Skip to content
arrow_back
search
ISM-0336 policy ASD Information Security Manual (ISM)

Maintain a Comprehensive IT Equipment Register

Keep a regularly updated record of all IT equipment connected to the network.

record_voice_over

Plain language

Having a complete and regularly updated list of all your company’s IT gear that's connected to your network is crucial. Without it, you might not know what's vulnerable in your system, could lose track of devices if they go missing, or face unexpected security risks.

Framework

ASD Information Security Manual (ISM)

Control effect

Proactive

Classifications

NC, OS, P, S, TS

ISM last updated

May 2024

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

A networked IT equipment register is developed, implemented, maintained and verified on a regular basis.
policy ASD Information Security Manual (ISM) ISM-0336
priority_high

Why it matters

Without a verified IT equipment register, unknown or unmanaged devices can connect to the network, creating blind spots that enable unauthorised access and data breaches.

settings

Operational notes

Regularly reconcile physical, virtual and cloud assets against the register, record owners and locations, and promptly update entries when devices are added, moved or retired.

Mapping detail

Mapping

Direction

Controls