Avoid Static IP Addressing on Wireless Networks
Don't use fixed IP addresses for devices on wireless networks to enhance security.
Plain language
This control means you shouldn't give wireless devices fixed IP addresses. If you do, it can make your network more vulnerable to hackers who might try to sneak in by guessing or intercepting these fixed spots. By using dynamic addresses instead, it's harder for anyone with bad intentions to predict how to access your network.
Framework
ASD Information Security Manual (ISM)
Control effect
Preventative
Classifications
NC, OS, P, S, TS
ISM last updated
Aug 2018
Control Stack last updated
19 Mar 2026
E8 maturity levels
N/A
Official control statement
Static addressing is not used for assigning IP addresses on wireless networks.
Why it matters
Static IPs on wireless networks can be predictably targeted by attackers, increasing the risk of unauthorised access and data breaches.
Operational notes
Regularly confirm wireless uses DHCP and check for fixed IP entries (reservations/manual settings) to prevent unauthorised static addressing.
Implementation tips
- IT team should configure the wireless network to use dynamic addressing, known as DHCP (Dynamic Host Configuration Protocol). This means setting up the router to automatically give each connected device a temporary IP address, which can change each time the device reconnects.
- System administrators should regularly check the router settings. Ensure that DHCP is enabled and that there are no devices with static IP entries that could be exploited by intruders.
- Network security managers should educate all staff on the importance of using dynamic IP addresses. Hold a brief training session explaining how static IPs might make the network vulnerable and the benefits of dynamic addresses.
- Technical support should monitor the network using available tools to ensure no devices are using static IP addresses without authorisation. Implement network scanning tools that can alert you to any fixed IPs in use.
- Facility managers should collaborate with IT to ensure any network-connected equipment is set up to receive dynamic IPs. Review the setup instructions for connected devices like printers or smart TVs to confirm they support DHCP and are configured to use it.
Audit / evidence tips
-
AskDHCP configuration reports
Goodincludes screenshots or logs indicating that DHCP is enabled and functioning correctly
-
Goodshows no static IP addresses in the list or a clear and justified exception for each one
-
Askrecords of security awareness training sessions
Goodincludes training slides or attendance records showing the topic was covered
-
Goodreflects a consistent process across team members
-
Goodincludes logs demonstrating regular detection and correction of static IP issues
Cross-framework mappings
How ISM-1319 relates to controls across ISO/IEC 27001, Essential Eight, and ASD ISM.
ISO 27001
| Control | Notes | Details |
|---|---|---|
| layers Partially meets (2) expand_less | ||
| Annex A 8.9 | ISM-1319 requires organisations to avoid static IP addressing on wireless networks as a specific configuration choice to reduce risk | |
| Annex A 8.20 | ISM-1319 requires organisations to avoid using static IP addressing for devices on wireless networks | |
These mappings show relationships between controls across frameworks. They do not imply full equivalence or certification.