Skip to content
arrow_back
search
ISM-1610 policy ASD Information Security Manual (ISM)

Document and Test Emergency System Access Procedures

Ensure emergency access to IT systems is documented and tested during major IT changes.

record_voice_over

Plain language

This control is about making sure there are clear and tested procedures for getting into your computer systems in an emergency, like if a critical IT system crashes during a big change. It matters because if you can't access your systems when things go wrong, you could face extended downtime, loss of business, or even a compromise of security.

Framework

ASD Information Security Manual (ISM)

Control effect

Proactive

Classifications

NC, OS, P, S, TS

ISM last updated

May 2025

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

A method of emergency access to systems and their resources is documented and tested at least once when initially implemented and each time fundamental information technology infrastructure changes occur.
policy ASD Information Security Manual (ISM) ISM-1610
priority_high

Why it matters

Without documented and tested emergency access, outages during major IT changes can delay recovery and increase risk of unauthorised access or data loss.

settings

Operational notes

Document emergency access steps, roles, approvals and break-glass accounts; test on initial implementation and after fundamental infrastructure changes, recording outcomes and updates.

Mapping detail

Mapping

Direction

Controls