Skip to content
arrow_back
search
ISM-1789 policy ASD Information Security Manual (ISM)

Verify Authenticity for Delivery Acceptance in Supply Chain

Ensure all software, hardware, and services are genuine before accepting them for use.

record_voice_over

Plain language

This control is about making sure that all the software, hardware, and services you receive are exactly what you ordered and not counterfeit or tampered with. It's important because using fake or altered products can lead to security risks, data loss, or even legal problems if the counterfeit products fail or cause harm.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

May 2024

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Sufficient spares of critical IT equipment and OT equipment are sourced and kept in reserve.
policy ASD Information Security Manual (ISM) ISM-1789
priority_high

Why it matters

Without sufficient spares for critical IT/OT equipment, failures or supply disruptions can extend outages, delaying recovery and disrupting operations.

settings

Operational notes

Set minimum spare-holding levels for critical IT/OT items based on lead times and failure rates, and review stock regularly to avoid obsolescence.

Mapping detail

Mapping

Direction

Controls