ISM-0249

System owners deploying SECRET or TOP SECRET systems in mobile platforms, or as a deployable capability, contact ASD for an emanation security threat assessment.

Topic
Emanation security threat assessments
Applicable to
Secret, Top Secret

History

Priority
must
Dec 2023
System owners deploying SECRET or TOP SECRET systems in mobile platforms, or as a deployable capability, contact ASD for an emanation security threat assessment.
The existing control relating to conducting emanation security threat assessments for systems in military platforms, or when deployed overseas, was amended to clarify the requirement is applicable to SECRET or TOP SECRET systems in mobile platforms or that exist as a deployable capability. [ISM-0249]
Sep 2023
System owners deploying systems or military platforms overseas contact ASD for an emanation security threat assessment and implement any additional installation criteria derived from the threat assessment.
References to ‘ACSC’ were replaced with ‘ASD’.
Dec 2021
System owners deploying systems or military platforms overseas contact the ACSC for an emanation security threat assessment and implement any additional installation criteria derived from the threat assessment.
Miscellaneous changes were made to rationale and security controls throughout the publication. This included:
• A review from the Using the Information Security Manual chapter through to the Guidelines for Media chapter.
• Security controls suitable for all audiences have been identified with the ‘All’ applicability marking while additional security controls suitable for just government audiences have been identified with the O, P, S and TS applicability markings.
• Security controls suitable for specific classifications have been amended to include their classification(s) in the wording of the security controls to reduce the reliance on applicability markings to confer suitability.
• Tables in security controls have been converted into prose to allow for inclusion in the SSP annex template and the XML list of security controls.
• The use of ‘official’ and ‘highly classified’ terminology has been replaced with specific classifications to remove ambiguity.
• Security controls relating to high assurance ICT equipment have had their applicability narrowed to ‘S, TS’ reflecting that they are intended for the protection of SECRET and TOP SECRET systems and data.
2015
Agencies deploying systems overseas in military and fixed locations must:• contact ASD for an emanation security threat assessment in accordance with the latestversion of ACSI 71• install cables and ICT equipment in accordance with this manual plus any specificinstallation criteria derived from the emanation security threat assessment.
2010
Agencies deploying systems overseas in military and fixed locations must:• contact DSD for an emanation security threat assessment in accordance with the latest version of ACSI 71• install cabling and ICT equipment in accordance with this manual plus any specific installation criteriaderived from the emanation security threat assessment.