Skip to content
arrow_back
search
ISM-1863 policy ASD Information Security Manual (ISM)

Restrict Exposure of Network Management Interfaces

IT equipment management interfaces should not be accessible from the internet to enhance security.

record_voice_over

Plain language

This control is about keeping the parts of your office technology that let you manage and control those systems away from the public internet. Think of it like keeping the keys to your store locked up. If these management tools are available online, someone could break in and control your systems, steal information, or disrupt your operations.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

May 2024

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Networked management interfaces for IT equipment are not directly exposed to the internet.
policy ASD Information Security Manual (ISM) ISM-1863
priority_high

Why it matters

Exposing management interfaces to the internet enables unauthorised admin access, leading to compromise, data loss, and disruption.

settings

Operational notes

Ensure management interfaces are not internet-exposed; provide admin access only via VPN/bastion and restrict by allowlisted subnets.

Mapping detail

Mapping

Direction

Controls