Skip to content
arrow_back
search
ISM-1786 policy ASD Information Security Manual (ISM)

Maintain an Approved Supplier List

Ensure a list of approved suppliers is created, used, and kept updated.

record_voice_over

Plain language

Having an approved supplier list is about knowing which companies or service providers are safe and reliable to work with. This matters because using an unapproved supplier could mean dealing with poor service, delays, or even giving sensitive information to the wrong people, potentially harming your organisation's reputation and security.

Framework

ASD Information Security Manual (ISM)

Control effect

Proactive

Classifications

NC, OS, P, S, TS

ISM last updated

Nov 2022

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

An approved supplier list is developed, implemented and maintained.
policy ASD Information Security Manual (ISM) ISM-1786
priority_high

Why it matters

Without an approved supplier list, organisations may onboard unvetted vendors, increasing supply-chain risk, breaches, and disruptions.

settings

Operational notes

Maintain an approved supplier list by adding security/compliance checks, periodic reviews, and removing suppliers that fail reassessment.

Mapping detail

Mapping

Direction

Controls