Skip to content
arrow_back
search
ISM-1200 policy ASD Information Security Manual (ISM)

Secure Bluetooth Pairing for Mobile Devices

Use secure methods when pairing Bluetooth on sensitive mobile devices, like numeric comparison.

record_voice_over

Plain language

When pairing a mobile device with Bluetooth, especially if the device stores sensitive information, it's important to use secure methods like checking a number on both devices. This protects your information from being intercepted by others, which could lead to data breaches or unauthorised access to your device.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P

ISM last updated

Nov 2024

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Bluetooth pairing for non-classified, OFFICIAL: Sensitive and PROTECTED mobile devices is performed using Secure Connections, preferably with Numeric Comparison if supported.
policy ASD Information Security Manual (ISM) ISM-1200
priority_high

Why it matters

Without Secure Connections Bluetooth pairing (preferably Numeric Comparison), nearby attackers may intercept traffic or spoof devices, exposing OFFICIAL: Sensitive/PROTECTED data.

settings

Operational notes

Configure devices to require Secure Connections pairing and use Numeric Comparison where supported; periodically test pairing prompts and remove/deny unknown or legacy pairings.

Mapping detail

Mapping

Direction

Controls