Skip to content
arrow_back
search
ISM-1947 policy ASD Information Security Manual (ISM)

Remove User Authentication from Extended Key Usages

Ensure that Extended Key Usages do not allow user authentication.

record_voice_over

Plain language

This control is about ensuring that certain parts of your system that deal with verification keys are not used to log users in. If this isn't done, your company could experience unauthorised access, putting confidential information at risk and potentially resulting in financial and reputational harm.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Aug 2024

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Extended Key Usages that enable user authentication are removed.
policy ASD Information Security Manual (ISM) ISM-1947
priority_high

Why it matters

If user-authentication EKUs remain on certificates, they can be used for client logon, enabling unauthorised access to systems and data.

settings

Operational notes

Audit certificates/AD CS templates and remove EKUs that permit user auth (eg Client Authentication, Smart Card Logon) to prevent certificate-based logon.

Mapping detail

Mapping

Direction

Controls