Skip to content
arrow_back
search
ISM-1567 policy ASD Information Security Manual (ISM)

Avoid High-Risk Suppliers in Cyber Supply Chain

Suppliers considered high risk are not chosen to ensure the security of the supply chain.

record_voice_over

Plain language

This control is about not choosing suppliers who might pose a risk to the cybersecurity of your business. Imagine if you bought a lock for your front door from someone you know makes weak locks – you’d be leaving your house exposed to break-ins. In the same way, using high-risk suppliers can leave your business open to cyber attacks, data theft, or other serious problems.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Aug 2022

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Suppliers identified as high risk by a cyber supply chain risk assessment are not used.
policy ASD Information Security Manual (ISM) ISM-1567
priority_high

Why it matters

Using suppliers assessed as high risk can introduce supply chain compromise, leading to breaches, outages and loss of customer trust.

settings

Operational notes

Perform and document cyber supply chain risk assessments, and exclude suppliers rated high risk; reassess regularly and on major supplier changes.

Mapping detail

Mapping

Direction

Controls