Skip to content
arrow_back
search
ISM-0418 policy ASD Information Security Manual (ISM)

Keep Physical Credentials Separate from Systems

Store physical credentials away from systems except when logging in.

record_voice_over

Plain language

This control is about making sure your physical keys or access cards aren't left lying around near the computers or servers they unlock. This matters because if someone found them, they could easily access your systems and potentially steal data or cause harm to your business.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Nov 2024

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Physical credentials are kept separate from systems they are used to authenticate to, except for when performing authentication activities.
policy ASD Information Security Manual (ISM) ISM-0418
priority_high

Why it matters

Leaving physical credentials near systems exposes them to unauthorised access, risking data theft or service disruption.

settings

Operational notes

Store access cards/keys away from the system when not authenticating; confirm return after use and record any exceptions to identify weak practices.

Mapping detail

Mapping

Direction

Controls