Skip to content
arrow_back
search
ISM-2030 policy ASD Information Security Manual (ISM)

Prevent Storing Secrets in Software Repositories

Code commits are scanned for secrets to ensure they aren't saved in the main software repository.

record_voice_over

Plain language

This control is all about making sure that sensitive information, like passwords or secret keys, never ends up in the main storage area where your software code lives. This matters because if these secrets get exposed, hackers could access your systems, causing financial loss and damaging your reputation.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

May 2025

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Scanning is used during commits to identify plain text or encoded secrets and keys, which are then blocked from being stored in the authoritative source for software.
policy ASD Information Security Manual (ISM) ISM-2030
priority_high

Why it matters

If secrets are stored in repositories, they can be exposed in code leaks, giving attackers access to critical systems and data.

settings

Operational notes

Update pre-commit secret scanning patterns regularly and ensure alerts are triaged quickly to block commits with keys.

Mapping detail

Mapping

Direction

Controls