Skip to content
arrow_back
search
ISM-1848 policy ASD Information Security Manual (ISM)

Replace Unsupported Software in Server Isolation

Replace software when it's no longer supported to maintain server isolation.

record_voice_over

Plain language

Imagine your business relies on a particular software to keep your servers safe. If that software is no longer supported by the company that made it, it’s like having a car with no mechanic around to fix it. It’s important to replace unsupported software, as without updates and support, your digital defences weaken, leaving your sensitive business information vulnerable to cyber attacks.

Framework

ASD Information Security Manual (ISM)

Control effect

Proactive

Classifications

NC, OS, P, S, TS

ISM last updated

Feb 2023

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

When using a software-based isolation mechanism to share a physical server's hardware, the isolation mechanism or underlying operating system is replaced when it is no longer supported by a vendor.
policy ASD Information Security Manual (ISM) ISM-1848
priority_high

Why it matters

Unsupported isolation mechanisms expose servers to exploits, risking data breaches and operational disruption.

settings

Operational notes

Maintain an inventory of isolation mechanisms/host OS and track vendor end-of-support dates; schedule upgrade or replacement before support ends.

Mapping detail

Mapping

Direction

Controls