Skip to content
arrow_back
search
ISM-1389 policy ASD Information Security Manual (ISM)

Analyse Executable Files in Sandboxes

Files coming through gateways are tested in a safe environment to catch suspicious activities.

record_voice_over

Plain language

This control means that any software or program files coming into your organisation should first be tested in a safe, separate environment to see if they behave badly. It's important because if these files are harmful and you don't catch them early, they could damage your systems or steal sensitive information from your business.

Framework

ASD Information Security Manual (ISM)

Control effect

Detective

Classifications

NC, OS, P, S, TS

ISM last updated

Feb 2022

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Executable files imported via gateways or CDSs are automatically executed in a sandbox to detect any suspicious behaviour.
policy ASD Information Security Manual (ISM) ISM-1389
priority_high

Why it matters

Without sandbox execution and analysis of gateway/CDS-imported executables, malware may bypass controls, causing data compromise and service disruption.

settings

Operational notes

Keep sandbox images and detonation rules current, and automatically execute all gateway/CDS-imported executables to capture suspicious runtime behaviour.

Mapping detail

Mapping

Direction

Controls