Skip to content
arrow_back
search
ISM-1598 policy ASD Information Security Manual (ISM)

Inspect IT Equipment Post-Maintenance for Unauthorised Changes

After maintenance, check that IT equipment is the same as it was and has no unauthorised changes.

record_voice_over

Plain language

After your IT equipment has been fixed or worked on, you should check it over to make sure nothing has been changed without your go-ahead. This is important because unauthorised changes could lead to sensitive data leaks, system failures, or even security breaches, putting your business at risk.

Framework

ASD Information Security Manual (ISM)

Control effect

Detective

Classifications

NC, OS, P, S, TS

ISM last updated

May 2025

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Following maintenance or repair activities for IT equipment, the IT equipment is inspected to confirm it retains its approved configuration and that no unauthorised modifications have taken place.
policy ASD Information Security Manual (ISM) ISM-1598
priority_high

Why it matters

If post-maintenance inspections are missed, devices may return with altered configs or added components, creating vulnerabilities, outages or data exposure.

settings

Operational notes

After any repair/maintenance, compare device settings/firmware to the approved baseline and record results; escalate and remediate any unauthorised changes.

Mapping detail

Mapping

Direction

Controls