Skip to content
arrow_back
search
ISM-1787 policy ASD Information Security Manual (ISM)

Ensure Suppliers are Approved for IT and OT Sourcing

Ensure systems and equipment are bought from pre-approved suppliers to mitigate risks.

record_voice_over

Plain language

Ensuring that all computer systems, software, and equipment come from approved suppliers is like making sure you buy food from a trusted farmer. It reduces the risk of getting poor-quality or unsafe products that could harm your organisation. If you don't do this, you might end up with systems that are not secure, leading to data breaches or costly downtime.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

May 2025

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Operating systems, applications, IT equipment, OT equipment and services are sourced from approved suppliers.
policy ASD Information Security Manual (ISM) ISM-1787
priority_high

Why it matters

Sourcing IT/OT from unapproved suppliers increases supply-chain compromise risk, introducing insecure systems and services that can cause breaches and outages.

settings

Operational notes

Maintain an approved supplier register for OS/apps/IT/OT and services; require procurement to use it, and review approvals quarterly with documented evidence.

Mapping detail

Mapping

Direction

Controls