Skip to content
arrow_back
search
ISM-1568 policy ASD Information Security Manual (ISM)

Ensure Security Commitment from Suppliers

Buy IT and OT products only from suppliers who show they care about product security.

record_voice_over

Plain language

This control means that when you buy technology products or services, you should only choose suppliers who show they prioritise the security of what they sell. This is important because if the suppliers don't care about security, their products might be more vulnerable to hacking. If something goes wrong, it could cost your business time, money, or even your reputation.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

May 2025

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Operating systems, applications, IT equipment, OT equipment and services are procured from suppliers that have demonstrated a commitment to the security of their products and services.
policy ASD Information Security Manual (ISM) ISM-1568
priority_high

Why it matters

Procurement from lax suppliers can introduce vulnerable products into your network, increasing the risk of costly breaches and reputation damage.

settings

Operational notes

Vet supplier security commitments via questionnaires, certifications and audit evidence before purchase, and re-assess key suppliers regularly to confirm secure development and support practices.

Mapping detail

Mapping

Direction

Controls