Skip to content
arrow_back
search
ISM-1898 policy ASD Information Security Manual (ISM)

Use Secure Admin Workstations for Administration

Use special secure computers for admin tasks to protect sensitive data.

record_voice_over

Plain language

Using secure admin workstations means setting up special, highly-protected computers for sensitive tasks like managing your business's IT systems. This is crucial because if regular computers are used for these tasks, a security breach could give hackers the keys to your digital kingdom, risking data theft or business disruption.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Nov 2023

Control Stack last updated

19 Mar 2026

E8 maturity levels

ML3

Official control statement

Secure Admin Workstations are used in the performance of administrative activities.
policy ASD Information Security Manual (ISM) ISM-1898
priority_high

Why it matters

Without secure admin workstations, attackers can steal admin credentials and use privileged access to breach systems and compromise the network.

settings

Operational notes

Use dedicated secure admin workstations only for privileged tasks; prevent email/web use, enforce allow-listing, and keep them patched and isolated from user endpoints.

Mapping detail

Mapping

Direction

Controls