Skip to content
arrow_back
search
ISM-1688 policy ASD Information Security Manual (ISM)

Restrict Privileged Environment Access

Users without privileges cannot access systems meant for privileged users.

record_voice_over

Plain language

The idea here is that ordinary users, who don't need wide-ranging access, should not be allowed into areas of your computer systems reserved for people with special permissions. If these restrictions aren't in place, someone without the proper controls could accidentally or intentionally mess with sensitive parts of your systems, leading to data breaches or system disruptions.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Aug 2024

Control Stack last updated

19 Mar 2026

E8 maturity levels

ML1, ML2, ML3

Official control statement

Unprivileged user accounts cannot logon to privileged operating environments.
policy ASD Information Security Manual (ISM) ISM-1688
priority_high

Why it matters

If unprivileged users can log on to privileged operating environments, they may gain elevated access, change configurations, and expose sensitive data.

settings

Operational notes

Audit privileged environment logon rights regularly; ensure only privileged accounts can sign in and remove access immediately when users change roles.

Mapping detail

Mapping

Direction

Controls