Control: ism-1591; Revision: 0; Updated: Aug-20; Applicability: ALL; Essential Eight: N/A
Access to systems, applications and data repositories is removed or suspended as soon as practicable when personnel are detected undertaking malicious activities.