Skip to content
arrow_back
search
ISM-1182 policy ASD Information Security Manual (ISM)

Implement Network Traffic Control Measures

Restrict network traffic flow to ensure it only supports business needs.

record_voice_over

Plain language

This control is about making sure network traffic in your organisation is limited to only what is necessary for your business. By restricting unnecessary network connections, you protect your business from cyber threats and data breaches, keeping sensitive information safe.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Aug 2023

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Network access controls are implemented to limit the flow of network traffic within and between network segments to only that required for business purposes.
policy ASD Information Security Manual (ISM) ISM-1182
priority_high

Why it matters

Without network access controls between segments, unnecessary traffic paths enable lateral movement and data exfiltration across internal networks.

settings

Operational notes

Maintain allow-listed inter-segment rules (deny by default), review firewall/ACL changes, and monitor east-west flows to confirm only business-required traffic is permitted.

Mapping detail

Mapping

Direction

Controls