Skip to content
arrow_back
search
ISM-0402 policy ASD Information Security Manual (ISM)

Comprehensive Software Vulnerability Testing

Software undergoes thorough vulnerability testing both before and after release to spot undiscovered security issues.

record_voice_over

Plain language

Testing software for vulnerabilities means checking it for weaknesses that hackers could exploit before it goes out into the world and regularly after that. If this isn't done, there could be serious risks like data breaches that can harm your business's reputation and cost a lot of money.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

May 2025

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Software is comprehensively tested for vulnerabilities, using SAST, DAST and SCA prior to its initial release, any subsequent releases and periodically in order to attempt to identify any previously unidentified vulnerabilities.
policy ASD Information Security Manual (ISM) ISM-0402
priority_high

Why it matters

Without comprehensive SAST, DAST and SCA before each release, exploitable flaws may ship to production, leading to breaches, outages and costly remediation.

settings

Operational notes

Run SAST, DAST and SCA pre-release and on each subsequent release; schedule periodic scans post-release and triage findings into patches and retesting.

Mapping detail

Mapping

Direction

Controls