Skip to content
arrow_back
search
ISM-1809 policy ASD Information Security Manual (ISM)

Implement Compensating Controls for Unsupported Systems

When systems can't be updated or replaced, use temporary security measures.

record_voice_over

Plain language

This control is about using temporary security measures for systems that can't be updated or replaced because they're no longer supported by their makers. It's crucial because unsupported systems can have security holes that hackers could exploit, putting your data and operations at risk.

Framework

ASD Information Security Manual (ISM)

Control effect

Responsive

Classifications

NC, OS, P, S, TS

ISM last updated

Nov 2024

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

When applications, operating systems, network devices or networked IT equipment that are no longer supported by vendors cannot be immediately removed or replaced, compensating controls are implemented until such time that they can be removed or replaced.
policy ASD Information Security Manual (ISM) ISM-1809
priority_high

Why it matters

Unsupported systems expose unpatched flaws; without compensating controls attackers can exploit them, causing breach, outages or lateral movement.

settings

Operational notes

For each unsupported asset, document why it remains, isolate it (segmentation/ACLs), restrict admin access, add monitoring, and set a dated replacement plan.

Mapping detail

Mapping

Direction

Controls