Skip to content
arrow_back
search
ISM-0405 policy ASD Information Security Manual (ISM)

Validation for Unprivileged System Access Requests

Requests for basic system access are checked when they are first made.

record_voice_over

Plain language

When someone wants to access a computer system for everyday tasks, their request is checked at the very beginning. This is important because if you don't verify requests first, unauthorised people could gain access, leading to stolen data or other security issues.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

May 2025

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Requests for unprivileged access to systems and their resources are validated when first requested.
policy ASD Information Security Manual (ISM) ISM-0405
priority_high

Why it matters

Failure to validate unprivileged access requests can lead to unauthorised access, data breaches, and misuse of system resources by unapproved users.

settings

Operational notes

Validate each unprivileged access request at submission against user identity and business need, and record approvals/denials to provide an auditable trail.

Mapping detail

Mapping

Direction

Controls