Skip to content
arrow_back
search
ISM-1014 policy ASD Information Security Manual (ISM)

Implement Individual Logins for Secure IP Phone Use

Ensure each user has a unique login when using IP phones for secret conversations.

record_voice_over

Plain language

This control means making sure each person using an IP phone for a confidential chat has their own unique login. Without this, anyone could listen in on private conversations, risking leaks of sensitive information that could harm your business or client trust.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

S, TS

ISM last updated

Nov 2021

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Individual logins are implemented for IP phones used for SECRET or TOP SECRET conversations.
policy ASD Information Security Manual (ISM) ISM-1014
priority_high

Why it matters

If IP phones used for SECRET/TOP SECRET calls lack individual logins, users can’t be verified, enabling unauthorised use and weakening call accountability.

settings

Operational notes

Ensure each secure IP phone has a unique user login, promptly disable departed users, and regularly review account-to-handset assignments for SECRET/TOP SECRET use.

Mapping detail

Mapping

Direction

Controls