Skip to content
arrow_back
search
ISM-1074 policy ASD Information Security Manual (ISM)

Controlling Access to Critical IT Infrastructure

Ensure keys to server and communication rooms are securely managed.

record_voice_over

Plain language

This control is about keeping the keys to important areas like server rooms secure so that only authorised people can access them. If we don't keep these keys safe, unauthorised people might enter these critical areas, potentially damaging equipment, stealing data, or causing service disruptions.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Nov 2024

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Keys or equivalent access mechanisms to server rooms, communications rooms and security containers are appropriately controlled.
policy ASD Information Security Manual (ISM) ISM-1074
priority_high

Why it matters

Poor control of access keys could allow unauthorised entry to critical infrastructure, leading to data theft, sabotage, or severe operational disruptions.

settings

Operational notes

Audit server room and comms room key registers regularly; revoke access for leavers and investigate missing keys immediately.

Mapping detail

Mapping

Direction

Controls