Skip to content
arrow_back
search
ISM-1386 policy ASD Information Security Manual (ISM)

Restrict Network Management Traffic Origin

Only authorised admin systems should manage network settings, ensuring security and control.

record_voice_over

Plain language

This control means that only certain computers or systems that have been approved can make changes to your network settings. This is important because if anyone could change these settings, it could lead to unauthorized access or disruptions in your services, causing potential harm to your business operations.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Feb 2022

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Network management traffic can only originate from administrative infrastructure.
policy ASD Information Security Manual (ISM) ISM-1386
priority_high

Why it matters

If network management traffic can originate from non-admin systems, attackers can gain device control, change configs, and disrupt routing/switching services.

settings

Operational notes

Allow management protocols only from admin hosts/subnets (e.g., jump hosts) via ACLs and mgmt VLANs; block all other sources and log attempts.

Mapping detail

Mapping

Direction

Controls