyone should know which equipment to label and what labels to use.
- The IT team should apply labels: Physically attach the correct labels to the equipment based on its data sensitivity level. Use durable labels that are easy to read and won’t fall off.
- Regular checks by IT support: Set monthly reminders for IT support to check that labels are still in place and readable, and update them if equipment roles change.
- Procurement officers should coordinate: When new equipment arrives, ensure it’s labelled before going into regular use. Develop a checklist so that labelling isn’t overlooked during setup.
Audit / evidence tips
-
Ask: the labelling policy document
Good: the policy lists categories like 'Confidential' and gives clear steps for assigning labels
-
Good: labels are on all necessary devices and match the current policy
-
Ask: them how they decide what labels go on which gear and how often they check labels
Good: they explain the process clearly, including regular checks
-
Good: documents show equipment was labelled immediately after setup
-
Good: records show all staff have attended relevant training recently
Cross-framework mappings
How ISM-0294 relates to controls across ISO/IEC 27001, Essential Eight, and ASD ISM.
These mappings show relationships between controls across frameworks. They do not imply full equivalence or certification.
ISO 27001
| Control | Notes | Details |
|---|---|---|
| Supports (1) | ||
| Annex A 5.13 | ISM-0294 requires organisations to label IT equipment (excluding high assurance equipment) with protective markings that reflect the equi... | |