Skip to content
arrow_back
search
ISM-1937 policy ASD Information Security Manual (ISM)

Weekly Audit of sIDHistory in User Accounts

Check user accounts weekly to ensure they don't have the sIDHistory attribute.

record_voice_over

Plain language

This control is about regularly checking that the sIDHistory attribute is not present in user accounts within a Microsoft Active Directory. Ignoring this could allow unauthorised access or attacks that take advantage of old, previously removed permissions, putting your sensitive data at risk.

Framework

ASD Information Security Manual (ISM)

Control effect

Detective

Classifications

NC, OS, P, S, TS

ISM last updated

Aug 2024

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

User accounts are checked at least weekly for the presence of the sIDHistory attribute.
policy ASD Information Security Manual (ISM) ISM-1937
priority_high

Why it matters

If sIDHistory is not audited weekly, legacy SIDs can remain on accounts and be used to inherit old permissions, enabling unauthorised access and data compromise.

settings

Operational notes

Run a weekly query/report for non-empty sIDHistory on all user accounts, investigate any entries, and record results and remediation actions in your audit log.

Mapping detail

Mapping

Direction

Controls