Skip to content
arrow_back
search
ISM-1627 policy ASD Information Security Manual (ISM)

Block Inbound Traffic from Anonymity Networks

Block connections from anonymous networks to keep the organisation's network secure.

record_voice_over

Plain language

This control is about blocking traffic from networks that let users hide their identity, such as those used for anonymous browsing. If these are not blocked, people with bad intentions could bypass security measures and access sensitive parts of your network, potentially leading to data theft or the spread of malware.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Aug 2023

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Inbound network connections from anonymity networks are blocked.
policy ASD Information Security Manual (ISM) ISM-1627
priority_high

Why it matters

If inbound traffic from Tor and other anonymity networks isn’t blocked, attackers can probe and access services while hiding attribution, increasing breach risk.

settings

Operational notes

Maintain deny rules for known Tor exit nodes and similar networks using refreshed threat intel lists, and alert on repeated blocked connection attempts.

Mapping detail

Mapping

Direction

Controls