ISM-0290

High assurance IT equipment is installed, configured, administered and operated in an evaluated configuration and in accordance with ASD guidance.

Topic
Using evaluated products
Applicable to
Secret, Top Secret

History

Priority
must
Jun 2024
High assurance IT equipment is installed, configured, administered and operated in an evaluated configuration and in accordance with ASD guidance.
References to high assurance ICT equipment were amended to high assurance IT equipment.
Sep 2023
High assurance ICT equipment is installed, configured, administered and operated in an evaluated configuration and in accordance with ASD guidance.
References to ‘ACSC’ were replaced with ‘ASD’.
Jun 2023
High assurance ICT equipment is installed, configured, administered and operated in an evaluated configuration and in accordance with ACSC guidance.
The existing control relating to ‘high assurance ICT equipment being installed, configured, administered and operated in accordance with guidance produced by the ACSC’ was amended to ‘high assurance ICT equipment being installed, configured, administered and operated in an evaluated configuration and in accordance with ACSC guidance’.
Dec 2021
High assurance ICT equipment is installed, configured, administered and operated in accordance with guidance produced by the ACSC.
Miscellaneous changes were made to rationale and security controls throughout the publication. This included:
• A review from the Using the Information Security Manual chapter through to the Guidelines for Media chapter.
• Security controls suitable for all audiences have been identified with the ‘All’ applicability marking while additional security controls suitable for just government audiences have been identified with the O, P, S and TS applicability markings.
• Security controls suitable for specific classifications have been amended to include their classification(s) in the wording of the security controls to reduce the reliance on applicability markings to confer suitability.
• Tables in security controls have been converted into prose to allow for inclusion in the SSP annex template and the XML list of security controls.
• The use of ‘official’ and ‘highly classified’ terminology has been replaced with specific classifications to remove ambiguity.
• Security controls relating to high assurance ICT equipment have had their applicability narrowed to ‘S, TS’ reflecting that they are intended for the protection of SECRET and TOP SECRET systems and data.
2015
Agencies must ensure that High Assurance products are installed, configured, operated andadministered in accordance with all product specific guidance produced by ASD.
2010
Agencies must ensure that high assurance products and HGCE are installed, configured, operated andadministered in accordance with all product specific ACSIs produced by DSD.