ASD's Blueprint for Secure Cloud

ICT Equipment

This page provides a template and guidance to assist organisations in documenting their approach to management of ICT equipment associated with their system(s) built on ASD's Blueprint for Secure Cloud.

Estimated reading time: 3 minutes

As <ORGANISATION-NAME>’s approach to implementing controls related to ICT equipment is consistent across all controls addressed within this section, it does not delve into subsections but rather addresses the controls as a group. This approach is consistent with ASD’s Guidelines for ICT Equipment.

Applicability

ISM controls relating to the appropriate selection, use, maintenance, repair, sanitisation, destruction, and disposal of <SYSTEM-NAME> equipment listed under technical controls implemented are covered by this section of the SSP.

<SYSTEM-NAME> also relies on the implementation of controls within the following system assessments:

  • <ORG-NETWORKING-SYSTEM>
  • <ORG-IDENTITY-SYSTEM>

<INSERT ADDITIONAL INFORMATION AS APPROPRIATE>

Organisational policies and processes implemented

Selection, use, maintenance, repairs, sanitisation, destruction and disposal of <SYSTEM-NAME> equipment is performed according to <ORGANISATION-NAME>’s ICT Equipment Management Policy and associated standard operating procedures (SOPs):

In accordance with <ORGANISATION-NAME>’s ICT Equipment Management Policy, all vendors of ICT equipment used for <SYSTEM-NAME> have been assessed by <ORGANISATION-NAME> as demonstrating a commitment to secure-by-design and secure-by-default principles, use of memory-safe programming languages where possible, secure programming practices and maintaining the security of their products more broadly.

<INSERT ADDITIONAL INFORMATION AS APPROPRIATE>

Technical controls implemented

<SYSTEM-NAME> uses the below ICT equipment within its authorisation boundary, with technical controls for <SYSTEM-NAME>’s hardening of ICT equipment performed with reference to the following guidance:

Equipment TypeMake/ModelPurposeHardening Guides Referenced
Laptop Endpoint<MAKE, MODEL>Endpoint for general usersASD’s Blueprint for Secure Cloud
ASD Windows 10 21H1 Hardening Guide
Desktop Endpoint<MAKE, MODEL>Endpoint for select office usersASD’s Blueprint for Secure Cloud
ASD Windows 10 21H1 Hardening Guide
MobileApple iPhone 14Mobile phone for general usersASD’s Blueprint for Secure Cloud
Apple’s iOS 16: iPhones Common Criteria Configuration Guide
(Further examples)
Peripheral - Headset<MAKE, MODEL>Use with Microsoft Teams CallsNone
Peripheral - Dock<MAKE, MODEL>Connection of monitor and peripherals to laptopsNone
Peripheral - Monitor<MAKE, MODEL>Use with laptop and desktop endpointsNone

<INSERT ADDITIONAL INFORMATION AS APPROPRIATE>

Security & Governance

Design

Configuration

External documentation

Do you have a suggestion on how the above page could be improved? Get in touch! ASD's Blueprint for Secure Cloud is an open source project, and we would love to get your input. Submit an issue on our GitHub, or send us an email at blueprint@asd.gov.au

Acknowledgement of Country icon

Acknowledgement of Country
We acknowledge the Traditional Owners and Custodians of Country throughout Australia and their continuing connections to land, sea and communities. We pay our respects to them, their cultures and their Elders; past, present and emerging. We also recognise Australia's First Peoples' enduring contribution to Australia's national security.

Authorised by the Australian Government, Canberra