Skip to content
arrow_back
search
ISM-1564 policy ASD Information Security Manual (ISM)

Develop Plan of Action Post Security Assessment

After assessing security, system owners create a plan to address and resolve issues.

record_voice_over

Plain language

After a security assessment, the system owner must create a plan to fix any issues that were found. This is important because without a plan, problems might go unresolved, leaving the system vulnerable to attacks, which could lead to data breaches or disruptions to business operations.

Framework

ASD Information Security Manual (ISM)

Control effect

Responsive

Classifications

NC, OS, P, S, TS

ISM last updated

Apr 2020

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

At the conclusion of a security assessment for a system, a plan of action and milestones is produced by the system owner.
policy ASD Information Security Manual (ISM) ISM-1564
priority_high

Why it matters

If no post-assessment plan of action and milestones is produced, identified vulnerabilities may not be remediated or tracked, increasing likelihood of compromise and residual risk.

settings

Operational notes

After each security assessment, produce a POA&M listing each finding, owner, due date and milestone status; review it regularly and record closure evidence for remediation.

Mapping detail

Mapping

Direction

Controls