Skip to content
arrow_back
search
ISM-1238 policy ASD Information Security Manual (ISM)

Incorporate Threat Modelling in Software Development

Use threat modelling to identify potential risks when developing software.

record_voice_over

Plain language

When developing software, it's important to think about how hackers might try to break in or cause harm. By doing this 'threat modelling', you can spot potential risks early and make your software safer. If you skip this step, you risk creating software that could easily be exploited by cybercriminals, leading to data breaches, financial loss, or damage to your reputation.

Framework

ASD Information Security Manual (ISM)

Control effect

Proactive

Classifications

NC, OS, P, S, TS

ISM last updated

May 2025

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Threat modelling is used in support of the software development life cycle.
policy ASD Information Security Manual (ISM) ISM-1238
priority_high

Why it matters

Without threat modelling in the SDLC, design flaws and missed attack paths can ship to production, increasing breach likelihood and cost.

settings

Operational notes

Revisit the threat model at each major sprint/release and after architecture changes; update assets, trust boundaries, and mitigations.

Mapping detail

Mapping

Direction

Controls