Requests for privileged access to data repositories are validated when first requested.
Topic
Privileged access to systems
Applicable to
all
History
Dec 2023
Removed
The existing control relating to the centralised storage of unprivileged access event logs was merged into the existing control relating to collecting unprivileged access event logs. [ISM-1566, ISM-1714]
Dec 2021
Requests for privileged access to data repositories are validated when first requested.
Miscellaneous changes were made to rationale and security controls throughout the publication. This included: A review from the Using the Information Security Manual chapter through to the Guidelines for Media chapter.