Skip to content
arrow_back
search
ISM-1958 policy ASD Information Security Manual (ISM)

Prevent Unauthorised Access for DCSync Accounts

Users with certain permissions can't access less secure systems to maintain security.

record_voice_over

Plain language

This control is about making sure that certain powerful user accounts, which can copy sensitive data from your systems, don't log into less secure computers where they might be more easily compromised. It's important because if these accounts are used in unsafe environments, hackers could gain access and steal or alter important data, putting your entire organisation at risk.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Aug 2024

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

User accounts with DCSync permissions cannot logon to unprivileged operating environments.
policy ASD Information Security Manual (ISM) ISM-1958
priority_high

Why it matters

If DCSync-capable accounts can log on to unprivileged hosts, attackers can steal AD credentials (e.g., hashes) and escalate domain compromise.

settings

Operational notes

For DCSync accounts, deny interactive/RDP/local logon via GPO, enforce PAW/admin tiering, and allow only required AD replication rights.

Mapping detail

Mapping

Direction

Controls