Skip to content
arrow_back
search
ISM-1921 policy ASD Information Security Manual (ISM)

Assess System Compromise Risks Often

Regularly check how likely systems can be hacked due to known vulnerabilities.

record_voice_over

Plain language

This control is about regularly checking your system to see how vulnerable it might be to cyberattacks due to known weaknesses. It’s important because if you don’t, you risk being unexpectedly hacked, which could lead to stolen data, upset clients, and even losing money.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

May 2024

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

The likelihood of system compromise is frequently assessed when working exploits exist for unmitigated vulnerabilities.
policy ASD Information Security Manual (ISM) ISM-1921
priority_high

Why it matters

Unchecked vulnerabilities with known exploits can swiftly lead to system breaches, risking critical data loss and operational disruption.

settings

Operational notes

Integrate exploit monitoring into routine risk assessments; prioritise immediate mitigation when working exploits exist for unmitigated vulnerabilities.

Mapping detail

Mapping

Direction

Controls