Skip to content
arrow_back
search
ISM-1816 policy ASD Information Security Manual (ISM)

Prevent Unauthorised Changes to Software Sources

Ensure software source is protected against unauthorised changes to maintain integrity.

record_voice_over

Plain language

This control is about making sure that only the right people can change or update the source of the software your business uses. If just anyone can tamper with it, you might end up with untrustworthy software that could affect everything your business does, leading to financial loss or damaging your reputation.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Nov 2022

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Unauthorised modification of the authoritative source for software is prevented.
policy ASD Information Security Manual (ISM) ISM-1816
priority_high

Why it matters

If the authoritative software source can be modified, attackers can inject code into builds, compromising released software and systems that deploy it.

settings

Operational notes

Restrict write access to authoritative repos; enforce signed commits/tags and protected branches; require peer review and verify changes before merge.

Mapping detail

Mapping

Direction

Controls