Use Enclosed Systems for Shared Facility Cables
Ensure cables in shared buildings are placed in closed pathways to prevent tampering.
Plain language
In buildings where different organisations share space, it's important to keep computer cables secure by running them through closed systems. This prevents anyone from tampering with the cables, which could lead to data breaches or network disruptions.
Framework
ASD Information Security Manual (ISM)
Control effect
Preventative
Classifications
NC, OS, P, S, TS
ISM last updated
Nov 2021
Control Stack last updated
19 Mar 2026
E8 maturity levels
N/A
Section
Cabling infrastructureOfficial control statement
In shared facilities, cables are run in an enclosed cable reticulation system.
Why it matters
Exposed shared-facility cabling can be tampered with or intercepted, causing data exposure or outages and disrupting continuity.
Operational notes
Inspect enclosed cable reticulation for damage or unauthorised access, and record any cable moves/additions in change logs.
Implementation tips
- Facilities managers should work with IT staff to identify all areas where cables are shared with other organisations. Document these areas and prioritise them for upgrading to enclosed systems.
- The IT team should select appropriate enclosed cable trays or conduits based on the building's layout. Choose materials that are durable and provide secure fittings to prevent unauthorized access.
- Installation contractors should follow best practices for setting up enclosed cable systems. Ensure they use tamper-proof screws and secure the sections together to prevent easy access.
- Security officers should regularly inspect the enclosed systems for signs of tampering. They can be trained to look for loose fittings or any damage that might indicate attempted breaches.
- Office managers can coordinate with building maintenance to ensure routine checks of the enclosed systems. Schedule these checks to occur monthly and keep a log of inspections and any maintenance performed.
Audit / evidence tips
-
Askthe floor plan showing all cable pathways in shared areas
-
Goodlog shows consistent monthly checks and prompt repair records if tampering is noted
-
Askto see the specification documents for the materials used in the system: Confirm that they match the requirements for security and durability
Gooddocument includes specs like material type, thickness, and security features
-
Askvisual documentation of installations, like photos
Cross-framework mappings
How ISM-1130 relates to controls across ISO/IEC 27001, Essential Eight, and ASD ISM.
ISO 27001
| Control | Notes | Details |
|---|---|---|
| layers Partially meets (2) expand_less | ||
| Annex A 7.3 | ISM-1130 addresses a specific physical security design requirement for cabling in shared facilities by mandating enclosed cable reticulat... | |
| Annex A 7.12 | ISM-1130 requires that, in shared facilities, cables are run in an enclosed cable reticulation system to reduce the risk of tampering or ... | |
These mappings show relationships between controls across frameworks. They do not imply full equivalence or certification.