Skip to content
Control Stack logo Control Stack
ISM-1947 ASD Information Security Manual (ISM)

Remove User Authentication from Extended Key Usages

Ensure that Extended Key Usages do not allow user authentication.

🏛️ Framework

ASD Information Security Manual (ISM)

🧭 Control effect

Preventative

🔐 Classifications

NC, OS, P, S, TS

🗓️ ISM last updated

Aug 2024

✏️ Control Stack last updated

22 Feb 2026

🎯 E8 maturity levels

N/A

Official control statement
Extended Key Usages that enable user authentication are removed.

Source: ASD Information Security Manual (ISM)

Plain language

This control is about ensuring that certain parts of your system that deal with verification keys are not used to log users in. If this isn't done, your company could experience unauthorised access, putting confidential information at risk and potentially resulting in financial and reputational harm.

Why it matters

If user-authentication EKUs remain on certificates, they can be used for client logon, enabling unauthorised access to systems and data.

Operational notes

Audit certificates/AD CS templates and remove EKUs that permit user auth (eg Client Authentication, Smart Card Logon) to prevent certificate-based logon.

Implementation tips

  • The IT team should review the certificate templates used in Active Directory Certificate Services. They need to identify any templates that include user authentication and update them by removing this capability. They can do this by following step-by-step instructions available in Microsoft's documentation.
  • The system administrator should organise a training session for staff involved with managing certificates. This session should explain why removing user authentication from these templates is important and demonstrate how to identify and modify the settings. The training could consist of an interactive workshop with practical exercises.
  • The compliance officer ought to check with the IT department to ensure that any newly deployed or existing certificate templates do not allow user authentication. They can ask for an updated list of all certificate templates and their current settings related to user authentication.
  • The security manager should set up a procedure for regularly reviewing certificate permissions. This includes a schedule for checks and balances to ensure continuous adherence to the policy of not using these certificates for user authentication.
  • The IT team should implement automated monitoring tools to alert them if any certificate templates are configured incorrectly in the future. These tools could be simple scripts that scan the certificate settings periodically and notify the administrator of any discrepancies.

Audit / evidence tips

  • Ask: the list of all certificate templates currently in use: Ensure that this list is recent and covers all relevant systems in Active Directory Certificate Services

    Good: would show no templates with user authentication enabled

  • Good: would show recent updates to remove user authentication capabilities along with approvals from responsible parties

  • Good: is training records showing that staff attended a session on certificate management in the last year

  • Good: demonstration will involve an admin successfully modifying a template as per guidelines

  • Ask: records from automated monitoring tools: These could be logs or alerts related to certificate management

    Good: includes logs showing consistent, periodic checks with zero unauthorized authentication configurations

Cross-framework mappings

How ISM-1947 relates to controls across ISO/IEC 27001, Essential Eight, and ASD ISM.

These mappings show relationships between controls across frameworks. They do not imply full equivalence or certification.

ISO 27001

Control Notes Details
Partially meets (1)
Annex A 8.5 ISM-1947 requires organisations to remove Extended Key Usages (EKUs) in certificates that enable user authentication, ensuring certificat...

Mapping detail

Mapping

Direction

Controls