Skip to content
arrow_back
search
ISM-1796 policy ASD Information Security Manual (ISM)

Digitally Sign Executable Software for Security

Executable files must have a digital signature verified by a trusted certificate to ensure security.

record_voice_over

Plain language

This control is about ensuring that when software is developed, any files that have the ability to be executed on a computer are digitally signed. This digital signing process provides a way to confirm that the software comes from a trusted source and hasn't been tampered with. Without this, you risk running untrusted software that could harm your computers or steal sensitive information.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Feb 2025

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Files containing executable content are digitally signed by a certificate with a verifiable chain of trust as part of software development.
policy ASD Information Security Manual (ISM) ISM-1796
priority_high

Why it matters

Without code signing, attackers can tamper with executable files to add malware, bypass trust checks, and gain unauthorised access or steal data.

settings

Operational notes

Use trusted code-signing certificates with a verifiable chain of trust; regularly validate certificate status/expiry and automate enforcement so only signed executables are built and deployed.

Mapping detail

Mapping

Direction

Controls