Skip to content
arrow_back
search
ISM-2026 policy ASD Information Security Manual (ISM)

Scan Software Artefacts for Malicious Content

Ensure all software artefacts are checked for harmful content before adding them to the main software source.

record_voice_over

Plain language

Before adding any new software programs or updates to your main systems, it's crucial to check them for harmful content. If you don't, you risk introducing malicious software that could steal data, disrupt operations, or damage your business's reputation.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Mar 2026

Control Stack last updated

24 Mar 2026

E8 maturity levels

N/A

Official control statement

All software artefacts are scanned for malicious content before being imported into the authoritative source for software.
policy ASD Information Security Manual (ISM) ISM-2026
priority_high

Why it matters

Without scanning software artefacts, you risk allowing malware to enter your systems, which can lead to data breaches and significant business disruptions.

settings

Operational notes

Regularly update your scanning tools and procedures to keep ahead of new threats. Maintain a consistent scanning and update schedule, reviewing any detected issues comprehensively.

Mapping detail

Mapping

Direction

Controls