Skip to content
Control Stack logo Control Stack
ISM-1897 ASD Information Security Manual (ISM)

Enable Remote Credential Guard for Credential Protection

Activating Remote Credential Guard helps prevent unauthorised access to security credentials.

🏛️ Framework

ASD Information Security Manual (ISM)

🧭 Control effect

Preventative

🔐 Classifications

NC, OS, P, S, TS

🗓️ ISM last updated

Nov 2023

✏️ Control Stack last updated

19 Mar 2026

🎯 E8 maturity levels

ML3

Official control statement
Remote Credential Guard functionality is enabled.

Source: ASD Information Security Manual (ISM)

Plain language

Activating Remote Credential Guard is like locking up your sensitive keys to make sure only the right people get to use them. This helps prevent someone from sneaking in and accessing your secure information, which could lead to data breaches or financial loss.

Why it matters

Without Remote Credential Guard, RDP logons can expose reusable credentials, enabling credential theft and lateral movement across Windows hosts.

Operational notes

Enforce Remote Credential Guard via Group Policy for all RDP clients/hosts and confirm RDP settings do not permit fallback to standard credential delegation.

Implementation tips

  • IT team should review current remote access policies: They need to identify all systems where credential protection is essential, focusing on those accessed remotely. Ensure these systems have Remote Credential Guard enabled by checking settings in the system configuration.
  • System administrators should enable Remote Credential Guard on Windows devices: This involves accessing group policy settings on each device and activating the Remote Credential Guard feature. Follow Microsoft's step-by-step guide to configure this correctly.
  • IT team should conduct a test: After enabling, run remote access scenarios to confirm that Remote Credential Guard activates when expected. Use a test environment to safely verify configurations work as intended before full deployment.
  • Managers should communicate the change to all relevant staff: Explain why this change is important and how it enhances security. Provide simple guidance on any new steps for remote access they should follow or be aware of.
  • IT security officer should document the activation process: Keep records of configurations, systems affected, and who verified the setup. This documentation will be useful for audits and future troubleshooting.

Audit / evidence tips

  • Ask: the list of systems where Remote Credential Guard is enabled: Request documentation listing all applicable systems and their current configuration status

    Good: shows all high-risk systems clearly identified with confirmed activation

  • Ask: to see a live or recorded demonstration illustrating how credentials are protected during remote access sessions

    Good: includes clear evidence of its operation during remote login attempts

  • Ask: records of configuration changes: Obtain change logs or records documenting when and by whom Remote Credential Guard was enabled

    Good: shows timely implementation, with IT personnel names and dates clearly indicated

  • Ask: emails, memos, or training documents related to Remote Credential Guard activation

    Good: includes easy-to-understand communication explaining the change and any necessary actions by staff

  • Good: includes successful test results demonstrating operational functionality without negatively impacting user access

Cross-framework mappings

How ISM-1897 relates to controls across ISO/IEC 27001, Essential Eight, and ASD ISM.

These mappings show relationships between controls across frameworks. They do not imply full equivalence or certification.

E8

Control Notes Details
Partially overlaps (2)
E8-RA-ML3.5 ISM-1897 requires enabling Remote Credential Guard to limit credential exposure when users access systems remotely
E8-RA-ML3.6 ISM-1897 requires enabling Remote Credential Guard to prevent exposure of credentials during remote connections
Related (1)
E8-RA-ML3.7 ISM-1897 requires that Remote Credential Guard functionality is enabled to protect credentials during remote authentication

Mapping detail

Mapping

Direction

Controls