Skip to content
arrow_back
search
ISM-0441 policy ASD Information Security Manual (ISM)

Ensuring Limited Access for Temporary System Use

When given temporary system access, personnel can only see data needed for their job.

record_voice_over

Plain language

This control ensures that when someone is given temporary access to a system, they can only see the information needed to do their job. It's important because if access isn't limited, people might accidentally see sensitive information that isn't relevant to them, leading to data breaches or misuse.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

May 2025

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

When personnel are granted temporary access to systems and their resources, effective controls are put in place to restrict their access to only data required for them to undertake their duties.
policy ASD Information Security Manual (ISM) ISM-0441
priority_high

Why it matters

If temporary access is not tightly limited to duty-related data, personnel may view or extract sensitive information, causing breaches, legal action and reputational harm.

settings

Operational notes

Grant temporary access on a time-bound basis with defined expiry, least-privilege roles and data scoping. Review logs during access and revoke promptly when tasks are complete.

Mapping detail

Mapping

Direction

Controls