Skip to content
arrow_back
search
ISM-1631 policy ASD Information Security Manual (ISM)

Identify Suppliers in Cyber Supply Chain

Ensure all suppliers linked to IT and OT systems are identified for security management.

record_voice_over

Plain language

This control is about knowing exactly who your suppliers are when it comes to your IT and operational technology systems. Knowing your suppliers is crucial because if you don't, you might be blindsided by vulnerabilities in the softwares or machines you rely on. This can lead to system failures, data breaches, or disruptions in service, costing your business time, money, and reputation.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

May 2025

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Suppliers of operating systems, applications, IT equipment, OT equipment and services associated with systems are identified.
policy ASD Information Security Manual (ISM) ISM-1631
priority_high

Why it matters

Failure to identify all suppliers can lead to unassessed risks from third-party vulnerabilities, potentially causing breaches and operational disruptions.

settings

Operational notes

Maintain an up-to-date register of all OS, application, IT/OT equipment and service suppliers supporting each system; review changes on procurement and renewals.

Mapping detail

Mapping

Direction

Controls