Rapid Application of Critical Firmware Patches
Install critical firmware updates within 48 hours to protect systems from known vulnerabilities.
Plain language
This control is about updating the tiny programs inside computer hardware, like routers or servers, called firmware, very quickly—within 48 hours—when there's a known security issue. It's important because if you don't fix these issues, hackers can break in and cause serious damage, like stealing information or making your systems crash.
Framework
ASD Information Security Manual (ISM)
Control effect
Responsive
Classifications
NC, OS, P, S, TS
ISM last updated
Nov 2023
Control Stack last updated
19 Mar 2026
E8 maturity levels
ML3
Guideline
Guidelines for system managementSection
System patchingOfficial control statement
Patches, updates or other vendor mitigations for vulnerabilities in firmware are applied within 48 hours of release when vulnerabilities are assessed as critical by vendors or when working exploits exist.
Why it matters
Failure to apply critical firmware fixes within 48 hours can enable rapid exploitation, leading to device compromise, data theft and outages.
Operational notes
Track vendor advisories and exploit intel for firmware; assess criticality and deploy patches or mitigations within 48 hours, with change logging.
Implementation tips
- The IT team should monitor security advisories from hardware vendors: Sign up for email alerts or regularly check vendor websites so you know as soon as a critical firmware update is released.
- IT staff should have a testing procedure for firmware updates: They should quickly test updates in a safe environment to ensure they work properly before applying them to all systems.
- System owners must coordinate with the IT team for swift deployment: Ensure there's a plan in place to roll out updates across all affected systems, prioritising those that are most critical.
- Managers should ensure that IT has all necessary resources: Provide the IT team with the tools and personnel needed to apply updates quickly, such as automation software or additional temporary staff if necessary.
- Office managers or principals must communicate to all staff about maintenance schedules: Inform everyone about the need for potential downtime while updates are applied, and reassure them of the importance of these updates for security.
Audit / evidence tips
-
Askthe firmware update policy document: Request the written policy that outlines the process for applying firmware updates
Goodincludes clear steps and responsibilities listed with a maximum 48-hour update window for critical patches
-
Askto see the notification log for firmware updates: Request a record showing alerts or notifications received about critical updates
Goodshows rapid response to critical alerts within hours of receiving them
-
AskIT staff to show how they test firmware updates before broad deployment
Goodshows a separate, safely isolated area where updates are tested without risking live systems
-
Askrecords of recent firmware updates: Request logs or records showing recent critical firmware updates that were applied
Goodincludes recent examples meeting the timeframe with no critical updates missed
-
Askbudget or staff meeting notes that confirm resources dedicated to applying crucial updates quickly
Goodincludes recent resource commitments to maintain fast response capabilities
Cross-framework mappings
How ISM-1903 relates to controls across ISO/IEC 27001, Essential Eight, and ASD ISM.
ISO 27001
| Control | Notes | Details |
|---|---|---|
| link Related (1) expand_less | ||
| Annex A 8.8 | Annex A 8.8 requires obtaining vulnerability information, evaluating exposure and applying mitigations such as patching to reduce risk | |
E8
| Control | Notes | Details |
|---|---|---|
| sync_alt Partially overlaps (2) expand_less | ||
| E8-PO-ML3.2 | E8-PO-ML3.2 requires organisations to use a vulnerability scanner at least fortnightly to identify missing patches or updates for vulnera... | |
| E8-PO-ML3.8 | E8-PO-ML3.8 requires organisations to apply vendor mitigations for non-critical firmware vulnerabilities within one month when there are ... | |
| link Related (1) expand_less | ||
| E8-PO-ML3.7 | E8-PO-ML3.7 requires organisations to apply critical firmware patches (or vendor mitigations) within 48 hours when rated critical by the ... | |
These mappings show relationships between controls across frameworks. They do not imply full equivalence or certification.