Skip to content
arrow_back
search
ISM-0591 policy ASD Information Security Manual (ISM)

Use Evaluated Peripheral Switches Securely

Use verified switches to safely share devices between different computer systems.

record_voice_over

Plain language

This control is about using approved switches to connect your devices to different computer systems securely. It matters because if you use an unapproved switch, there is a risk of accidentally allowing sensitive information to move between systems that should remain separate, which could lead to data breaches.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Feb 2022

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Evaluated peripheral switches are used when sharing peripherals between systems.
policy ASD Information Security Manual (ISM) ISM-0591
priority_high

Why it matters

Using non-evaluated switches for shared peripherals can lead to unintended data leaks between isolated systems, risking sensitive data exposure.

settings

Operational notes

Regularly verify any peripheral switch used for shared devices is evaluated/approved, and replace non-evaluated units to prevent cross-domain data transfer.

Mapping detail

Mapping

Direction

Controls