Skip to content
Control Stack logo Control Stack
ISM-1130 ASD Information Security Manual (ISM)

Use Enclosed Systems for Shared Facility Cables

Ensure cables in shared buildings are placed in closed pathways to prevent tampering.

🏛️ Framework

ASD Information Security Manual (ISM)

🧭 Control effect

Preventative

🔐 Classifications

NC, OS, P, S, TS

🗓️ ISM last updated

Nov 2021

✏️ Control Stack last updated

22 Feb 2026

🎯 E8 maturity levels

N/A

Official control statement
In shared facilities, cables are run in an enclosed cable reticulation system.

Source: ASD Information Security Manual (ISM)

Plain language

In buildings where different organisations share space, it's important to keep computer cables secure by running them through closed systems. This prevents anyone from tampering with the cables, which could lead to data breaches or network disruptions.

Why it matters

Exposed shared-facility cabling can be tampered with or intercepted, causing data exposure or outages and disrupting continuity.

Operational notes

Inspect enclosed cable reticulation for damage or unauthorised access, and record any cable moves/additions in change logs.

Implementation tips

  • Facilities managers should work with IT staff to identify all areas where cables are shared with other organisations. Document these areas and prioritise them for upgrading to enclosed systems.
  • The IT team should select appropriate enclosed cable trays or conduits based on the building's layout. Choose materials that are durable and provide secure fittings to prevent unauthorized access.
  • Installation contractors should follow best practices for setting up enclosed cable systems. Ensure they use tamper-proof screws and secure the sections together to prevent easy access.
  • Security officers should regularly inspect the enclosed systems for signs of tampering. They can be trained to look for loose fittings or any damage that might indicate attempted breaches.
  • Office managers can coordinate with building maintenance to ensure routine checks of the enclosed systems. Schedule these checks to occur monthly and keep a log of inspections and any maintenance performed.

Audit / evidence tips

  • Ask: the floor plan showing all cable pathways in shared areas

  • Good: log shows consistent monthly checks and prompt repair records if tampering is noted

  • Ask: to see the specification documents for the materials used in the system: Confirm that they match the requirements for security and durability

    Good: document includes specs like material type, thickness, and security features

  • Ask: visual documentation of installations, like photos

Cross-framework mappings

How ISM-1130 relates to controls across ISO/IEC 27001, Essential Eight, and ASD ISM.

These mappings show relationships between controls across frameworks. They do not imply full equivalence or certification.

ISO 27001

Control Notes Details
Partially meets (2)
Annex A 7.3 ISM-1130 addresses a specific physical security design requirement for cabling in shared facilities by mandating enclosed cable reticulat...
Annex A 7.12 ISM-1130 requires that, in shared facilities, cables are run in an enclosed cable reticulation system to reduce the risk of tampering or ...

Mapping detail

Mapping

Direction

Controls