Skip to content
arrow_back
search
ISM-1870 policy ASD Information Security Manual (ISM)

Implement Application Control for User Profiles and Folders

Ensure user and temporary folders for systems, browsers, and emails are secured via application control.

record_voice_over

Plain language

This control is about making sure that only approved programs can access the parts of your computer where temporary files and user data are stored. Why is this important? If unauthorised programs get into these folders, they can easily cause harm by stealing information or spreading malware.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Aug 2023

Control Stack last updated

19 Mar 2026

E8 maturity levels

ML1, ML2, ML3

Official control statement

Application control is applied to user profiles and temporary folders used by operating systems, web browsers and email clients.
policy ASD Information Security Manual (ISM) ISM-1870
priority_high

Why it matters

Unauthorised access to user profiles and temporary folders can enable malware execution and data theft, rapidly compromising sensitive business operations.

settings

Operational notes

Maintain application control rules for user profiles and temporary folders; allow only approved apps, and review logs for unauthorised access attempts.

Mapping detail

Mapping

Direction

Controls