Skip to content
arrow_back
search
ISM-1178 policy ASD Information Security Manual (ISM)

Limit Network Documentation for Third Parties

When sharing network details, only provide what's needed for others to fulfill their contracts.

record_voice_over

Plain language

Only share network details with third parties that they absolutely need to do their job. This is important because giving away too much information can make your systems vulnerable to security breaches or misuse.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Aug 2018

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Network documentation provided to a third party, or published in public tender documentation, only contains details necessary for other parties to undertake contractual services.
policy ASD Information Security Manual (ISM) ISM-1178
priority_high

Why it matters

Over-sharing network diagrams, IP ranges, and access paths with third parties can enable targeted intrusion, raising breach and outage risk.

settings

Operational notes

Before sharing with vendors/tenders, redact non-essential details (e.g., IP ranges, device names, trust links) and record approvals for released docs.

Mapping detail

Mapping

Direction

Controls