Skip to content
arrow_back
search
ISM-1457 policy ASD Information Security Manual (ISM)

Evaluate Peripheral Switches for Security Domains

Ensure devices used to share equipment between classified systems meet high security standards.

record_voice_over

Plain language

This control is about ensuring that when you're using devices (like switches) to share equipment (like keyboards and monitors) between high-security computers, those devices are very secure themselves. If they're not secure, they could let sensitive information from one system accidentally mix with information from another, potentially leading to data leaks or security breaches.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

S, TS

ISM last updated

Feb 2022

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Evaluated peripheral switches used for sharing peripherals between SECRET and TOP SECRET systems, or between SECRET or TOP SECRET systems belonging to different security domains, preferably complete a high assurance evaluation.
policy ASD Information Security Manual (ISM) ISM-1457
priority_high

Why it matters

If peripheral switches aren’t high-assurance evaluated, SECRET/TOP SECRET data may leak between security domains, compromising classified operations.

settings

Operational notes

Regularly verify high assurance evaluations for new or updated switches, ensuring they meet cross-domain security requirements.

Mapping detail

Mapping

Direction

Controls