Skip to content
arrow_back
search
ISM-1633 policy ASD Information Security Manual (ISM)

Implement Emanation Security Mitigation Recommendations

System owners must follow emanation security advice to protect their systems.

record_voice_over

Plain language

Emanation security is all about stopping unwanted signals or interference from leaking out of your equipment, which could be picked up by others. If someone captures these signals, they might see sensitive information or even cause system disruptions.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Mar 2026

Control Stack last updated

24 Mar 2026

E8 maturity levels

N/A

Official control statement

System owners, in consultation with each system’s authorising officer, determine the system boundary, business criticality, and security and resilience objectives for each system based on an assessment of the impact if it were to be compromised or attacked.
policy ASD Information Security Manual (ISM) ISM-1633
priority_high

Why it matters

Without these protections, sensitive business data could be captured from your equipment's signals, leading to data breaches or operational disruption.

settings

Operational notes

Regularly check and update equipment for emanation security compliance, ensuring all shielding measures remain effective and up-to-date.

Mapping detail

Mapping

Direction

Controls