Skip to content
arrow_back
search
ISM-1687 policy ASD Information Security Manual (ISM)

Prevent Virtualisation of Privileged Environments

Privileged environments must not be virtualised within non-privileged ones to ensure security.

record_voice_over

Plain language

This control means that parts of your computer systems that need the highest security should not be placed within less secure environments on the same system. This is important because if the secure parts aren't kept separate, it's easier for cybercriminals to get in and access sensitive information, potentially causing harm to your business and your reputation.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Aug 2021

Control Stack last updated

19 Mar 2026

E8 maturity levels

ML2, ML3

Official control statement

Privileged operating environments are not virtualised within unprivileged operating environments.
policy ASD Information Security Manual (ISM) ISM-1687
priority_high

Why it matters

If privileged environments run inside unprivileged VMs, a compromise of the host or hypervisor can capture admin credentials and enable full system takeover.

settings

Operational notes

Confirm privileged workstations/servers are not hosted as guests on unprivileged systems; review hypervisor inventories and alert on new VMs containing admin tools or accounts.

Mapping detail

Mapping

Direction

Controls