Skip to content
arrow_back
search
ISM-2028 policy ASD Information Security Manual (ISM)

Test Software Artefacts for Security Weaknesses

All software is tested for security issues before being added to the official software source.

record_voice_over

Plain language

Before any software is officially used within our organisation, it's tested to catch any weaknesses that hackers might exploit. This matters because using software with hidden security flaws can lead to data breaches, financial loss, and reputation damage.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Mar 2026

Control Stack last updated

24 Mar 2026

E8 maturity levels

N/A

Official control statement

All software artefacts are tested to detect known weaknesses using static application security testing (SAST), dynamic application security testing (DAST) or software composition analysis (SCA), depending on the software artefact type, before being imported into the authoritative source for software.
policy ASD Information Security Manual (ISM) ISM-2028
priority_high

Why it matters

If we skip these tests, vulnerabilities in software could lead to costly data breaches, damaging the organisation's reputation and finances.

settings

Operational notes

Regularly update testing tools and methodologies to keep up with emerging threats and ensure comprehensive software security evaluations.

Mapping detail

Mapping

Direction

Controls