Skip to content
arrow_back
search
ISM-1471 policy ASD Information Security Manual (ISM)

Utilise Publisher and Product Names in App Control

Use known publisher and product names to control which applications can run on a system.

record_voice_over

Plain language

This control is about letting only safe applications run on computers by checking who created the app and what it's called. It's important because if you don't manage which apps can run, you might accidentally allow harmful software that can steal information or break systems.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

May 2024

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

When implementing application control using publisher certificate rules, publisher names and product names are used.
policy ASD Information Security Manual (ISM) ISM-1471
priority_high

Why it matters

If publisher certificate rules don’t use publisher and product names, attackers can run malicious binaries under broad publisher rules, bypassing app control and enabling compromise.

settings

Operational notes

When creating publisher certificate rules, confirm both publisher and product name values from signed binaries and routinely review/update them so overly broad publisher rules don’t allow unwanted apps.

Mapping detail

Mapping

Direction

Controls