Skip to content
arrow_back
search
ISM-0705 policy ASD Information Security Manual (ISM)

Disable Split Tunnelling for VPN Connections

Ensure that devices accessing the organisation's network through VPN do not use split tunnelling for security.

record_voice_over

Plain language

This control is about turning off a feature called 'split tunnelling' on Virtual Private Network (VPN) connections. If devices use split tunnelling, they can access the internet directly while also being on your company's network, which makes it easier for hackers to sneak in without being noticed. Disabling split tunnelling forces all internet traffic to go through the secure company network, which reduces the risk of cyber attacks.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Nov 2021

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

When accessing an organisation's network via a VPN connection, split tunnelling is disabled.
policy ASD Information Security Manual (ISM) ISM-0705
priority_high

Why it matters

Allowing split tunnelling on VPNs can expose sensitive data and enable attacks via the user’s unsecured internet path while connected to the corporate network.

settings

Operational notes

Audit VPN client/gateway configs to confirm split tunnelling is disabled; monitor for users enabling it and enforce via central policies/profiles.

Mapping detail

Mapping

Direction

Controls