Skip to content
arrow_back
search
ISM-1163 policy ASD Information Security Manual (ISM)

Regular System Vulnerability Scanning and Testing

Systems need regular checks for vulnerabilities, with tests before major updates and annually.

record_voice_over

Plain language

This control focuses on making sure your computer systems are regularly checked for weaknesses. It's like going to the doctor for a regular check-up; if you neglect this, you might leave yourself open to cyber attacks or data breaches, which can cause severe damage to your business's reputation and finances.

Framework

ASD Information Security Manual (ISM)

Control effect

Proactive

Classifications

NC, OS, P, S, TS

ISM last updated

Aug 2023

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Systems have a continuous monitoring plan that includes: - conducting vulnerability scans for systems at least fortnightly - conducting vulnerability assessments and penetration tests for systems prior to deployment, including prior to deployment of significant changes, and at least annually thereafter - analysing identified vulnerabilities to determine their potential impact - implementing mitigations based on risk, effectiveness and cost.
policy ASD Information Security Manual (ISM) ISM-1163
priority_high

Why it matters

Without fortnightly scans and pre-deployment/annual testing, exploitable vulnerabilities may persist unnoticed, enabling compromise, data loss and unplanned outages.

settings

Operational notes

Run automated vulnerability scans at least fortnightly; perform assessments/pen tests before deployment and major changes and annually. Triage findings and remediate by risk.

Mapping detail

Mapping

Direction

Controls