Skip to content
arrow_back
search
ISM-0829 policy ASD Information Security Manual (ISM)

Detect Unauthorised RF Devices in Secure Areas

Use security measures to find and handle unauthorised RF devices in secure zones.

record_voice_over

Plain language

This control is about making sure no one sneaks in devices that send or receive radio signals into secure areas, like places where top-secret information is kept. These unauthorised gadgets, if undetected, could be used to listen in on conversations or steal sensitive data, putting your organisation at serious risk.

Framework

ASD Information Security Manual (ISM)

Control effect

Detective

Classifications

S, TS

ISM last updated

Feb 2019

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Security measures are used to detect and respond to unauthorised RF devices in SECRET and TOP SECRET areas.
policy ASD Information Security Manual (ISM) ISM-0829
priority_high

Why it matters

If unauthorised RF devices are not detected in SECRET/TOP SECRET areas, they can capture or transmit sensitive communications, causing serious data compromise.

settings

Operational notes

Use approved RF detection tools and perform scheduled and random sweeps in SECRET/TOP SECRET areas; tune baselines and investigate alerts promptly.

Mapping detail

Mapping

Direction

Controls