Skip to content
arrow_back
search
ISM-1403 policy ASD Information Security Manual (ISM)

Lock User Accounts After Failed Login Attempts

User accounts lock after five wrong passwords to increase security.

record_voice_over

Plain language

This control means that if someone tries five times to enter the wrong password for a user's account, the account gets temporarily locked. This is crucial because it helps prevent unauthorised people from guessing passwords over and over in an attempt to break into the system.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Nov 2024

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

User accounts, except for break glass accounts, are locked out after a maximum of five failed logon attempts.
policy ASD Information Security Manual (ISM) ISM-1403
priority_high

Why it matters

Without account lockout after failed attempts, systems are vulnerable to brute force attacks, risking unauthorised access and data breaches.

settings

Operational notes

Monitor lockout events and trends, validate the lockout threshold is set to five failed logons, and investigate repeated lockouts for brute force activity.

Mapping detail

Mapping

Direction

Controls