Skip to content
arrow_back
search
ISM-1650 policy ASD Information Security Manual (ISM)

Log Management of Privileged User Activities

Keep track of changes to privileged user accounts by logging them in one central place.

record_voice_over

Plain language

This control is about keeping track of what people with special access to your computer systems are doing. It matters because if no one is watching over these activities, someone could make harmful changes without being noticed, leading to data being stolen or systems being compromised.

Framework

ASD Information Security Manual (ISM)

Control effect

Detective

Classifications

NC, OS, P, S, TS

ISM last updated

Aug 2024

Control Stack last updated

19 Mar 2026

E8 maturity levels

ML2, ML3

Official control statement

Privileged user account and security group management events are centrally logged.
policy ASD Information Security Manual (ISM) ISM-1650
priority_high

Why it matters

Without central logging of privileged account and security group changes, malicious or unauthorised access and permission changes may go undetected, enabling persistent compromise.

settings

Operational notes

Ensure privileged account and security group management events are forwarded to a central log platform, protected from tampering, and routinely reviewed for unexpected membership or role changes.

Mapping detail

Mapping

Direction

Controls