Skip to content
arrow_back
search
ISM-1826 policy ASD Information Security Manual (ISM)

Select Vendors Committed to Secure Design for Servers

Choose server vendors who ensure secure designs and use safe programming practices.

record_voice_over

Plain language

When choosing companies to buy your computer servers from, make sure they are serious about safety from the very start. This matters because if the computer servers are not built securely, they can be more easily hacked, which could lead to loss of customer information, downtime, or financial trouble.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Feb 2025

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Vendors that have demonstrated a commitment to Secure by Design and Secure by Default principles and practices, including secure programming practices and either memory-safe programming languages or less preferably memory-safe programming practices, are used for server applications.
policy ASD Information Security Manual (ISM) ISM-1826
priority_high

Why it matters

Choosing server app vendors without Secure by Design/Default increases bug density and memory-safety flaws, enabling RCE, data loss and outages.

settings

Operational notes

Require evidence of Secure by Design/Default (SDLC, secure coding, VDP). Prefer memory-safe languages; otherwise verify mitigations and testing for memory bugs.

Mapping detail

Mapping

Direction

Controls