Skip to content
arrow_back
search
ISM-0694 policy ASD Information Security Manual (ISM)

Restrict Access of Private Devices to Secret Systems

Private devices must not access data or systems classified as SECRET or TOP SECRET.

record_voice_over

Plain language

This control means that personal devices like your own mobile phone or home computer should not be used to access really sensitive information or systems at your workplace. It matters because if personal devices, which might not be as secure, are used to access sensitive data, it could lead to that information being stolen or misused, causing serious harm to your organisation.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

S, TS

ISM last updated

Aug 2023

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Privately-owned mobile devices and desktop computers do not access SECRET and TOP SECRET systems or data.
policy ASD Information Security Manual (ISM) ISM-0694
priority_high

Why it matters

Allowing privately-owned devices to access SECRET/TOP SECRET systems increases malware and exfiltration risk, causing classified data compromise and major operational harm.

settings

Operational notes

Block BYOD at network and identity layers: enforce certificate-based allowlists, NAC/MDM checks, and regularly review logs to detect any private device connections.

Mapping detail

Mapping

Direction

Controls