Skip to content
arrow_back
search
ISM-1750 policy ASD Information Security Manual (ISM)

Segregation of Administrative Infrastructure for Server Security

Keep management systems for different types of servers separate to ensure better security.

record_voice_over

Plain language

This control is about keeping the management systems for different types of servers, like your critical business systems and everyday servers, separate. This matters because if these systems are compromised, it could disrupt your business operations or expose sensitive information. By isolating administration setups, you reduce the risk of a security issue spreading across all your servers.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Feb 2022

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Administrative infrastructure for critical servers, high-value servers and regular servers is segregated from each other.
policy ASD Information Security Manual (ISM) ISM-1750
priority_high

Why it matters

If admin infrastructure is not segregated, compromise of lower-tier admin systems could pivot into critical server administration and enable outages or data theft.

settings

Operational notes

Segregate admin networks, jump hosts and accounts by server tier (critical/high-value/regular); block cross-tier access and routinely review firewall rules and admin group membership.

Mapping detail

Mapping

Direction

Controls