Skip to content
arrow_back
search
ISM-2060 policy ASD Information Security Manual (ISM)

Ensure Code Reviews Support Secure Design

Code reviews check if software follows secure design and programming practices.

record_voice_over

Plain language

Code reviews make sure that the software being developed is built in a way that is secure and can protect our information. This is important because if the software has security weaknesses, it could be hacked, leading to data breaches, financial loss, and damage to our reputation.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

May 2025

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Code reviews are utilised to ensure software meets Secure by Design principles and practices as well as secure programming practices.
policy ASD Information Security Manual (ISM) ISM-2060
priority_high

Why it matters

Without secure-by-design code reviews, insecure patterns and common coding flaws (e.g., injection, authz bypass) may ship, enabling compromise and data loss.

settings

Operational notes

Use documented review checklists for secure-by-design and secure coding (input validation, authz, secrets, crypto use), and track/fix findings before merge.

Mapping detail

Mapping

Direction

Controls