Skip to content
arrow_back
search
ISM-0432 policy ASD Information Security Manual (ISM)

Document System Access Requirements in Security Plans

System access rules must be documented in each system's security plan to ensure proper access management.

record_voice_over

Plain language

In everyday terms, this control is about clearly writing down who can access specific parts of your system and under what conditions. It’s important because if these access rules aren’t properly documented, the wrong people might gain access, leading to data breaches, loss of sensitive information, or system misuse.

Framework

ASD Information Security Manual (ISM)

Control effect

Proactive

Classifications

NC, OS, P, S, TS

ISM last updated

May 2025

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Access requirements for systems and their resources are documented in their system security plan.
policy ASD Information Security Manual (ISM) ISM-0432
priority_high

Why it matters

If access requirements are not documented in the system security plan, incorrect permissions may be granted, enabling unauthorised access and data compromise.

settings

Operational notes

Review and update the system security plan whenever roles, resources or permissions change, and confirm access requirements map to implemented controls (e.g., RBAC and approvals).

Mapping detail

Mapping

Direction

Controls