Skip to content
arrow_back
search
ISM-1195 policy ASD Information Security Manual (ISM)

Enforce Policy with Evaluated Mobile Device Management

Use certified management solutions to ensure mobile devices follow security policies.

record_voice_over

Plain language

This control ensures that mobile devices, like phones and tablets used for work, are managed by trustworthy software that follows strict Australian standards for security. If this isn't done, sensitive business information could be at risk if, for example, a device is lost or hacked.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Aug 2023

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Mobile Device Management solutions that have completed a Common Criteria evaluation against the Protection Profile for Mobile Device Management, version 4.0 or later, are used to enforce mobile device management policy.
policy ASD Information Security Manual (ISM) ISM-1195
priority_high

Why it matters

Without a Common Criteria evaluated MDM (PP v4.0+), policy enforcement may fail, increasing loss or compromise risks from stolen or unmanaged mobile devices.

settings

Operational notes

Confirm the MDM product remains Common Criteria evaluated against the MDM PP v4.0+ and enforce enrolment, compliance checks and remote wipe for all managed mobile devices.

Mapping detail

Mapping

Direction

Controls