Skip to content
arrow_back
search
ISM-1583 policy ASD Information Security Manual (ISM)

Ensure Contractors are Identified as Users

Ensure contractors are labeled distinctively from other personnel in systems.

record_voice_over

Plain language

In your organisation's system, it's important to clearly label contractors separately from permanent staff. This matters because if contractors aren't easily identified, there might be confusion over what they can access, and they might unintentionally gain access to sensitive information they shouldn't see.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

July 2020

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Personnel who are contractors are identified as such.
policy ASD Information Security Manual (ISM) ISM-1583
priority_high

Why it matters

If contractors aren’t identified as such, access reviews and offboarding can miss them, increasing risk of lingering access, data exposure and audit noncompliance.

settings

Operational notes

Tag contractor accounts in the identity system (e.g., user type/attribute) and verify this label during joiner/mover/leaver reviews and periodic access recertification.

Mapping detail

Mapping

Direction

Controls