Skip to content
arrow_back
search
ISM-1751 policy ASD Information Security Manual (ISM)

Timely Application of Vendor Patches for Non-Critical OS Vulnerabilities

Apply OS patches for non-critical issues within a month if no exploits exist.

record_voice_over

Plain language

This control requires that updates for minor security issues in the operating systems of certain IT equipment be applied within a month, as long as no known security hacks are taking advantage of these issues. This matters because even small vulnerabilities can be discovered and exploited by cybercriminals over time, potentially leading to data breaches or disruption of services if not addressed in time.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

May 2024

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Patches, updates or other vendor mitigations for vulnerabilities in operating systems of IT equipment other than workstations, servers and network devices are applied within one month of release when vulnerabilities are assessed as non-critical by vendors and no working exploits exist.
policy ASD Information Security Manual (ISM) ISM-1751
priority_high

Why it matters

Neglecting non-critical OS patches on non-server/workstation equipment can leave known flaws unpatched, enabling compromise of less monitored IT devices.

settings

Operational notes

Track vendor OS patch releases for non-server/workstation/network devices and apply non-critical fixes within 1 month when no working exploits are known.

Mapping detail

Mapping

Direction

Controls