Skip to content
arrow_back
search
ISM-1591 policy ASD Information Security Manual (ISM)

Suspend User Access for Malicious Activity

Remove or pause access immediately if someone is found doing harmful activities on the system.

record_voice_over

Plain language

If someone in your organisation is doing something harmful or malicious on your computer systems, you need to stop their access as soon as possible. This is crucial because if you don't act quickly, they could steal sensitive information or cause significant damage to your business operations.

Framework

ASD Information Security Manual (ISM)

Control effect

Responsive

Classifications

NC, OS, P, S, TS

ISM last updated

May 2025

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Access to systems and their resources are removed or suspended as soon as practicable when personnel are detected undertaking malicious activities.
policy ASD Information Security Manual (ISM) ISM-1591
priority_high

Why it matters

If access isn’t suspended promptly after malicious activity is detected, attackers can retain footholds, exfiltrate data, and disrupt operations.

settings

Operational notes

Define a rapid offboarding playbook: on malicious-activity alerts, immediately disable accounts, revoke sessions/tokens, and document approvals and timing.

Mapping detail

Mapping

Direction

Controls