Skip to content
arrow_back
search
ISM-2055 policy ASD Information Security Manual (ISM)

Ensure Software Components Meet Build Standards

Use available build history for third-party software to verify it meets standards during development.

record_voice_over

Plain language

When you bring in software made by someone else, it's essential to check that it was built following certain standards. This matters because if the software isn't up to scratch, it could contain hidden problems that might put your business at risk. Ensuring quality in the software can prevent potential security breaches or failures that can harm your business operations.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

May 2025

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

If a software build provenance is available for imported third-party software components, it is used during software development to ensure such software components are built to an appropriate standard.
policy ASD Information Security Manual (ISM) ISM-2055
priority_high

Why it matters

Not using available build provenance for imported third-party components can allow untrusted builds into products, increasing exploit risk and outages.

settings

Operational notes

When third-party components are imported, obtain and verify their build provenance (e.g., signed attestations/SBOMs) and gate use on meeting defined build standards.

Mapping detail

Mapping

Direction

Controls