Skip to content
arrow_back
search
ISM-0637 policy ASD Information Security Manual (ISM)

Implementing Demilitarised Zones in Gateways

Gateways use demilitarised zones to safely allow outside parties access to organisational services.

record_voice_over

Plain language

A Demilitarised Zone (DMZ) in networking is like a buffer area that helps protect an organisation's internal network when dealing with outside parties. Think of it as a way to show outsiders what they need to see without letting them roam around where they're not supposed to be. Without a DMZ, you risk exposing sensitive parts of your network, which can lead to data breaches or unauthorised access.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Feb 2022

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Gateways implement a demilitarised zone if external parties require access to an organisation's services.
policy ASD Information Security Manual (ISM) ISM-0637
priority_high

Why it matters

Without a DMZ, internet-facing services can expose internal networks directly, increasing the likelihood of unauthorised access and data breaches.

settings

Operational notes

Review DMZ firewall rules and segmentation regularly, and monitor DMZ logs for suspicious inbound traffic to ensure internet access cannot reach internal networks.

Mapping detail

Mapping

Direction

Controls