Skip to content
arrow_back
search
ISM-1982 policy ASD Information Security Manual (ISM)

Replace Unsupported Networked IT Equipment

Replace networked IT equipment when vendors no longer provide support.

record_voice_over

Plain language

This control is about replacing any networked IT equipment, like servers or routers, when the companies that make them stop supporting them with updates. This is important because unsupported equipment can become a weak link in your security, making it easier for hackers to get in and cause trouble, like stealing sensitive information or disrupting your operations.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Nov 2024

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Networked IT equipment that is no longer supported by vendors is replaced.
policy ASD Information Security Manual (ISM) ISM-1982
priority_high

Why it matters

Unsupported networked IT equipment cannot receive vendor patches, increasing exposure to known exploits, outages and data compromise.

settings

Operational notes

Maintain an asset register with vendor end-of-support dates, review quarterly, and schedule procurement and cutover before support ends.

Mapping detail

Mapping

Direction

Controls