Skip to content
arrow_back
search
ISM-1276 policy ASD Information Security Manual (ISM)

Use Safe Database Query Methods

Software should use parameterised queries or stored procedures to safely access databases.

record_voice_over

Plain language

When software needs to access a database, it's crucial to use safe methods like parameterised queries or stored procedures. Doing this prevents hackers from manipulating your database with harmful queries. If you don't, you risk exposing sensitive business or customer data, which can lead to financial and reputational harm.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Feb 2025

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Parameterised queries or stored procedures, instead of dynamically generated queries, are used by software for database interactions.
policy ASD Information Security Manual (ISM) ISM-1276
priority_high

Why it matters

Not using parameterised queries or stored procedures can enable SQL injection, leading to unauthorised data access, data loss, and service disruption.

settings

Operational notes

Review application code and ORM usage to ensure all SQL uses parameterised queries or stored procedures; test for SQL injection in CI and during releases.

Mapping detail

Mapping

Direction

Controls