Skip to content
arrow_back
search
ISM-1604 policy ASD Information Security Manual (ISM)

Hardening Virtual Server Isolation Configuration

Secure virtual servers by simplifying controls and restricting admin interface access.

record_voice_over

Plain language

This control is about making sure that virtual servers, which are like digital versions of physical servers, are kept secure by limiting what they can do and who can access them for management. If this isn't done, hackers might get access to sensitive information or even take control of your servers, which could lead to data breaches, downtime, and damage to your reputation.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

July 2020

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

When using a software-based isolation mechanism to share a physical server's hardware, the configuration of the isolation mechanism is hardened by removing unneeded functionality and restricting access to the administrative interface used to manage the isolation mechanism.
policy ASD Information Security Manual (ISM) ISM-1604
priority_high

Why it matters

Poorly isolated virtual servers are vulnerable to cross-tenant attacks and data leakage, risking critical data theft and service outages.

settings

Operational notes

Review hypervisor/admin interface access regularly (MFA, least privilege) and disable unused isolation features/plugins to reduce attack surface.

Mapping detail

Mapping

Direction

Controls