Skip to content
arrow_back
search
ISM-1460 policy ASD Information Security Manual (ISM)

Ensure Secure Design in Virtual Server Isolation

Use isolation software from vendors that prioritize security in their design and development.

record_voice_over

Plain language

When you're running multiple virtual servers on a single physical machine, ensuring secure design means choosing software from companies that make safety their top priority. This is crucial because poorly designed software can lead to vulnerabilities, potentially allowing hackers to access sensitive information across all the servers sharing that machine.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Feb 2025

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

When using a software-based isolation mechanism to share a physical server's hardware, the isolation mechanism is from a vendor that has demonstrated a commitment to Secure by Design and Secure by Default principles and practices, including secure programming practices and either memory-safe programming languages or less preferably memory-safe programming practices.
policy ASD Information Security Manual (ISM) ISM-1460
priority_high

Why it matters

Without a Secure-by-Design isolation layer, attackers can exploit hypervisor flaws to escape a VM and access other tenants’ data.

settings

Operational notes

Select an isolation vendor with a proven Secure-by-Design program and evidence of memory-safe languages or practices; review patch cadence and advisories.

Mapping detail

Mapping

Direction

Controls