Skip to content
arrow_back
search
ISM-2078 policy ASD Information Security Manual (ISM)

Ensure Passwords Are Not Common or Compromised

Make sure passwords aren't from known compromised or common password lists to enhance security.

record_voice_over

Plain language

When we talk about ensuring passwords aren't from known compromised or common lists, it's like making sure you aren't using the same old rusty key everyone else has. If you use a weak or already stolen password, it's much easier for someone to break in and steal your information or mess with your systems.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Nov 2025

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Passwords appearing in lists of commonly used passwords or lists of compromised passwords are not used.
policy ASD Information Security Manual (ISM) ISM-2078
priority_high

Why it matters

Using common or compromised passwords invites unauthorised access, increasing the risk of data breaches and reputational damage.

settings

Operational notes

Block passwords found in common/compromised lists by checking proposed passwords against breach datasets (e.g. Have I Been Pwned) and refresh the lists routinely.

Mapping detail

Mapping

Direction

Controls