Skip to content
arrow_back
search
E8-PO-ML1.2 bolt ASD Essential Eight

Use a vulnerability scanner with an updated database

Ensure a vulnerability scanner with current data is used to check for security issues.

record_voice_over

Plain language

Using a vulnerability scanner with an updated database means you're using a tool that knows about the latest security problems when checking your computers and network equipment. If you don't have this, a hacker could find and exploit issues in your system before you even know they exist, potentially causing data breaches or other damage to your business.

Framework

ASD Essential Eight

Control effect

Detective

E8 mitigation strategy

PO

Classifications

N/A

Official last update

N/A

Control Stack last updated

19 Mar 2026

E8 maturity levels

ML1

Official control statement

A vulnerability scanner with an up-to-date vulnerability database is used for vulnerability scanning activities.
bolt ASD Essential Eight E8-PO-ML1.2
priority_high

Why it matters

Without an updated vulnerability scanner, critical security flaws remain undetected, opening the door to breaches and data loss before mitigations can be applied.

settings

Operational notes

Configure the vulnerability scanner to update its vulnerability database daily and alert on failures; confirm scan results use the latest feed before triage and remediation.

Mapping detail

Mapping

Direction

Controls