Skip to content
arrow_back
search
ISM-1700 policy ASD Information Security Manual (ISM)

Regular Vulnerability Scanning for Applications

A scanner is used every two weeks to find missing updates in most applications.

record_voice_over

Plain language

This control means using a tool every two weeks to check if your software is missing any updates, except for office apps and browsers. It's important because outdated software can have security gaps, making it easier for hackers to break in and cause damage to your business or steal information.

Framework

ASD Information Security Manual (ISM)

Control effect

Detective

Classifications

NC, OS, P, S, TS

ISM last updated

May 2025

Control Stack last updated

19 Mar 2026

E8 maturity levels

ML2, ML3

Official control statement

A vulnerability scanner is used at least fortnightly to identify missing patches or updates for vulnerabilities in applications other than office productivity suites, web browsers and their extensions, email clients, PDF applications, and security products.
policy ASD Information Security Manual (ISM) ISM-1700
priority_high

Why it matters

Without at least fortnightly vulnerability scans for non-standard applications, missing patches can go unnoticed, enabling exploitation and potential data breaches.

settings

Operational notes

Schedule automated scans at least every two weeks for non-standard applications, and triage results quickly to patch missing updates and close known vulnerabilities.

Mapping detail

Mapping

Direction

Controls