Skip to content
arrow_back
search
ISM-1788 policy ASD Information Security Manual (ISM)

Identify Multiple Suppliers for Critical IT Sourcing

Ensure multiple suppliers are considered for sourcing essential IT systems and services to reduce supply chain risks.

record_voice_over

Plain language

When sourcing critical IT systems and services, it's important to have multiple suppliers lined up. This helps to protect against risks like a supplier going out of business or being unable to meet your needs, which could seriously disrupt your operations.

Framework

ASD Information Security Manual (ISM)

Control effect

Proactive

Classifications

NC, OS, P, S, TS

ISM last updated

May 2025

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Multiple potential suppliers are identified for sourcing critical operating systems, applications, IT equipment, OT equipment and services.
policy ASD Information Security Manual (ISM) ISM-1788
priority_high

Why it matters

Relying on a single supplier for critical IT services can severely disrupt operations if they fail to deliver, increasing supply chain risks.

settings

Operational notes

Maintain at least two viable suppliers for critical OS/apps/equipment/services, and periodically reassess capability, lead times and financial viability.

Mapping detail

Mapping

Direction

Controls