ISM-1556

If returning from travelling overseas with mobile devices to high or extreme risk countries, personnel take the following additional actions:
• reset credentials used with mobile devices, including those used for remote access to their organisation’s systems
• monitor accounts for any indicators of compromise, such as failed logon attempts."

Topic
After travelling overseas with mobile devices
Applicable to
all

History

Dec 2022
If returning from travelling overseas with mobile devices to high or extreme risk countries, personnel take the following additional actions: • reset credentials used with mobile devices, including those used for remote access to their organisation’s systems • monitor accounts for any indicators of compromise, such as failed logon attempts.
Existing controls relating to the handling of credentials following travelling overseas with mobile devices were amended to align with language used by controls within the authentication hardening section of the Guidelines for System Hardening.
Dec 2021
If returning from travelling overseas with mobile devices to high or extreme risk countries, personnel take the following additional actions: • reset user credentials used with mobile devices, including those used for remote access to their organisation’s systems • monitor accounts for any indicators of compromise, such as failed logon attempts.
Miscellaneous changes were made to rationale and security controls throughout the publication. This included:
• A review from the Using the Information Security Manual chapter through to the Guidelines for Media chapter.
• Security controls suitable for all audiences have been identified with the ‘All’ applicability marking while additional security controls suitable for just government audiences have been identified with the O, P, S and TS applicability markings.
• Security controls suitable for specific classifications have been amended to include their classification(s) in the wording of the security controls to reduce the reliance on applicability markings to confer suitability.
• Tables in security controls have been converted into prose to allow for inclusion in the SSP annex template and the XML list of security controls.
• The use of ‘official’ and ‘highly classified’ terminology has been replaced with specific classifications to remove ambiguity.
• Security controls relating to high assurance ICT equipment have had their applicability narrowed to ‘S, TS’ reflecting that they are intended for the protection of SECRET and TOP SECRET systems and data.
Oct 2019
If returning from travelling overseas with mobile devices to high/extreme risk countries, personnel take the following additional actions: § reset user credentials used with devices, including those used for remote access to their organisation’s systems § monitor accounts for any indicators of compromise, such as failed login attempts.
Security control 1556 was added to align with advice within the ACSC’s Travelling Overseas with Electronic Devices publication.