Skip to content
arrow_back
search
ISM-0955 policy ASD Information Security Manual (ISM)

Implementing Application Control Measures

Ensure applications are controlled using secure hashing, valid certificates, or designated paths.

record_voice_over

Plain language

Application control is about keeping a tight grip on which programs can run on your computers or devices. This matters because letting the wrong programs run—whether accidental or malicious—can lead to data breaches, system crashes, or lost information, putting your business or school at risk.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Mar 2020

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Application control is implemented using cryptographic hash rules, publisher certificate rules or path rules.
policy ASD Information Security Manual (ISM) ISM-0955
priority_high

Why it matters

Without cryptographic hash, publisher certificate, or path rules, unauthorised software can run, causing compromise, malware infection, breaches, and instability.

settings

Operational notes

Maintain application control by updating hash, publisher certificate and path rules, and re-validating hashes after application updates to prevent unauthorised execution.

Mapping detail

Mapping

Direction

Controls