Skip to content
arrow_back
search
ISM-2054 policy ASD Information Security Manual (ISM)

Ensure No Vulnerabilities in Third-Party Software Components

Use available software bill of materials to check third-party components for vulnerabilities during development.

record_voice_over

Plain language

When you use third-party software components in your business software, it's crucial to make sure those components don't have any known security problems. This matters because vulnerabilities in these components could be exploited by attackers to steal sensitive information or cause disruption to your business operations.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

May 2025

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

If a software bill of materials is available for imported third-party software components, it is used during software development to ensure such software components have no known vulnerabilities.
policy ASD Information Security Manual (ISM) ISM-2054
priority_high

Why it matters

If SBOMs aren’t used to check imported third‑party components, known vulnerable libraries can ship in builds, enabling compromise, outages and data exposure.

settings

Operational notes

Where available, ingest the vendor SBOM into build tooling and compare components/versions against CVE feeds; block or update any third‑party component with known vulnerabilities.

Mapping detail

Mapping

Direction

Controls