Skip to content
arrow_back
search
ISM-0917 policy ASD Information Security Manual (ISM)

Procedures for Handling Malicious Code Infections

Systems with malware are isolated, scanned, cleansed, or restored to stop the infection.

record_voice_over

Plain language

If your computer system gets a virus or other malicious software, it's important to take specific steps to stop it from spreading and causing extra trouble. This control is crucial because failing to act quickly could lead to bigger issues like data theft, a shut down of your systems, or high costs to fix the damage.

Framework

ASD Information Security Manual (ISM)

Control effect

Responsive

Classifications

NC, OS, P, S, TS

ISM last updated

May 2025

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

When malicious code is detected, the following steps are taken to handle the infection: - the infected systems are isolated - all previously connected media used in the period leading up to the infection are scanned for signs of infection and isolated if necessary - antivirus applications are used to remove the infection from infected systems and media - if the infection cannot be reliably removed, systems are restored from a known good backup or rebuilt.
policy ASD Information Security Manual (ISM) ISM-0917
priority_high

Why it matters

If infections aren’t quickly isolated and previously connected media scanned, malware can spread and persist, causing outages, data loss and costly rebuilds.

settings

Operational notes

On detection, immediately isolate infected hosts, scan/quarantine all recently connected media, attempt AV removal, and restore from known-good backups or rebuild if removal is unreliable.

Mapping detail

Mapping

Direction

Controls