Skip to content
arrow_back
search
ISM-2009 policy ASD Information Security Manual (ISM)

Secure Network API Client Authentication and Authorisation

Ensure clients using network APIs for data changes are authenticated and authorised, especially if not internet-accessible.

record_voice_over

Plain language

When a client, like a software application or a device, uses a network API (which is a way for different software to communicate), it's crucial to make sure it's the right client and that it's allowed to do what it's trying to do. This prevents unauthorised changes to your data that could harm your business or leak sensitive information.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

S, TS

ISM last updated

Feb 2025

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Unauthorised medical devices are not brought into SECRET and TOP SECRET areas.
policy ASD Information Security Manual (ISM) ISM-2009
priority_high

Why it matters

Unauthorised medical devices entering SECRET/TOP SECRET areas could record or transmit classified information, causing data compromise and policy breaches.

settings

Operational notes

Maintain a register of approved medical devices for SECRET/TOP SECRET zones, conduct entry checks, and remove/quarantine any unauthorised devices immediately.

Mapping detail

Mapping

Direction

Controls