Skip to content
arrow_back
search
ISM-1608 policy ASD Information Security Manual (ISM)

Scan Third-Party SOEs for Malicious Code

Third-party standard operating environments must be checked for viruses and bad configurations.

record_voice_over

Plain language

This control is about ensuring that software and systems we get from outside sources are checked for harmful code or configurations that could cause problems or expose us to cyber attacks. It's important to do this because, if missed, malicious code could harm our operations, steal data, or let outsiders access our systems.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Feb 2022

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

SOEs provided by third parties are scanned for malicious code and configurations.
policy ASD Information Security Manual (ISM) ISM-1608
priority_high

Why it matters

Neglecting to scan third-party SOEs can introduce malware or insecure settings, leading to compromise, data breaches, and operational disruption.

settings

Operational notes

Before deployment, scan all third-party SOE images for malware and insecure configurations; re-scan on updates and keep scan results as evidence.

Mapping detail

Mapping

Direction

Controls