Skip to content
arrow_back
search
ISM-1364 policy ASD Information Security Manual (ISM)

Separate VLANs by Security Domains

Ensure VLANs from different security domains use separate network interfaces to avoid cross-traffic.

record_voice_over

Plain language

When you're organising your computer network, imagine it like different sections in a department store. This control is about ensuring each section (or VLAN) is kept on its own floor, preventing items (or data) from accidentally ending up in the wrong place. This matters because if sections aren't kept separate, sensitive information can accidentally end up where it shouldn't, leading to data breaches and potential legal troubles.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Nov 2021

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Network devices managing VLANs terminate VLANs belonging to different security domains on separate physical network interfaces.
policy ASD Information Security Manual (ISM) ISM-1364
priority_high

Why it matters

Without separate physical interfaces per security domain, VLAN termination can allow unintended inter-domain routing, increasing risk of data leakage.

settings

Operational notes

Confirm VLANs for different security domains are terminated on separate physical interfaces; review trunks/SVIs and change records to prevent shared termination.

Mapping detail

Mapping

Direction

Controls