Skip to content
arrow_back
search
ISM-0306 policy ASD Information Security Manual (ISM)

Escort Unauthorised Technicians for IT Repairs

Ensure unauthorised IT repair technicians are escorted by a qualified person to protect data and equipment integrity.

record_voice_over

Plain language

This control ensures that any technician who isn't properly authorised and trained doesn't work alone on your IT systems. It matters because without supervision, a technician might accidentally or purposely expose or alter sensitive data, leading to possibly severe consequences like data breaches, financial loss, or reputational damage.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

May 2024

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

If an appropriately cleared technician is not used to undertake maintenance or repairs of IT equipment, the technician is escorted by someone who: - is appropriately cleared and briefed - takes due care to ensure that data is not disclosed - takes all responsible measures to ensure the integrity of the IT equipment - has the authority to direct the technician - is sufficiently familiar with the IT equipment to understand the work being performed.
policy ASD Information Security Manual (ISM) ISM-0306
priority_high

Why it matters

Unescorted or unmanaged external technicians may access or alter systems, causing data disclosure, malware insertion, or tampering during repairs.

settings

Operational notes

If using uncleared technicians, assign a cleared escort who can direct work, monitor actions, and prevent data access or equipment tampering.

Mapping detail

Mapping

Direction

Controls