Skip to content
arrow_back
search
ISM-0488 policy ASD Information Security Manual (ISM)

Use Forced Commands for SSH Without Passwords

Ensure SSH without passwords uses specific commands and checks parameters for security.

record_voice_over

Plain language

This control ensures that when people or systems connect remotely to your computer network without typing a password, they can only run specific, pre-approved actions. This is important because if someone manages to break in, they can't use the open connection to cause harm unless they do something we've already allowed. It's like giving someone a key to enter your business, but making sure all the important rooms are still locked.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Nov 2025

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

If using remote access without the use of a password for SSH connections, the 'forced command' option is used to specify what command is executed and parameter checking is enabled.
policy ASD Information Security Manual (ISM) ISM-0488
priority_high

Why it matters

Without SSH forced commands and parameter checking for key-based logins, a stolen key can be used to run arbitrary commands and escalate access on the host.

settings

Operational notes

Regularly audit `authorized_keys` for `command="..."` and validate parameter checking; alert on any key-based access that lacks a forced command restriction.

Mapping detail

Mapping

Direction

Controls