Skip to content
arrow_back
search
ISM-0489 policy ASD Information Security Manual (ISM)

SSH-Agent Key Expiry and Screen Lock Requirements

SSH-agent caches must be used on systems with screen locks and expire after 4 hours of inactivity.

record_voice_over

Plain language

This control is about making sure any stored SSH keys, which are used to access systems securely, expire after four hours of inactivity and are only used on devices with screen locks. This is important because if someone forgets to lock their screen or leaves their machine unattended, a malicious person could gain access to sensitive data or systems if the keys are still active.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

May 2025

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

When SSH-agent or similar key caching applications are used, it is limited to workstations and servers with screen locks and key caches that are set to expire within four hours of inactivity.
policy ASD Information Security Manual (ISM) ISM-0489
priority_high

Why it matters

Without 4-hour SSH-agent key cache expiry and screen locks, unattended sessions may allow unauthorised SSH access, leading to data breaches and loss of system integrity.

settings

Operational notes

Configure SSH-agent key cache expiry to 4 hours of inactivity and enforce workstation/server screen locks. Regularly verify timeout and lock settings (e.g., quarterly) to maintain compliance.

Mapping detail

Mapping

Direction

Controls