Skip to content
arrow_back
search
ISM-1885 policy ASD Information Security Manual (ISM)

Implement Emanation Security Measures for Systems

System owners follow security advice to protect against information leaks from electronic devices.

record_voice_over

Plain language

This control is about keeping information that comes from electronic devices secure so it doesn't get accidentally leaked. Imagine if someone nearby could pick up valuable information from your computer without even touching it—that's the risk if this isn't managed.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

S, TS

ISM last updated

Mar 2026

Control Stack last updated

24 Mar 2026

E8 maturity levels

N/A

Official control statement

Recommended actions contained within emanation security mitigation advice issued for systems are implemented by system owners.
policy ASD Information Security Manual (ISM) ISM-1885
priority_high

Why it matters

Without this control, sensitive company data could be intercepted without any physical break-in, leading to potential data breaches and business harm.

settings

Operational notes

Regularly review and update device lists and protection methods to keep up with changing technology and emerging threats.

Mapping detail

Mapping

Direction

Controls