Skip to content
arrow_back
search
ISM-0529 policy ASD Information Security Manual (ISM)

Avoid Using VLANs for Different Security Domains

Do not use VLANs to separate networks with different security levels.

record_voice_over

Plain language

When you set up different parts of your network for security reasons, don't rely on VLANs (Virtual Local Area Networks) to keep them apart. Using VLANs can lead to serious security risks because they aren't foolproof against attacks that could jump from one secured area to another. This matters because if one part of your network is breached, attackers could access sensitive data in other parts too.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Nov 2021

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

VLANs are not used to separate network traffic between networks belonging to different security domains.
policy ASD Information Security Manual (ISM) ISM-0529
priority_high

Why it matters

Relying on VLANs to separate different security domains can allow cross-domain access if VLAN hopping or misconfiguration occurs, exposing sensitive data.

settings

Operational notes

Ensure different security domains use physical or cryptographic separation, not VLANs. Review switch configs and routing/ACL paths to confirm no cross-domain VLAN connectivity.

Mapping detail

Mapping

Direction

Controls