Skip to content
arrow_back
search
ISM-1884 policy ASD Information Security Manual (ISM)

Ensure Compliance with Emanation Security Doctrine

Organisations must follow guidelines for managing information leaks through electromagnetic emissions.

record_voice_over

Plain language

This control is all about preventing leaks of sensitive information through electromagnetic waves, like those that come from electronic devices. If we ignore this, hackers could intercept these signals and access private data, risking the security of our entire organisation.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

OS, P, S, TS

ISM last updated

Nov 2023

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Emanation security doctrine produced by ASD for the management of emanation security matters is complied with.
policy ASD Information Security Manual (ISM) ISM-1884
priority_high

Why it matters

Without emanation security controls, electromagnetic emissions may be exploited to recover sensitive information, enabling espionage and serious data compromise.

settings

Operational notes

Apply ASD emanation security doctrine: assess areas handling classified data, enforce zoning/separation, use ASD-approved countermeasures, and periodically verify emissions meet doctrine requirements.

Mapping detail

Mapping

Direction

Controls