Skip to content
arrow_back
search
ISM-1521 policy ASD Information Security Manual (ISM)

Use Protocol Breaks to Separate Network Layers

Ensure data flows are separated by breaking protocols at each network level for security.

record_voice_over

Plain language

This control is about making sure that the flow of data through different networks has breaks between each layer. Think of it like having walls between rooms in your house to keep each section private and secure. If you don't have these breaks, sensitive information could leak from one network area to another, creating a risk of data breaches.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

S, TS

ISM last updated

Feb 2022

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

CDSs implement protocol breaks at each network layer.
policy ASD Information Security Manual (ISM) ISM-1521
priority_high

Why it matters

Without protocol breaks between network layers, traffic can traverse unintended paths, enabling cross-layer data leakage and raising the likelihood of compromise.

settings

Operational notes

Regularly verify protocol breaks at each network layer (e.g., gateways/guards), review boundary rules, and monitor for misconfigurations that enable unintended cross-layer flows.

Mapping detail

Mapping

Direction

Controls