Skip to content
arrow_back
search
ISM-1808 policy ASD Information Security Manual (ISM)

Vulnerability Scanning with Updated Tools

Ensure vulnerability scanners are updated regularly to identify system weaknesses.

record_voice_over

Plain language

You need to use a vulnerability scanner that is kept up to date to find weaknesses in your systems. If you don’t keep the scanner updated, you might miss security holes that hackers could exploit, leading to data breaches or other serious issues.

Framework

ASD Information Security Manual (ISM)

Control effect

Detective

Classifications

NC, OS, P, S, TS

ISM last updated

Nov 2022

Control Stack last updated

19 Mar 2026

E8 maturity levels

ML1, ML2, ML3

Official control statement

A vulnerability scanner with an up-to-date vulnerability database is used for vulnerability scanning activities.
policy ASD Information Security Manual (ISM) ISM-1808
priority_high

Why it matters

If vulnerability scanners or their databases are outdated, scans miss known CVEs, leaving exposed weaknesses that attackers can exploit.

settings

Operational notes

Update the scanner engine and vulnerability database at least weekly (or sooner if available) and verify updates before scheduled scans run.

Mapping detail

Mapping

Direction

Controls