Skip to content
arrow_back
search
ISM-1632 policy ASD Information Security Manual (ISM)

Ensure Secure Procurement from Reliable Suppliers

Buy technology from suppliers known for keeping their systems secure.

record_voice_over

Plain language

This control is about buying technology, like computers and software, from suppliers known for having good security. This is important because if these suppliers aren't secure themselves, your business could end up with vulnerable products that hackers could exploit, leading to data breaches or system failures.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

May 2025

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Operating systems, applications, IT equipment, OT equipment and services are procured from suppliers that have a strong track record of maintaining the security of their own systems.
policy ASD Information Security Manual (ISM) ISM-1632
priority_high

Why it matters

Purchasing from insecure suppliers risks receiving compromised technology, which can lead to data breaches or operational disruptions.

settings

Operational notes

Periodically assess suppliers’ security posture, incident history and assurance evidence (e.g., audits) before purchase and renewal to reduce supply-chain compromise risk.

Mapping detail

Mapping

Direction

Controls