Skip to content
arrow_back
search
ISM-2012 policy ASD Information Security Manual (ISM)

Ensure Secure Screen Locking on Systems

Systems must lock screens after 15 minutes of inactivity, requiring full re-authentication to unlock without allowing the lock to be disabled.

record_voice_over

Plain language

This control ensures that if someone leaves their computer unattended, it automatically locks itself after 15 minutes to prevent unauthorised people from accessing sensitive information. It’s like having a lock on a door; if it doesn't lock, a stranger could walk in and see private information or even cause harm.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Feb 2025

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Systems are configured with a screen lock that: - activates after a maximum of 15 minutes of user inactivity, or when manually activated by users - conceals all content on the screen - ensures that the screen does not enter a power saving state before the screen lock is activated - requires users to re-authenticate using all authentication factors to unlock the system - denies users the ability to disable the screen locking mechanism.
policy ASD Information Security Manual (ISM) ISM-2012
priority_high

Why it matters

Without automatic screen locking, unattended systems can be easily accessed by unauthorised users, risking data breaches and loss of sensitive information.

settings

Operational notes

Verify screen locks trigger within 15 minutes, conceal content, require full re-authentication, and cannot be disabled by users.

Mapping detail

Mapping

Direction

Controls