Skip to content
arrow_back
search
ISM-0520 policy ASD Information Security Manual (ISM)

Prevent Unauthorised Network Device Connections

Ensure only approved devices can connect to the network, blocking unauthorised access.

record_voice_over

Plain language

To keep your network safe, you need to make sure that only devices you trust can connect to it. If you let any unknown or unauthorised devices in, they could bring in viruses or allow people to steal your data, which can damage your reputation and finances.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Nov 2024

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Network access controls are implemented on networks to prevent the connection of unauthorised network devices and networked IT equipment.
policy ASD Information Security Manual (ISM) ISM-0520
priority_high

Why it matters

Unauthorised devices connecting to the network can bypass protections, enable lateral movement, and lead to data compromise, service disruption, and investigation costs.

settings

Operational notes

Maintain 802.1X/NAC rules, update allowlists/ACLs for approved devices, and review switch/Wi‑Fi logs and alerts for unauthorised connection attempts.

Mapping detail

Mapping

Direction

Controls