Skip to content
arrow_back
search
ISM-0687 policy ASD Information Security Manual (ISM)

Use Approved Platforms for Secure Mobile Access

Use only ASD-approved mobile platforms for accessing SECRET or TOP SECRET data.

record_voice_over

Plain language

For data that's really sensitive, like secret or top-secret government information, it's crucial to use mobile devices that have been checked and approved by experts in Australia. This is important because if we use insecure devices, there's a risk that confidential data could be stolen or leaked, which could lead to serious national security issues.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

S, TS

ISM last updated

Aug 2023

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Mobile devices that access SECRET or TOP SECRET systems or data use mobile platforms that have been issued an Approval for Use by ASD and are operated in accordance with the latest version of their associated Australian Communications Security Instruction.
policy ASD Information Security Manual (ISM) ISM-0687
priority_high

Why it matters

Using non-approved mobile platforms for SECRET data can lead to unauthorised access and severe national security breaches.

settings

Operational notes

Use only ASD Approval for Use mobile platforms for SECRET/TOP SECRET access, and operate them per the latest ACSI, including configuration and update requirements.

Mapping detail

Mapping

Direction

Controls