Skip to content
arrow_back
search
ISM-2050 policy ASD Information Security Manual (ISM)

Validate Digital Signature Certificates Securely

Software checks digital signatures against trusted certificates and ensures they haven't been revoked.

record_voice_over

Plain language

Digital signature certificates are like ID cards for software, proving they are legitimate and from a trusted source. If these certificates aren't checked properly, malicious software could slip through, posing risks like data theft or system compromise.

Framework

ASD Information Security Manual (ISM)

Control effect

Detective

Classifications

NC, OS, P, S, TS

ISM last updated

May 2025

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

When digital signatures are processed by software, they are validated against a certificate trust chain and checked for revocation using a Certificate Revocation List or with the Online Certificate Status Protocol.
policy ASD Information Security Manual (ISM) ISM-2050
priority_high

Why it matters

If certificate chains and revocation (CRL/OCSP) aren’t validated, attackers can use forged or revoked signing certs to deliver trusted-looking malware.

settings

Operational notes

Regularly update the certificate trust store and automate checks for revocation using CRLs or OCSP to ensure constant validation.

Mapping detail

Mapping

Direction

Controls