Skip to content
arrow_back
search
ISM-2029 policy ASD Information Security Manual (ISM)

Restrict Third-Party Libraries to Trustworthy Sources

Only use third-party libraries from reliable sources to ensure software security.

record_voice_over

Plain language

This control is about ensuring that the software your business uses is safe by only including parts from reliable and trustworthy sources. If you include software components from untrustworthy sources, your systems could become vulnerable to hackers, potentially leading to data theft or financial loss.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Aug 2025

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

The authoritative source for software restricts the use and import of third-party libraries and software components to trustworthy sources.
policy ASD Information Security Manual (ISM) ISM-2029
priority_high

Why it matters

Using untrusted third-party libraries can introduce vulnerable or malicious code, enabling supply-chain compromise of applications and systems.

settings

Operational notes

Use an allowlist of approved libraries/registries, require integrity checks (hash/signature), and review advisories/updates for each trusted source.

Mapping detail

Mapping

Direction

Controls