Skip to content
arrow_back
search
ISM-1452 policy ASD Information Security Manual (ISM)

Assess Supply Chain Risks for IT and OT Suppliers

Evaluate the risk suppliers pose to system security for IT and OT products and services.

record_voice_over

Plain language

This control is about understanding and managing the risks that suppliers of IT and operational technology (OT) can pose to your business. It matters because if a supplier has weak security, it could lead to hackers gaining access to your systems, causing data breaches or service disruptions.

Framework

ASD Information Security Manual (ISM)

Control effect

Proactive

Classifications

NC, OS, P, S, TS

ISM last updated

May 2025

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

A supply chain risk assessment is performed for suppliers of operating systems, applications, IT equipment, OT equipment and services in order to assess the impact to a system's security risk profile.
policy ASD Information Security Manual (ISM) ISM-1452
priority_high

Why it matters

Failing to assess IT/OT supplier risks increases exposure to compromised software, hardware or services, enabling breaches and outages.

settings

Operational notes

Perform and document supplier risk assessments (OS/apps/IT/OT equipment/services), including vendor questionnaires, attestations, and incident history reviews.

Mapping detail

Mapping

Direction

Controls