Skip to content
arrow_back
search
ISM-1807 policy ASD Information Security Manual (ISM)

Automated Asset Discovery for Vulnerability Scanning

Automatically find devices every two weeks to check for security problems.

record_voice_over

Plain language

Imagine if a burglar could sneak into your home because you didn’t know a window was open. This control is about making sure you regularly check to find all the devices on your network, so you can identify and fix security issues. If you don’t do this, you might miss vulnerable devices, risking data leaks or system downtime.

Framework

ASD Information Security Manual (ISM)

Control effect

Detective

Classifications

NC, OS, P, S, TS

ISM last updated

Nov 2022

Control Stack last updated

19 Mar 2026

E8 maturity levels

ML1, ML2, ML3

Official control statement

An automated method of asset discovery is used at least fortnightly to support the detection of assets for subsequent vulnerability scanning activities.
policy ASD Information Security Manual (ISM) ISM-1807
priority_high

Why it matters

Without fortnightly automated asset discovery, assets can be missed from vulnerability scanning, leaving exploitable weaknesses and increasing breach risk.

settings

Operational notes

Schedule automated asset discovery at least fortnightly; reconcile results with the asset register/CMDB and ensure newly found assets are queued for vulnerability scanning.

Mapping detail

Mapping

Direction

Controls