Skip to content
arrow_back
search
ISM-0631 policy ASD Information Security Manual (ISM)

Restrict Data Flows with Authorised Gateways

Gateways should block any data transfers not specifically approved.

record_voice_over

Plain language

This control means that any data transfers in your organisation should only happen through pre-approved routes to prevent sensitive information from leaking out. It's like having a secure gate that only opens for visitors you've personally invited. Without this, your confidential data could end up in the wrong hands, leading to privacy breaches and loss of trust from customers and partners.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Feb 2022

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Gateways only allow explicitly authorised data flows.
policy ASD Information Security Manual (ISM) ISM-0631
priority_high

Why it matters

If gateways don’t restrict data flows to authorised routes, unauthorised transfers can cause data leakage, breaches and loss of trust.

settings

Operational notes

Regularly review gateway rules/ACLs and the approved data-flow list so only explicitly authorised flows are permitted; remove obsolete paths.

Mapping detail

Mapping

Direction

Controls