Use Enclosed Systems for Shared Facility Cables
Ensure cables in shared buildings are placed in closed pathways to prevent tampering.
🏛️ Framework
ASD Information Security Manual (ISM)
🧭 Control effect
Preventative
🔐 Classifications
NC, OS, P, S, TS
🗓️ ISM last updated
Nov 2021
✏️ Control Stack last updated
22 Feb 2026
🎯 E8 maturity levels
N/A
Section
Cabling infrastructureIn shared facilities, cables are run in an enclosed cable reticulation system.
Source: ASD Information Security Manual (ISM)
Plain language
In buildings where different organisations share space, it's important to keep computer cables secure by running them through closed systems. This prevents anyone from tampering with the cables, which could lead to data breaches or network disruptions.
Why it matters
Exposed shared-facility cabling can be tampered with or intercepted, causing data exposure or outages and disrupting continuity.
Operational notes
Inspect enclosed cable reticulation for damage or unauthorised access, and record any cable moves/additions in change logs.
Implementation tips
- Facilities managers should work with IT staff to identify all areas where cables are shared with other organisations. Document these areas and prioritise them for upgrading to enclosed systems.
- The IT team should select appropriate enclosed cable trays or conduits based on the building's layout. Choose materials that are durable and provide secure fittings to prevent unauthorized access.
- Installation contractors should follow best practices for setting up enclosed cable systems. Ensure they use tamper-proof screws and secure the sections together to prevent easy access.
- Security officers should regularly inspect the enclosed systems for signs of tampering. They can be trained to look for loose fittings or any damage that might indicate attempted breaches.
- Office managers can coordinate with building maintenance to ensure routine checks of the enclosed systems. Schedule these checks to occur monthly and keep a log of inspections and any maintenance performed.
Audit / evidence tips
-
Ask: the floor plan showing all cable pathways in shared areas
-
Good: log shows consistent monthly checks and prompt repair records if tampering is noted
-
Ask: to see the specification documents for the materials used in the system: Confirm that they match the requirements for security and durability
Good: document includes specs like material type, thickness, and security features
-
Ask: visual documentation of installations, like photos
Cross-framework mappings
How ISM-1130 relates to controls across ISO/IEC 27001, Essential Eight, and ASD ISM.
These mappings show relationships between controls across frameworks. They do not imply full equivalence or certification.
ISO 27001
| Control | Notes | Details |
|---|---|---|
| Partially meets (2) | ||
| Annex A 7.3 | ISM-1130 addresses a specific physical security design requirement for cabling in shared facilities by mandating enclosed cable reticulat... | |
| Annex A 7.12 | ISM-1130 requires that, in shared facilities, cables are run in an enclosed cable reticulation system to reduce the risk of tampering or ... | |