Skip to content
arrow_back
search
ISM-1322 policy ASD Information Security Manual (ISM)

Assessing 802.1X Components in Wireless Networks

Use evaluated devices and servers for secure wireless network authentication.

record_voice_over

Plain language

When you connect to wireless internet at home or work, you want to make sure only the right people have access. This control ensures that devices and servers involved in allowing people onto the network are properly checked and secure. If you skip this step, unauthorised people could get in, potentially leading to sensitive information being stolen or the network being disrupted.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Aug 2021

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Evaluated supplicants, authenticators, wireless access points and authentication servers are used in wireless networks.
policy ASD Information Security Manual (ISM) ISM-1322
priority_high

Why it matters

Without evaluated 802.1X components, intruders can bypass network access controls, leading to data breaches and service disruptions.

settings

Operational notes

Verify supplicants, APs, authenticators and AAA servers are evaluated/approved, and keep their firmware current.

Mapping detail

Mapping

Direction

Controls