Skip to content
arrow_back
search
ISM-1380 policy ASD Information Security Manual (ISM)

Use Separate Privileged and Unprivileged Environments

Privileged users should work in distinct environments to increase security and reduce risks.

record_voice_over

Plain language

This control means that people who have special access to sensitive information or systems should use separate computers or devices for their daily tasks and their more sensitive work. It's important because if their everyday work environment gets compromised, it won't affect the secure work they do with privileged access. Without this separation, there's a higher risk that a security breach could lead to significant data loss or operational disruptions.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Aug 2021

Control Stack last updated

19 Mar 2026

E8 maturity levels

ML1, ML2, ML3

Official control statement

Privileged users use separate privileged and unprivileged operating environments.
policy ASD Information Security Manual (ISM) ISM-1380
priority_high

Why it matters

Without separate environments, privileged accounts exposed to daily threats can lead to devastating breaches and unauthorised access.

settings

Operational notes

Use a dedicated admin workstation/VM for privileged logons and keep email/web browsing to an unprivileged profile; enforce separate credentials and sessions.

Mapping detail

Mapping

Direction

Controls