Skip to content
arrow_back
search
ISM-1546 policy ASD Information Security Manual (ISM)

Ensure User Authentication Before System Access

Verify user identities before they can access any system.

record_voice_over

Plain language

This control is about making sure that every person trying to access a system is who they say they are. It’s like checking IDs at the door of a club. If someone unverified gets in, they might cause harm, like accessing sensitive information or disrupting operations.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

July 2019

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Users are authenticated before they are granted access to a system and its resources.
policy ASD Information Security Manual (ISM) ISM-1546
priority_high

Why it matters

Without strong user authentication, attackers can impersonate users to access systems and resources, leading to data compromise and unauthorised actions.

settings

Operational notes

Enforce MFA for interactive and remote access, review authentication logs for repeated failures, and promptly disable or lock accounts showing suspicious activity.

Mapping detail

Mapping

Direction

Controls