ISM-1591

Access to systems, applications and data repositories is removed or suspended as soon as practicable when personnel are detected undertaking malicious activities.

Topic
Suspension of access to systems
Applicable to
all

History

Aug 2020
Access to systems, applications and data repositories is removed or suspended as soon as practicable when personnel are detected undertaking malicious activities.
Security control 1591 was introduced to ensure that the access of personnel conducting malicious activities is suspended as soon as practicable after such activities are detected.