Skip to content
arrow_back
search
ISM-0414 policy ASD Information Security Manual (ISM)

Ensure Unique Identification for System Access

People accessing systems must have unique identifiers to ensure accountability.

record_voice_over

Plain language

This control is about making sure everyone who accesses your systems has a unique username or identifier. It's important because if something goes wrong, like data being changed or sensitive information being leaked, you can trace it back to the specific person responsible.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

May 2025

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Personnel granted access to systems and their resources are uniquely identifiable.
policy ASD Information Security Manual (ISM) ISM-0414
priority_high

Why it matters

Without unique user IDs, actions cannot be reliably traced to a person, reducing accountability and enabling misuse to go undetected.

settings

Operational notes

Regularly review accounts to confirm each identifier is unique and remove shared, duplicate or reused accounts when staff roles change.

Mapping detail

Mapping

Direction

Controls