Skip to content
arrow_back
search
ISM-0407 policy ASD Information Security Manual (ISM)

Maintain Secure User Access Records

Keep a secure record of who accessed the system, who authorised it, and details of their access levels.

record_voice_over

Plain language

This control is about keeping track of who can access your organisation's systems and what they can do once they're in. It matters because if you don't keep proper records, you might not know who to blame if something goes wrong, like a data breach or unauthorised changes to important files.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

May 2025

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

A secure record is maintained for the life of systems and their resources that covers the following for each user: - their user identification - their signed agreement to abide by system usage policies - who authorised their access - when their access was granted - the level of access they were granted - when their access, and their level of access, was last reviewed - when their level of access was changed, and to what extent (if applicable) - when their access was withdrawn (if applicable).
policy ASD Information Security Manual (ISM) ISM-0407
priority_high

Why it matters

Without secure, lifecycle user access records (approval, dates, reviews and changes), investigating unauthorised access and proving who had what access when becomes difficult.

settings

Operational notes

Regularly audit access records to ensure authorisations align with current role requirements and promptly update changes to user access levels.

Mapping detail

Mapping

Direction

Controls