Skip to content
arrow_back
search
ISM-1867 policy ASD Information Security Manual (ISM)

Use Approved Mobile Platforms for Sensitive Access

Mobile devices must use evaluated platforms for secure access to sensitive systems or data.

record_voice_over

Plain language

This control ensures that mobile devices accessing sensitive or protected systems use platforms that meet specific security standards and are configured securely. This is crucial because if these devices aren't secure, confidential information could be exposed, leading to financial loss, reputation damage, or compromised operations.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

OS, P

ISM last updated

Feb 2024

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Mobile devices that access OFFICIAL: Sensitive or PROTECTED systems or data use mobile platforms that have completed a Common Criteria evaluation against the Protection Profile for Mobile Device Fundamentals, version 3.3 or later, and are operated in accordance with the latest version of their associated ASD security configuration guide.
policy ASD Information Security Manual (ISM) ISM-1867
priority_high

Why it matters

Using mobile platforms not Common Criteria-evaluated or not configured to ASD guidance increases risk of OFFICIAL: Sensitive/PROTECTED data compromise and unauthorised access.

settings

Operational notes

Regularly verify devices remain Common Criteria-evaluated (PP MDF v3.3+) and are still aligned to the latest ASD security configuration guide after OS/app updates.

Mapping detail

Mapping

Direction

Controls