Skip to content
arrow_back
search
ISM-1245 policy ASD Information Security Manual (ISM)

Clean Up Temporary Files Post-Installation

Delete temporary files and logs after server applications are installed to maintain security.

record_voice_over

Plain language

After installing new software on your servers, it's important to delete any temporary files left over. These files can contain sensitive information that hackers could exploit. By cleaning them up, you reduce the risk of unwanted access to your system.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Feb 2023

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

All temporary installation files and logs created during server application installation processes are removed after server applications have been installed.
policy ASD Information Security Manual (ISM) ISM-1245
priority_high

Why it matters

Failure to remove temporary installation files and logs can expose credentials or configuration details, enabling unauthorised access or system compromise.

settings

Operational notes

After each server app install/upgrade, run a scripted clean-up to delete installer temp files and installation logs, and verify no sensitive artefacts remain.

Mapping detail

Mapping

Direction

Controls