Skip to content
arrow_back
search
ISM-1970 policy ASD Information Security Manual (ISM)

Use Dedicated Environments for Malicious Code Analysis

Malicious software is studied in separate, secure systems to prevent it from harming other networks or devices.

record_voice_over

Plain language

This control is about making sure any nasty software, like viruses or malware, is analysed in a secure and separate environment when we're responding to a security incident or conducting research. It's important because if we study this malware on regular systems, it might spread and cause harm to other computers or networks in the organisation.

Framework

ASD Information Security Manual (ISM)

Control effect

Responsive

Classifications

NC, OS, P, S, TS

ISM last updated

Nov 2024

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Malicious code processed for cyber security incident response or research purposes is done so in a dedicated analysis environment that is segregated from other systems.
policy ASD Information Security Manual (ISM) ISM-1970
priority_high

Why it matters

Analysing malware outside a segregated environment risks its spread, leading to potential network breaches and operational disruptions.

settings

Operational notes

Use a dedicated malware analysis lab segregated from production (VLAN/air-gap), with controlled ingress/egress, snapshots/rebuilds, and strict tooling access.

Mapping detail

Mapping

Direction

Controls