Skip to content
arrow_back
search
ISM-1573 policy ASD Information Security Manual (ISM)

Log Access Documentation with Service Providers

Ensure contracts specify how organisations can access logs about their data from service providers.

record_voice_over

Plain language

This control requires that when you sign contracts with service providers, you make sure there is a clear agreement on how you can access the logs related to your data. If you don't have access to these logs, you might not be able to detect or trace security incidents, which could lead to data breaches or loss without you even knowing it.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Nov 2022

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Access to all logs relating to an organisation's data and services is documented in contractual arrangements with service providers.
policy ASD Information Security Manual (ISM) ISM-1573
priority_high

Why it matters

If log access rights aren’t documented in service provider contracts, you may be unable to obtain audit logs, delaying breach detection, investigation and compliance reporting.

settings

Operational notes

Document in contracts who can access which service/provider logs, how access is provided, retention periods, and timeframes for log delivery to support audits and investigations.

Mapping detail

Mapping

Direction

Controls