Skip to content
arrow_back
search
ISM-1387 policy ASD Information Security Manual (ISM)

Use Jump Servers for Administrative Activities

Ensure all admin tasks are done through safer, intermediary servers to enhance security.

record_voice_over

Plain language

A jump server is like an extra secure bridge that your IT team uses to safely access the main systems they need to manage. By making sure all admin tasks go through these special servers, you're adding a strong layer of protection against cyber criminals. Without this, hackers could more easily access the sensitive parts of your business systems, leading to data breaches or disruptions.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Aug 2021

Control Stack last updated

19 Mar 2026

E8 maturity levels

ML2, ML3

Official control statement

Administrative activities are conducted through jump servers.
policy ASD Information Security Manual (ISM) ISM-1387
priority_high

Why it matters

Without jump servers, admin credentials traverse many hosts, increasing exposure to credential theft and enabling attacker lateral movement.

settings

Operational notes

Monitor jump server access logs for unauthorised use, restrict admin tools to the jump host, and enforce MFA for all privileged sessions.

Mapping detail

Mapping

Direction

Controls