Skip to content
arrow_back
search
ISM-0462 policy ASD Information Security Manual (ISM)

Managing Encryption Access for IT Equipment and Media

IT systems are treated according to their original sensitivity when accessed using encryption.

record_voice_over

Plain language

This control is about ensuring that when you use encrypted devices or storage, they are treated with the same security precautions as when they were originally secured. If not followed, you could accidentally expose sensitive information because people might assume these items are always safe without checking the security settings they're using.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

May 2024

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

When a user authenticates to the encryption functionality of IT equipment or media, it is treated in accordance with its original sensitivity or classification until the user deauthenticates from the encryption functionality.
policy ASD Information Security Manual (ISM) ISM-0462
priority_high

Why it matters

If users stay authenticated to encryption, equipment/media must be treated at original classification; mishandling can cause classified data exposure.

settings

Operational notes

Ensure devices/media remain handled at their original classification while users are authenticated to encryption; require prompt deauthentication when finished.

Mapping detail

Mapping

Direction

Controls