Ensure Cables in TOP SECRET Areas are Inspectable
Cables in highly secure areas must be checked along their entire length for any issues.
Plain language
In areas where top-secret information is handled, it's crucial that all cables can be thoroughly inspected to ensure there are no vulnerabilities. If cables can't be checked properly, there's a risk that someone could tamper with them to steal or interfere with sensitive information, potentially leading to a security breach.
Framework
ASD Information Security Manual (ISM)
Control effect
Detective
Classifications
NC, OS, P, S, TS
ISM last updated
Nov 2021
Control Stack last updated
19 Mar 2026
E8 maturity levels
N/A
Section
Cabling infrastructureTopic
Cable InspectabilityOfficial control statement
Cables in TOP SECRET areas are fully inspectable for their entire length.
Why it matters
If cables in TOP SECRET areas cannot be inspected end-to-end, tampering or covert taps may go undetected, enabling data compromise and integrity loss.
Operational notes
Route and secure cables so the full length is visible and accessible (no concealed runs). Record periodic inspections and investigate any unviewable sections immediately.
Implementation tips
- The IT team should conduct a thorough review of all cables in top-secret areas. They need to ensure every cable is accessible and not hidden or blocked by walls or furniture, allowing for visual inspection down its entire length.
- The facilities manager should work with contractors to install cable trays or conduits in top-secret areas. This setup keeps cables organised and visible, making them easy to inspect regularly.
- Security personnel should be tasked with scheduling regular inspections. They should check for any signs of tampering or wear and immediately report any suspicious findings to IT or management.
- Management should implement a checklist for inspecting cables. This checklist can guide staff on what to look for during inspections, such as checking that cable covers are intact and no cables are damaged.
- The office manager should keep an updated map of all cable routes in top-secret areas. This map helps inspection teams know where every cable runs and supports quick response if any issues are detected.
Audit / evidence tips
-
Aska recent cable inspection report: Request a document showing the latest inspections conducted in top-secret areas
Goodshould show regular inspections with no untreated problems
-
Aska maintenance log: Request records tracking maintenance actions on cabling in secure areas. Check these entries include exact dates and specific tasks carried out
Goodlog lists routine checks and any repairs made promptly
-
Goodrecord confirms thorough and professional installation supporting inspectability
-
Askabout staff training records: Request documents showing training for staff involved in cable inspections. Ensure the records show proper training regarding what to look for and how to report issues
Goodshows completed training for all relevant personnel
Cross-framework mappings
How ISM-1119 relates to controls across ISO/IEC 27001, Essential Eight, and ASD ISM.
ISO 27001
| Control | Notes | Details |
|---|---|---|
| layers Partially meets (1) expand_less | ||
| Annex A 7.12 | ISM-1119 requires that cables in TOP SECRET areas are fully inspectable for their entire length to enable detection of tampering or compr... | |
| sync_alt Partially overlaps (2) expand_less | ||
| Annex A 7.5 | ISM-1119 requires cables in TOP SECRET areas to be fully inspectable for their entire length to reduce the risk of undetected physical co... | |
| Annex A 7.8 | ISM-1119 requires that cables in TOP SECRET areas are fully inspectable for their entire length to make tampering or illicit taps detectable | |
These mappings show relationships between controls across frameworks. They do not imply full equivalence or certification.