Skip to content
arrow_back
search
ISM-0938 policy ASD Information Security Manual (ISM)

Select Secure-by-Design Committed Vendors

Choose vendors who prioritise secure design and development in their applications.

record_voice_over

Plain language

Choosing the right software vendors is like picking the best insurance for your business. When you select vendors that build their products with security in mind from the ground up, you're less likely to suffer from data breaches or system failures. If a vendor doesn't prioritise secure design, you might end up with software that exposes your business to hackers, leading to data loss, financial damage, and reputational harm.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Feb 2025

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Vendors that have demonstrated a commitment to Secure by Design and Secure by Default principles and practices, including secure programming practices and either memory-safe programming languages or less preferably memory-safe programming practices, are used for user applications.
policy ASD Information Security Manual (ISM) ISM-0938
priority_high

Why it matters

Using vendors lacking Secure-by-Design/Default and memory safety increases exploitable flaws in user applications and likelihood of compromise.

settings

Operational notes

Regularly assess vendor security posture: evidence of Secure-by-Design/Default practices, secure coding SDLC, and use of memory-safe languages where feasible.

Mapping detail

Mapping

Direction

Controls