Skip to content
arrow_back
search
ISM-0415 policy ASD Information Security Manual (ISM)

Strict Control of Shared User Accounts

Ensure shared user accounts are used carefully, with each user clearly identified to maintain security.

record_voice_over

Plain language

This control is all about ensuring that if multiple people are using a shared user account, each person's activity can be tracked back to them. This matters because if something goes wrong or suspicious activity is detected, it's crucial to know who was responsible. Without this clarity, it's like trying to find a needle in a haystack if something bad happens.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

July 2019

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

The use of shared user accounts is strictly controlled, and personnel using such accounts are uniquely identifiable.
policy ASD Information Security Manual (ISM) ISM-0415
priority_high

Why it matters

Without strict control of shared accounts, accountability is lost, making it difficult to trace malicious activity back to the responsible user.

settings

Operational notes

Record who uses shared accounts (e.g., ticket/authorisation) and log all actions. Review logs routinely to ensure each session is attributable.

Mapping detail

Mapping

Direction

Controls