Skip to content
arrow_back
search
ISM-1492 policy ASD Information Security Manual (ISM)

Enable Exploit Protection in Operating Systems

Ensure operating system settings are adjusted to block potential attacks.

record_voice_over

Plain language

We need to make sure our computer systems are set up to stop hackers from taking advantage of any weaknesses in the software. This is crucial because if a system is vulnerable, it could lead to sensitive information being stolen, systems being disrupted, and potentially cost the business money and damage its reputation.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Feb 2022

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Operating system exploit protection functionality is enabled.
policy ASD Information Security Manual (ISM) ISM-1492
priority_high

Why it matters

If exploit protection isn't enabled, attackers may exploit OS vulnerabilities, leading to data breaches and operational disruptions.

settings

Operational notes

Regularly verify OS exploit protection settings and updates to prevent new vulnerabilities from being exploited by attackers.

Mapping detail

Mapping

Direction

Controls