Skip to content
arrow_back
search
ISM-1658 policy ASD Information Security Manual (ISM)

Restrict Execution of Drivers via Application Control

Ensures only approved drivers are run on systems, enhancing security.

record_voice_over

Plain language

This control ensures that only the drivers officially approved by your organisation are allowed to run on your computers and devices. This matters because unapproved or malicious drivers can be used by attackers to gain control of your systems, potentially causing data breaches or system failures.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Aug 2021

Control Stack last updated

19 Mar 2026

E8 maturity levels

ML3

Official control statement

Application control restricts the execution of drivers to an organisation-approved set.
policy ASD Information Security Manual (ISM) ISM-1658
priority_high

Why it matters

Unapproved drivers can introduce kernel-level vulnerabilities, enabling privilege escalation or malware persistence, causing breaches and outages.

settings

Operational notes

Maintain an approved driver allow-list; review new driver releases, and routinely audit endpoints so only allow-listed/signed drivers load at boot/runtime.

Mapping detail

Mapping

Direction

Controls