Skip to content
arrow_back
search
ISM-2023 policy ASD Information Security Manual (ISM)

Maintain a Reliable Source for Software

Ensure a trustworthy source for software is available and maintained consistently.

record_voice_over

Plain language

This control is about making sure your organisation gets software from a reliable and trusted place. It's important because using dodgy software sources can lead to installing harmful programs, resulting in data breaches or financial loss.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

May 2025

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

An authoritative source for software is established and maintained.
policy ASD Information Security Manual (ISM) ISM-2023
priority_high

Why it matters

Using untrusted software sources could introduce malware, risking data breaches, operational disruptions, and financial loss.

settings

Operational notes

Maintain an approved software repository/vendor list; require signature/hash verification and restrict installs to these sources.

Mapping detail

Mapping

Direction

Controls