Skip to content
arrow_back
search
ISM-1235 policy ASD Information Security Manual (ISM)

Restrict Add-ons to Approved Set in Applications

Only use organisation-approved add-ons for applications to ensure security.

record_voice_over

Plain language

This control means you should only use add-ons or extensions for software that your organisation has already approved. This is important because unapproved add-ons might introduce security risks, like opening the door to viruses or allowing sensitive data to be leaked or even stolen.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

May 2025

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Add-ons, extensions and plug-ins for office productivity suites, web browsers, email clients, PDF applications and security products are restricted to an organisation-approved set.
policy ASD Information Security Manual (ISM) ISM-1235
priority_high

Why it matters

Unauthorised add-ons can introduce malware, weaken application security and enable data exfiltration via browsers, office and PDF/email clients.

settings

Operational notes

Maintain an enforced allow-list for add-ons across browsers, office, PDF and email clients; review approvals periodically and remove unapproved or vulnerable extensions.

Mapping detail

Mapping

Direction

Controls