Skip to content
arrow_back
search
ISM-1422 policy ASD Information Security Manual (ISM)

Prevent Unauthorised Access to Software Source

Ensure only authorised users can access the main software source to keep it secure.

record_voice_over

Plain language

Unauthorised access to your software's main source can be a major risk because it allows outsiders to change, steal, or damage your software. This is crucial to prevent because it could lead to serious issues like financial loss, data breaches, and even loss of customer trust.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Aug 2018

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Unauthorised access to the authoritative source for software is prevented.
policy ASD Information Security Manual (ISM) ISM-1422
priority_high

Why it matters

If access to the authoritative source is not restricted, attackers or insiders can modify code or steal IP, leading to compromised integrity, data exposure, and reputational harm.

settings

Operational notes

Enforce least-privilege to source repos (MFA, RBAC), review access regularly, and monitor/audit commits in version control to detect and remove unauthorised changes quickly.

Mapping detail

Mapping

Direction

Controls