Limit Wireless Range with RF Shielding
RF shielding is used to control the wireless signal range and keep it limited to an organisation's secure area.
Plain language
This control is about using something called RF shielding to prevent wireless network signals from leaking outside your organisation's secure area. It's important because if wireless signals travel beyond your walls, unauthorised people outside could potentially intercept sensitive information, which could lead to data breaches and loss of privacy.
Framework
ASD Information Security Manual (ISM)
Control effect
Preventative
Classifications
S, TS
ISM last updated
Nov 2021
Control Stack last updated
19 Mar 2026
E8 maturity levels
N/A
Official control statement
The effective range of wireless communications outside an organisation's area of control is limited by implementing RF shielding on facilities in which SECRET or TOP SECRET wireless networks are used.
Why it matters
Without RF shielding, SECRET/TOP SECRET wireless signals may extend beyond the controlled area, enabling interception and compromising sensitive information.
Operational notes
Regularly test RF shield coverage (site surveys) and inspect seams, doors and penetrations so SECRET/TOP SECRET wireless signals remain within the controlled perimeter.
Implementation tips
- Facilities Manager should ensure that RF shielding is installed in areas using high-security wireless networks. They can do this by working with an RF shielding contractor to assess the current setup and install appropriate materials like special paints, films, or mesh that block wireless signals.
- IT Team should regularly check the strength and reach of your organisation’s wireless signals. They can perform wireless signal mapping to identify if there are any leaks beyond what’s desired and adjust the shielding or network configurations accordingly.
- Security Officer should draft and maintain a wireless network range policy. This policy should outline the acceptable range for wireless networks within the building and steps to mitigate any detected breaches.
- Network Administrator should configure the wireless access points to limit their broadcast strength wherever possible. This could include adjusting the power settings on routers to reduce the signal range, complementing the physical RF shielding.
- Procurement Team should source materials and services needed to implement RF shielding. They need to work with vendors who specialize in RF technologies to ensure all products meet the necessary security specifications.
Audit / evidence tips
-
Askthe RF shielding assessment report: Request the latest report provided by the RF shielding contractor
-
Aska copy of the wireless network range policy: Ensure it describes the acceptable range and required shielding measures. The best policy will have clear, actionable steps and a review date indicating regular checks
-
Askdocumentation on training or awareness activities around wireless security: Check if staff received guidance on maintaining secured wireless environments. Good records include participant lists, training content, and feedback
Cross-framework mappings
How ISM-1013 relates to controls across ISO/IEC 27001, Essential Eight, and ASD ISM.
ISO 27001
| Control | Notes | Details |
|---|---|---|
| layers Partially meets (1) expand_less | ||
| Annex A 7.6 | ISM-1013 requires RF shielding to limit the effective range of SECRET or TOP SECRET wireless networks outside the organisation’s area of ... | |
These mappings show relationships between controls across frameworks. They do not imply full equivalence or certification.