Ensure Network Devices Have Trusted Firmware
Network devices must be installed with trusted firmware before their first use to prevent security risks.
Plain language
Before you use network devices like routers or switches, you should make sure they have trusted software installed. This is crucial because if you use them with untrusted software, it could have hidden problems that let attackers get into your network, leading to data breaches and privacy issues.
Framework
ASD Information Security Manual (ISM)
Control effect
Preventative
Classifications
NC, OS, P, S, TS
ISM last updated
Aug 2022
Control Stack last updated
19 Mar 2026
E8 maturity levels
N/A
Guideline
Guidelines for networkingSection
Network design and configurationOfficial control statement
Network devices are flashed with trusted firmware before they are used for the first time.
Why it matters
Using network devices with untrusted firmware risks allowing attackers to exploit hidden vulnerabilities, leading to potential breaches and data loss.
Operational notes
Before first use, flash devices with vendor-approved firmware, then verify image integrity (hash/signature) and record firmware versions for audit.
Implementation tips
- IT team should verify firmware integrity: Before installing any network device, ensure the IT team checks the firmware to see if it comes from a reputable source. This can involve downloading firmware only from the official site of the manufacturer and double-checking its authenticity with verification tools.
- Procurement should select reputable vendors: Ensure that the procurement team selects network devices from manufacturers known for high security standards. This may involve researching customer reviews, checking the company's reputation in the cybersecurity field, and reviewing any published security reports.
- IT team should set up a process for firmware updates: Establish a procedure for regularly checking and updating the firmware of all network devices. This includes scheduling regular updates, testing updates on a non-critical device first, and keeping records of each update.
- Manager should conduct training sessions: Ensure staff involved with network devices know how to handle firmware updates and the risks of using unverified software. Conduct annual training sessions, which can include instructions on what firmware is, why it needs to be trusted, and how to verify it.
- IT team should document firmware checks: Create and maintain a log for each device that records when the firmware was last checked or updated. Include the version number, source of the firmware, and verification results.
Audit / evidence tips
-
Askfirmware verification documentation: Request to see records showing where each network device's firmware was sourced and verified
GoodComplete records with detailed steps showing checks were performed before device use
-
Askdevice vendor selection criteria: Request the criteria used by procurement to choose network device vendors
GoodDocumented criteria highlighting vendor reputation and specific security behaviours considered in the selection
-
Asktraining records of IT staff: Request to see a list of training sessions held for IT staff regarding firmware management
GoodTraining records showing regular and comprehensive training on firmware verification processes
-
Askthe process document for firmware updates: Request the procedure or policy that outlines how firmware updates are managed
GoodA detailed, up-to-date document outlining precise steps and responsible parties
-
Asksamples of firmware update logs: Request logs of a few randomly chosen devices to review past update activities
GoodConsistent logs indicating regular updates, with verified sources and no gaps in records
Cross-framework mappings
How ISM-1800 relates to controls across ISO/IEC 27001, Essential Eight, and ASD ISM.
ISO 27001
| Control | Notes | Details |
|---|---|---|
| layers Partially meets (3) expand_less | ||
| Annex A 5.19 | ISM-1800 requires network devices to be flashed with trusted firmware before first use, which helps counter risks arising from vendor or ... | |
| Annex A 5.21 | ISM-1800 requires flashing network devices with trusted firmware before first use to reduce the likelihood of supply chain or pre-comprom... | |
| Annex A 8.20 | ISM-1800 requires network devices to be flashed with trusted firmware before they are used for the first time, reducing the risk of compr... | |
| sync_alt Partially overlaps (1) expand_less | ||
| Annex A 8.19 | ISM-1800 requires network devices to be flashed with trusted firmware before first use to prevent introduction of compromised device soft... | |
E8
| Control | Notes | Details |
|---|---|---|
| handshake Supports (1) expand_less | ||
| E8-PO-ML3.3 | ISM-1800 requires network devices to begin operation with trusted firmware to avoid running compromised or tampered code | |
These mappings show relationships between controls across frameworks. They do not imply full equivalence or certification.