Skip to content
arrow_back
search
ISM-1530 policy ASD Information Security Manual (ISM)

Secure Classified Equipment in Suitable Security Containers

Keep classified IT equipment in secure containers based on their classification and location's security zone.

record_voice_over

Plain language

This control is about keeping sensitive IT equipment, like servers and network devices, safe from unauthorised access by storing them in secure containers. It matters because if these items are not properly protected, someone could tamper with them, leading to data breaches, loss of sensitive information, or disruptions to business operations.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

OS, P, S, TS

ISM last updated

Nov 2024

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Classified servers, network devices and cryptographic equipment are secured in security containers suitable for their classification taking into account the combination of security zones they reside in.
policy ASD Information Security Manual (ISM) ISM-1530
priority_high

Why it matters

If classified servers, network devices or crypto gear aren’t stored in suitable security containers, they can be accessed or tampered with, causing classified data compromise and service disruption.

settings

Operational notes

Regularly inspect security containers for tampering, confirm locks/alarms work, and verify containers are rated suitable for the equipment’s classification and zone combination.

Mapping detail

Mapping

Direction

Controls