Skip to content
arrow_back
search
ISM-1509 policy ASD Information Security Manual (ISM)

Log Privileged Access Events Centrally for Monitoring

Keep records of high-level system access in one place to monitor and respond to potential issues.

record_voice_over

Plain language

Logging privileged access events means keeping a central record every time someone uses high-level permissions to access important systems. This is crucial because if something goes wrong, like sensitive data being leaked or a system being tampered with, you'll know who had special access and can quickly investigate.

Framework

ASD Information Security Manual (ISM)

Control effect

Detective

Classifications

NC, OS, P, S, TS

ISM last updated

Nov 2023

Control Stack last updated

19 Mar 2026

E8 maturity levels

ML2, ML3

Official control statement

Privileged access events are centrally logged.
policy ASD Information Security Manual (ISM) ISM-1509
priority_high

Why it matters

Without centralised logging of privileged access events, misuse may go undetected, delaying response and enabling breaches or system compromise.

settings

Operational notes

Forward privileged access events to a central log platform (e.g., SIEM), validate time sync, and alert on privileged logons and admin actions.

Mapping detail

Mapping

Direction

Controls