Skip to content
arrow_back
search
ISM-1790 policy ASD Information Security Manual (ISM)

Ensure Integrity in IT and OT Deliveries

Deliveries of IT and OT systems should be made securely to prevent tampering or integrity loss.

record_voice_over

Plain language

This control is about making sure that when you receive technology products or services, like computers or operating systems, they haven't been messed with or damaged before they reach you. If this isn't done properly, you could end up using equipment that doesn't work right, or worse, could be hacked to steal your information or harm your business.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

May 2025

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Operating systems, applications, IT equipment, OT equipment and services are delivered in a manner that maintains their integrity.
policy ASD Information Security Manual (ISM) ISM-1790
priority_high

Why it matters

Compromised deliveries can lead to tampered systems that expose sensitive data, disrupt operations, or enable cyber attacks.

settings

Operational notes

Verify delivery integrity with hashes/signature checks, keep chain-of-custody records, and validate suppliers and packaging on receipt.

Mapping detail

Mapping

Direction

Controls