Skip to content
arrow_back
search
ISM-2077 policy ASD Information Security Manual (ISM)

Avoid Email for Out-of-Band Authentication

Do not use email for secondary authentication steps to increase security.

record_voice_over

Plain language

This control is about not using email as a second way to verify someone's identity when trying to access important information. Email can be hacked or misused, and if that happens during a verification process, an unauthorised person might get into your systems. This could lead to stolen data or other security troubles.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Nov 2025

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Email is not used for out-of-band authentication purposes.
policy ASD Information Security Manual (ISM) ISM-2077
priority_high

Why it matters

Using email for out-of-band authentication exposes codes/links to mailbox compromise; attackers who access email can complete MFA and take over accounts.

settings

Operational notes

Do not send OTPs or magic links via email. Use authenticator apps, FIDO2/WebAuthn or SMS, and verify enrolment/recovery flows exclude email.

Mapping detail

Mapping

Direction

Controls