Skip to content
arrow_back
search
ISM-1858 policy ASD Information Security Manual (ISM)

Implement Strict IT Equipment Hardening Guidelines

Use the most restrictive security guidelines to secure IT equipment from unauthorised access.

record_voice_over

Plain language

This control is about making sure your computers and other IT equipment are as secure as possible by following strict security guidelines. It's important because if these guidelines aren't followed, your systems could be more vulnerable to hackers or unauthorized access, which can lead to data loss or other security breaches.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

May 2024

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

IT equipment is hardened using ASD and vendor hardening guidance, with the most restrictive guidance taking precedence when conflicts occur.
policy ASD Information Security Manual (ISM) ISM-1858
priority_high

Why it matters

Failure to apply stringent ASD/vendor hardening guidelines could expose IT systems to unauthorised access, compromising sensitive data and operations.

settings

Operational notes

Baseline builds on ASD and vendor hardening guides; validate regularly and, where guidance conflicts, apply the most restrictive settings and record exceptions.

Mapping detail

Mapping

Direction

Controls