Skip to content
arrow_back
search
ISM-2027 policy ASD Information Security Manual (ISM)

Verify Software Artefacts with Digital Signatures

Ensure all software is authenticated with a digital signature or secure hash before use.

record_voice_over

Plain language

This control is about making sure that the software your business uses is legitimate and hasn't been tampered with. Think of it as checking the seal on a jar of jam; if you don't verify it's unbroken, you might end up with something spoiled or fake. Skipping this step could lead to malware entering your systems, resulting in data breaches or financial losses.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

May 2025

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

All software artefacts are verified by a digital signature, or a secure hash provided over a secure channel, before being imported into the authoritative source for software.
policy ASD Information Security Manual (ISM) ISM-2027
priority_high

Why it matters

Without verifying artefacts via digital signatures or trusted hashes, malicious code can be imported into the software source, causing compromise or data loss.

settings

Operational notes

Maintain trusted signing keys/certificates and hash sources; verify signatures or hashes before import, and quarantine/reject any artefact with mismatches.

Mapping detail

Mapping

Direction

Controls