Skip to content
arrow_back
search
ISM-1528 policy ASD Information Security Manual (ISM)

Utilising Evaluated Firewalls for Network Security

Firewalls are installed to separate the organisation's networks from the public internet, enhancing security.

record_voice_over

Plain language

This control is about using firewalls that have been tested and evaluated to help keep your organisation's network safe from the public internet. It matters because, without proper protection, cybercriminals can access sensitive information, damage systems, or disrupt business operations, leading to financial loss and reputational harm.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Feb 2022

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Evaluated firewalls are used between an organisation's networks and public network infrastructure.
policy ASD Information Security Manual (ISM) ISM-1528
priority_high

Why it matters

Without evaluated firewalls at the boundary to public networks, perimeter attacks can bypass filtering, enabling data theft and service disruption.

settings

Operational notes

Deploy ASD/NIAP-evaluated firewalls at all public network boundaries; review rule sets, logging and firmware monthly to maintain assurance.

Mapping detail

Mapping

Direction

Controls