Skip to content
arrow_back
search
ISM-0677 policy ASD Information Security Manual (ISM)

Ensure File Integrity Through Signature Validation

Files with digital signatures or checksums must be verified at system boundaries to ensure integrity.

record_voice_over

Plain language

This control ensures that when files are transferred in or out of your organisation, they're checked for authenticity using digital signatures or checksums. This matters because if files are tampered with during transfer, it could lead to data corruption, security breaches, or even legal issues if sensitive information is involved.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Feb 2023

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Files imported or exported via gateways or CDSs that have a digital signature or cryptographic checksum are validated.
policy ASD Information Security Manual (ISM) ISM-0677
priority_high

Why it matters

If signatures or checksums aren’t validated at gateways/CDSs, tampered or malicious files can pass unnoticed, leading to compromise or data leakage.

settings

Operational notes

At each gateway/CDS, automatically verify digital signatures or cryptographic checksums on import/export and alert/quarantine files that fail validation.

Mapping detail

Mapping

Direction

Controls