Skip to content
arrow_back
search
ISM-1256 policy ASD Information Security Manual (ISM)

Implement File-Based Access Controls for Databases

Use file permissions to safeguard database files from unauthorised access.

record_voice_over

Plain language

This control is about setting special rules for who can see or change your database files. Imagine your database as a filing cabinet full of important documents - if anyone can open it, someone could take sensitive information without you knowing. By using file-based access controls, you limit who has the keys to that cabinet, reducing the chance of a security breach.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Aug 2018

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

File-based access controls are applied to database files.
policy ASD Information Security Manual (ISM) ISM-1256
priority_high

Why it matters

Without file-based controls on database files, attackers can read or modify data, logs or backups, causing leaks and integrity loss.

settings

Operational notes

Audit OS ACLs on database data, log and backup files so only DB service accounts and admins can access them; review after role changes.

Mapping detail

Mapping

Direction

Controls