Skip to content
arrow_back
search
ISM-1657 policy ASD Information Security Manual (ISM)

Restrict Application Execution to Approved Set

Only approved software and scripts can run, enhancing system security.

record_voice_over

Plain language

This control ensures that only approved software is allowed to run on your organisation's computers. It's important because if unauthorised programs are executed, they could introduce viruses or allow hackers to steal information, causing serious business disruptions.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Aug 2025

Control Stack last updated

19 Mar 2026

E8 maturity levels

ML1, ML2, ML3

Official control statement

Application control restricts the execution of executables, libraries, scripts, installers, compiled HTML, HTML applications and control panel applets to an organisation-approved set.
policy ASD Information Security Manual (ISM) ISM-1657
priority_high

Why it matters

Without application control (approved allow list), unauthorised executables, scripts or libraries can run, enabling malware, privilege abuse and unauthorised access to systems and data.

settings

Operational notes

Maintain and review the application allow list; test and deploy updates promptly. Verify enforcement blocks unapproved executables, scripts, installers and libraries, and monitor logs for blocked attempts.

Mapping detail

Mapping

Direction

Controls