Skip to content
arrow_back
search
ISM-1649 policy ASD Information Security Manual (ISM)

Implement Just-in-Time Administration for System Access

Use just-in-time methods to manage who can access system resources, ensuring enhanced security.

record_voice_over

Plain language

This control is about giving people temporary access to computer systems only when they need it. This matters because if someone always has full access, it makes it easier for mistakes or attacks to happen, putting sensitive information at risk.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

May 2025

Control Stack last updated

19 Mar 2026

E8 maturity levels

ML3

Official control statement

Just-in-time administration is used for the administration of systems and their resources.
policy ASD Information Security Manual (ISM) ISM-1649
priority_high

Why it matters

Without just-in-time admin access, persistent privileges expand the attack window, enabling credential misuse, privilege escalation and broader system compromise.

settings

Operational notes

Use time-bound admin elevation only when needed; log and review approvals, monitor activity, and automatically revoke elevated access immediately after task completion.

Mapping detail

Mapping

Direction

Controls