Skip to content
arrow_back
search
ISM-0289 policy ASD Information Security Manual (ISM)

Implement and Manage Evaluated Products Correctly

Ensure evaluated products are set up and run correctly following vendor instructions and evaluated settings.

record_voice_over

Plain language

This control is about making sure any security products you've bought that have been officially evaluated are set up and used exactly as the instructions say. If you don't, they might not protect you properly, leading to data breaches or system failures.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

May 2023

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Evaluated products are installed, configured, administered and operated in an evaluated configuration and in accordance with vendor guidance.
policy ASD Information Security Manual (ISM) ISM-0289
priority_high

Why it matters

Failure to adhere to evaluated settings may lead to exploitable security gaps, invalidating the product's assurance and exposing the organisation to breaches.

settings

Operational notes

Regularly validate evaluated configuration baselines and vendor guidance; use change control, configuration drift monitoring and audits to prevent non-evaluated settings.

Mapping detail

Mapping

Direction

Controls