Scan Software Artefacts for Malicious Content
Ensure all software artefacts are checked for harmful content before adding them to the main software source.
🏛️ Framework
ASD Information Security Manual (ISM)
🧭 Control effect
Preventative
🔐 Classifications
NC, OS, P, S, TS
🗓️ ISM last updated
Mar 2026
✏️ Control Stack last updated
19 Mar 2026
🎯 E8 maturity levels
N/A
Guideline
Guidelines for software developmentTopic
Software ArtefactsAll software artefacts are scanned for malicious content before being imported into the authoritative source for software.
Source: ASD Information Security Manual (ISM)
Plain language
Before adding any new software programs or updates to your main systems, it's crucial to check them for harmful content. If you don't, you risk introducing malicious software that could steal data, disrupt operations, or damage your business's reputation.
Why it matters
Without scanning software artefacts, you risk allowing malware to enter your systems, which can lead to data breaches and significant business disruptions.
Operational notes
Regularly update your scanning tools and procedures to keep ahead of new threats. Maintain a consistent scanning and update schedule, reviewing any detected issues comprehensively.
Implementation tips
- IT team should establish a process to scan software artefacts: They should use reliable tools to check every piece of software, including applications, libraries, and components. Ensure all software is scanned before it's added to the main storage area.
- Procurement should ensure all third-party software is vetted: They need to insist that suppliers provide proof that their software has been scanned for malicious code. This can be done by requesting a security certification or scan report.
- System managers should conduct regular training sessions: They should educate their teams on the importance of scanning for malicious code and how to recognise harmful code indicators. Training can be incorporated into regular staff meetings or as part of the onboarding for new team members.
- Developers must integrate security checks into the development process: They should embed regular security scans in the software development lifecycle. This means using automated tools that check for vulnerabilities each time software changes are made.
- Project managers should schedule regular software audits: Set aside time every quarter to review all software in the repository and ensure it has been appropriately scanned. Coordinate with the IT team to check for documentation proving scans have been conducted and verification of the scanning tools used.
Audit / evidence tips
-
Ask: the list of authorised scanning tools: Request a document detailing which tools are used for scanning software artefacts
Good: includes up-to-date, industry-standard scanning tools recognised by agencies like the Australian Cyber Security Centre (ACSC)
-
Ask: logs or reports from recent scans of software added to the repository
Good: shows a consistent record of timely scans with no unresolved issues
-
Ask: third-party software validation documents: Request certificates or reports from third-party vendors confirming their software was scanned for malicious code. Check the validity and authenticity of these documents
Good: includes up-to-date certificates that align with ongoing compliance checks
-
Ask: a training record on malicious code awareness: Request documentation proving personnel have been educated on spotting malicious code
Good: shows regular training sessions with full attendance or catch-up plans for absentees
-
Ask: minutes or notes from quarterly software audits
Good: includes thorough checks documented with follow-up actions where needed
Cross-framework mappings
How ISM-2026 relates to controls across ISO/IEC 27001, Essential Eight, and ASD ISM.
These mappings show relationships between controls across frameworks. They do not imply full equivalence or certification.
ISO 27001
| Control | Notes | Details |
|---|---|---|
| Partially meets (1) | ||
| Annex A 8.7 | ISM-2026 requires all software artefacts to be scanned for malicious content before they are imported into the authoritative software source | |
| Partially overlaps (1) | ||
| Annex A 8.29 | ISM-2026 requires scanning software artefacts for malicious code before they are imported into the authoritative software source | |
E8
| Control | Notes | Details |
|---|---|---|
| Related (1) | ||
| E8-RM-ML3.2 | ISM-2026 requires all software artefacts (including compiled code, third-party libraries and components) to be scanned for malicious code... | |