Skip to content
arrow_back
search
ISM-1321 policy ASD Information Security Manual (ISM)

Implement EAP-TLS for Secure Wireless Authentication

Use secure EAP-TLS with certificates to authenticate devices and disable other methods.

record_voice_over

Plain language

This control is about making sure the devices on your wireless network are who they say they are by using digital certificates for authentication. It matters because if an unauthorised device gets access, it could lead to data breaches, financial loss, or even damage to your organisation's reputation.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Aug 2021

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

802.1X authentication with EAP-TLS, using X.509 certificates, is used for mutual authentication; with all other EAP methods disabled on supplicants and authentication servers.
policy ASD Information Security Manual (ISM) ISM-1321
priority_high

Why it matters

Without EAP-TLS mutual authentication (X.509), rogue clients/APs can connect, enabling Wi‑Fi interception and unauthorised access to internal services.

settings

Operational notes

Maintain PKI: renew/revoke X.509 certs, validate chain/expiry, and enforce 802.1X EAP-TLS only by disabling PEAP/other EAP types on clients and RADIUS.

Mapping detail

Mapping

Direction

Controls