Skip to content
Control Stack logo Control Stack
ISM-2095 ASD Information Security Manual (ISM)

Restrict Unapproved AI Access on Personal Devices

Do not let AI tools access sensitive systems on personal devices without approval.

🏛️ Framework

ASD Information Security Manual (ISM)

🧭 Control effect

Preventative

🔐 Classifications

OS, P

🗓️ ISM last updated

Mar 2026

✏️ Control Stack last updated

23 Mar 2026

🎯 E8 maturity levels

N/A

Official control statement
Personnel using privately-owned mobile devices or desktop computers to access OFFICIAL: Sensitive or PROTECTED systems or data are disallowed from granting access to unapproved artificial intelligence agents.

Source: ASD Information Security Manual (ISM)

Plain language

This control is about making sure AI tools don't get into sensitive systems on personal devices without a thumbs-up first. If we skip this, confidential business info might leak or get hacked, which could cost us time, money, and trust.

Why it matters

Without controlled AI access, personal devices could expose sensitive data, leading to leaks, financial loss, and reputational damage.

Operational notes

Regularly update the AI access policy and conduct refresher training. Ensure logs and approved tool lists are consistently reviewed and maintained.

Implementation tips

  • Managers should create a clear policy: Develop a simple guideline that explains when and how AI tools can be accessed. Discuss this policy at team meetings to ensure everyone understands the rules.
  • IT teams should evaluate AI tools: Identify which AI applications are used on staff devices and assess their security implications. Use a collaborative platform to document and share findings with relevant stakeholders.
  • HR should train all staff: Organise regular training sessions focusing on the new AI access policy and the reasons behind it. Include interactive elements like quizzes to bolster understanding and engagement.
  • System owners should monitor access: Regularly review logs to ensure no unauthorised AI access occurs. Set up alerts for suspicious activities that deviate from usual access patterns.
  • Procurement teams should vet AI solutions: Ensure any AI tool being used undergoes a security assessment before purchase. Incorporate a checkbox for security approval in the procurement process.

Audit / evidence tips

  • Ask: the AI access policy document: Request the written policy that outlines how AI tools can be accessed on personal devices

    Look at: clear guidelines and an approval process

    Good: a regularly updated policy with evidence of management endorsement

  • Ask: training records: Request documentation of staff training sessions about AI access

    Look at: attendance lists and training content summaries

    Good: regularly conducted sessions covering policy details with engaged staff participation

  • Ask: AI access logs: Request logs showing access history by AI tools on personal devices

    Look at: entries showing approved and unapproved access attempts

    Good: logs demonstrate all AI access attempts are either documented or blocked

  • Ask: approved AI tools list: Request a documented list of AI tools that staff are allowed to use

    Look at: evidence of security assessments and approvals

    Good: an up-to-date list showing tools with passed security assessments

  • Ask: procurement approval records: Request records showing AI tools were subject to security review before purchase

    Look at: evidence of approval in purchasing files

    Good: procurement records clearly showing tools passed security checks before buying

Cross-framework mappings

How ISM-2095 relates to controls across ISO/IEC 27001, Essential Eight, and ASD ISM.

These mappings show relationships between controls across frameworks. They do not imply full equivalence or certification.

ISO 27001

Control Notes Details
Partially meets (3)
Annex A 5.15 ISM-2095 prohibits personnel from granting unapproved AI agents access when using privately-owned devices to access OFFICIAL: Sensitive o...
Annex A 5.18 ISM-2095 requires that unapproved AI agents are not granted access to sensitive/protected systems or data from privately-owned devices
Annex A 8.3 ISM-2095 restricts granting unapproved AI agents access to OFFICIAL: Sensitive or PROTECTED systems or data when accessed via privately-o...

Mapping detail

Mapping

Direction

Controls