Skip to content
arrow_back
search
ISM-1566 policy ASD Information Security Manual (ISM)

Central Logging of Unprivileged System Access

System logs keep track of unprivileged user actions to monitor access and security.

record_voice_over

Plain language

This control is about recording the actions of users who do not have special privileges on your systems. It helps keep track of who accessed what and when, which is crucial for detecting and responding to any unauthorised actions. Without this, you might miss signs of improper access, potentially leading to data breaches or system abuse.

Framework

ASD Information Security Manual (ISM)

Control effect

Detective

Classifications

NC, OS, P, S, TS

ISM last updated

Nov 2023

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Use of unprivileged access is centrally logged.
policy ASD Information Security Manual (ISM) ISM-1566
priority_high

Why it matters

Without central logging of unprivileged access, unauthorised actions may go undetected, risking data breaches and compromising system integrity.

settings

Operational notes

Ensure logs for unprivileged access are reviewed weekly, as patterns may reveal misuse or anomalies that require timely investigation.

Mapping detail

Mapping

Direction

Controls