Skip to content
arrow_back
search
ISM-1507 policy ASD Information Security Manual (ISM)

Ensure Requests for Privileged Access are Verified

Requests for special system access are checked before approval to prevent unauthorized use.

record_voice_over

Plain language

This control ensures that when someone requests special access to important parts of a computer system, their request is checked to make sure they should have that access. This matters because if people get access they shouldn't, they could misuse or damage the system, leading to data leaks, financial loss, or harm to the business's reputation.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

May 2025

Control Stack last updated

19 Mar 2026

E8 maturity levels

ML1, ML2, ML3

Official control statement

Requests for privileged access to systems and their resources are validated when first requested.
policy ASD Information Security Manual (ISM) ISM-1507
priority_high

Why it matters

Unverified privileged access requests can enable unauthorised access, data exposure or system compromise, leading to financial loss and reputational damage.

settings

Operational notes

Verify each privileged access request at first request (identity, business need, approvals), record evidence, and review logged approvals regularly to detect misuse.

Mapping detail

Mapping

Direction

Controls