Skip to content
arrow_back
search
ISM-2046 policy ASD Information Security Manual (ISM)

Ensure Secure Impersonation Logging Practices

Ensure no sensitive information is recorded in logs and permissions are correctly set when users can impersonate others.

record_voice_over

Plain language

This control ensures that when someone in your organisation can act on behalf of another person, no private information gets recorded in logs. If not managed properly, it risks accidentally exposing sensitive data or causing unauthorised access to important parts of your system.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

May 2025

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Where software allows user impersonation, sensitive data is not logged and appropriate permissions are set.
policy ASD Information Security Manual (ISM) ISM-2046
priority_high

Why it matters

Insecure impersonation logging can record sensitive data (e.g. passwords, message content) and expose it to unauthorised users, causing data breaches.

settings

Operational notes

Audit impersonation logs and events to confirm no sensitive fields are captured, and restrict log access to authorised roles with least privilege.

Mapping detail

Mapping

Direction

Controls