Skip to content
arrow_back
search
ISM-1832 policy ASD Information Security Manual (ISM)

SPN Configuration for Active Directory Accounts

Only specialised accounts should have SPNs to increase security in Active Directory setups.

record_voice_over

Plain language

This control focuses on making sure that only certain special types of accounts in a computer network, called service accounts and computer accounts, have something called Service Principal Names (SPNs). This is important because if too many accounts have SPNs, it opens up ways for attackers to potentially gain unauthorized access to sensitive information or systems.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Feb 2023

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Only service accounts and computer accounts are configured with Service Principal Names (SPNs).
policy ASD Information Security Manual (ISM) ISM-1832
priority_high

Why it matters

Unnecessary SPNs on user accounts increase exposure to Kerberoasting and other Kerberos abuse, enabling credential compromise and lateral movement in AD.

settings

Operational notes

Regularly audit AD for SPNs on non-service/non-computer accounts; remove any unauthorised SPNs and verify required SPNs align to documented services.

Mapping detail

Mapping

Direction

Controls