Skip to content
arrow_back
search
ISM-1975 policy ASD Information Security Manual (ISM)

Secure Non-Classified Equipment in Safe Containers

Secure non-classified equipment in secure containers to protect against unauthorized physical access.

record_voice_over

Plain language

This control is about making sure that equipment like servers or network devices, which are not classified but still important, are kept safe in secure containers. This matters because if someone can physically access this equipment without authorisation, they could steal information, damage it, or disrupt your business operations.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC

ISM last updated

Nov 2024

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Non-classified servers, network devices and cryptographic equipment are secured in suitably secure security containers.
policy ASD Information Security Manual (ISM) ISM-1975
priority_high

Why it matters

If non-classified servers, network devices or cryptographic equipment are not locked in secure containers, they can be accessed or tampered with, causing data theft and service disruption.

settings

Operational notes

Inspect safe containers routinely (locks, hinges, bolts and tamper evidence), confirm only authorised staff hold keys/combinations, and log access to equipment stored inside.

Mapping detail

Mapping

Direction

Controls