Skip to content
arrow_back
search
ISM-1268 policy ASD Information Security Manual (ISM)

Enforce Need-to-Know Access in Databases

Only authorised users can access database contents by using specific privileges, roles, and techniques to protect the data.

record_voice_over

Plain language

This control ensures that only the right people can access the information in your databases. Just like you wouldn't want everyone reading your private diary, businesses need to protect sensitive data from being seen by those without a good reason. If it's not done, unauthorised access could lead to data leaks, hurting your business's reputation and potentially resulting in financial loss.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

May 2025

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

The need-to-know principle is enforced for database contents through the application of minimum privileges, database views, database roles and data tokenisation.
policy ASD Information Security Manual (ISM) ISM-1268
priority_high

Why it matters

Without database need-to-know controls (least privilege, roles/views, tokenisation), users may access sensitive records outside their duties, increasing breach risk.

settings

Operational notes

Review database roles and privileges, enforce access via least-privilege roles and views, and apply tokenisation to limit exposure of sensitive fields to authorised users.

Mapping detail

Mapping

Direction

Controls