Skip to content
arrow_back
search
ISM-1480 policy ASD Information Security Manual (ISM)

Ensure High Assurance for Peripheral Switches

Peripheral switches used between classified and unclassified systems must undergo a thorough security evaluation.

record_voice_over

Plain language

If you have devices that switch connections between highly classified and regular computer systems, it's crucial they undergo a thorough security check. This is to prevent sensitive information from slipping through the cracks and ending up where it shouldn't be.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

S, TS

ISM last updated

Feb 2022

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Evaluated peripheral switches used for sharing peripherals between SECRET or TOP SECRET systems and any non-SECRET or TOP SECRET systems complete a high assurance evaluation.
policy ASD Information Security Manual (ISM) ISM-1480
priority_high

Why it matters

Failing to ensure high assurance for peripheral switches risks data leaks, where classified information may inadvertently transfer to less secure systems.

settings

Operational notes

Maintain evidence the peripheral switch has passed a high assurance evaluation for SECRET/TOP SECRET sharing; replace any unevaluated model.

Mapping detail

Mapping

Direction

Controls