Skip to content
Control Stack logo Control Stack
ISM-0635 ASD Information Security Manual (ISM)

Ensure Network Paths are Isolated in CDSs

Systems manage separate and secure network paths for upward and downward data movements to prevent security breaches.

🏛️ Framework

ASD Information Security Manual (ISM)

🧭 Control effect

Preventative

🔐 Classifications

S, TS

🗓️ ISM last updated

Feb 2022

✏️ Control Stack last updated

22 Feb 2026

🎯 E8 maturity levels

N/A

Official control statement
CDSs implement isolated upward and downward network paths.

Source: ASD Information Security Manual (ISM)

Plain language

This control is about keeping certain types of data moving in one direction only on a network, so it doesn’t mix up with other data. By doing this, organisations protect themselves from unwanted data leaks or security breaches that could lead to sensitive information falling into the wrong hands.

Why it matters

Failing to isolate upward and downward CDS network paths can enable data to traverse between domains, causing cross-contamination, data leakage and unauthorised access.

Operational notes

Regularly validate CDS architecture keeps upward and downward paths physically/logically separated, and test permitted flows to confirm no unintended bridging or reverse transfer.

Implementation tips

  • The IT team should work on creating separate network pathways for data moving up (into secure areas) and data moving down (out to less secure areas). This can be done by setting up separate cables or virtual paths within the network systems.
  • The network administrator should regularly test these pathways to ensure they are not mixing or allowing data to flow in unintended directions. They can do this by running simulations and checking the flow of data packets.
  • The system manager should collaborate with security advisors to assess which data needs strict direction controls. They should map out each type of data and ensure it uses the correct network path.
  • IT support should train staff on the importance of not using unofficial paths for data transfers. This can be done through regular information sessions and reminders about data security policies.
  • Management should review the existing network configurations quarterly to verify that all changes in data flow needs are up to date. They can do this by checking the latest network maps and configurations against current requirements.

Audit / evidence tips

  • Ask: the network configuration documents: Request the latest network setups showing the separate paths for upward and downward data

    Good: is a clear diagram showing two distinct paths with labels indicating the direction of data flow

  • Ask: testing reports of the data pathways: Request documentation of recent tests or audits conducted on data paths

    Good: would be a report with successful test results and any actions taken to fix issues

  • Ask: policies related to data flow control: Request the policy documents that outline how data flow is managed

    Good: is a current document signed off by management and accessible to all staff

  • Ask: staff training records on data pathway usage: Request records of training sessions held regarding proper data transfer practices. Look into the attendee lists and feedback to verify comprehension and compliance

    Good: includes multiple sessions over time with a large majority of relevant staff attending

  • Ask: a risk assessment report: Request the document that evaluates the risks of data not following the correct paths

    Good: is a thorough report updated regularly to reflect any changes in the system or risks

Cross-framework mappings

How ISM-0635 relates to controls across ISO/IEC 27001, Essential Eight, and ASD ISM.

These mappings show relationships between controls across frameworks. They do not imply full equivalence or certification.

ISO 27001

Control Notes Details
Partially meets (1)
Annex A 8.22 ISM-0635 requires CDSs to implement isolated upward and downward network paths to separate data flows by direction and reduce the risk of...

Mapping detail

Mapping

Direction

Controls