Skip to content
arrow_back
search
ISM-1882 policy ASD Information Security Manual (ISM)

Procurement from Transparent Suppliers

Ensure vendors are transparent about their products and services before purchasing.

record_voice_over

Plain language

This control is about making sure you only buy tech products and services from suppliers who are upfront and honest about what they're providing. This is important because if a supplier won't disclose details, they might be hiding security risks. These hidden risks can lead to data breaches or other security issues for your business.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

May 2025

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Operating systems, applications, IT equipment, OT equipment and services are procured from suppliers that have demonstrated a commitment to transparency for their products and services.
policy ASD Information Security Manual (ISM) ISM-1882
priority_high

Why it matters

If suppliers are not transparent (e.g., no SBOMs or disclosure), insecure components may be procured, raising compromise and data loss risk.

settings

Operational notes

Assess supplier transparency during procurement (SBOMs, disclosure policy, provenance) and re-review periodically; update approved supplier lists as risks change.

Mapping detail

Mapping

Direction

Controls