Skip to content
arrow_back
search
ISM-2056 policy ASD Information Security Manual (ISM)

Provide Provenance for Software Builds

Ensure that details about how software is created are available to its users.

record_voice_over

Plain language

This control is about making sure that everyone who uses your software knows exactly how it was created. It's like having a clear recipe for a dish—without it, people wouldn't trust what they're consuming. If you don't provide this information, users might think twice about using your software, and it could lead to misunderstandings or security issues.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

May 2025

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

A software build provenance is produced and made available to consumers of software.
policy ASD Information Security Manual (ISM) ISM-2056
priority_high

Why it matters

Without software build provenance, consumers cannot verify what produced the release, increasing supply-chain compromise risk via tampered dependencies or injected code.

settings

Operational notes

Generate and publish build provenance with each release (builder, source commit, dependencies, build steps, artefact hashes) so consumers can independently verify integrity and origin.

Mapping detail

Mapping

Direction

Controls