Skip to content
arrow_back
search
ISM-1689 policy ASD Information Security Manual (ISM)

Restrict Privileged Accounts Access to Non-Privileged Environments

Privileged users aren't allowed to log into standard environments to ensure security.

record_voice_over

Plain language

This control means that people with special access to make changes on computer systems (privileged users) should not use their special accounts to access regular work environments. This is important because if their accounts get compromised, it could allow hackers to make unauthorised changes or access sensitive information.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Aug 2024

Control Stack last updated

19 Mar 2026

E8 maturity levels

ML1, ML2, ML3

Official control statement

Privileged user accounts (excluding local administrator accounts) cannot logon to unprivileged operating environments.
policy ASD Information Security Manual (ISM) ISM-1689
priority_high

Why it matters

If privileged accounts can log on to standard desktops, malware or phishing on those hosts can steal admin credentials and enable rapid privilege escalation across the network.

settings

Operational notes

Enforce deny logon (interactive/RDP) for privileged accounts on user PCs and require admin tasks via PAWs. Review logon events to confirm privileged logons only occur on approved admin hosts.

Mapping detail

Mapping

Direction

Controls