Skip to content
arrow_back
search
ISM-1198 policy ASD Information Security Manual (ISM)

Secure Bluetooth Pairing for Mobile Devices

Ensure Bluetooth connections for devices are only made with intended, authorised equipment.

record_voice_over

Plain language

When you pair your mobile devices with Bluetooth, it's like making a new friend online. You want to be sure the person is who they say they are. If you're not careful, someone else could trick you into sharing things with them, putting your business and sensitive information at risk.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P

ISM last updated

Nov 2024

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Bluetooth pairing for non-classified, OFFICIAL: Sensitive and PROTECTED mobile devices is performed in a manner such that connections are only made between intended Bluetooth devices.
policy ASD Information Security Manual (ISM) ISM-1198
priority_high

Why it matters

If Bluetooth pairing isn’t secured, unintended devices may connect to mobile devices, enabling eavesdropping or data access and causing disruption.

settings

Operational notes

Regularly review paired devices, remove unknown pairings, and keep Bluetooth off when not required to prevent connections to unintended devices.

Mapping detail

Mapping

Direction

Controls