Skip to content
arrow_back
search
ISM-0285 policy ASD Information Security Manual (ISM)

Ensuring Evaluated Products Follow Delivery Procedures

Products must be delivered according to any specified delivery methods in evaluation documents.

record_voice_over

Plain language

When you've evaluated a product and decided to buy it, make sure it's delivered following any specific instructions outlined in evaluation documents. This matters because improper delivery might compromise the product's integrity or functionality, leading to operational hiccups or security vulnerabilities.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Aug 2018

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Evaluated products are delivered in a manner consistent with any delivery procedures defined in associated evaluation documentation.
policy ASD Information Security Manual (ISM) ISM-0285
priority_high

Why it matters

Improper delivery of evaluated products can compromise integrity, leading to potential security breaches and operational failures.

settings

Operational notes

Regularly verify delivery procedures align with evaluation documents to prevent security and functionality issues.

Mapping detail

Mapping

Direction

Controls