Skip to content
arrow_back
search
ISM-1792 policy ASD Information Security Manual (ISM)

Assess Authenticity of IT and OT Deliveries

Ensure that software and equipment are genuine before accepting them.

record_voice_over

Plain language

This control means you need to make sure any software or equipment you're using is the real deal, not a fake or compromised version. This is important because if you use counterfeit systems, they might have hidden vulnerabilities or malware that can lead to data breaches or system failures.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

May 2025

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

The authenticity of operating systems, applications, IT equipment, OT equipment and services are assessed as part of acceptance of products and services.
policy ASD Information Security Manual (ISM) ISM-1792
priority_high

Why it matters

If deliveries are not authenticated, counterfeit IT/OT systems or software can be introduced, creating hidden vulnerabilities and causing breaches and downtime.

settings

Operational notes

Regularly verify suppliers and perform checks on deliveries to authenticate equipment and software, preventing integration of counterfeit items.

Mapping detail

Mapping

Direction

Controls