Skip to content
arrow_back
search
ISM-2034 policy ASD Information Security Manual (ISM)

Document and Review Security Design in Development

Keep track of and check security choices throughout software development to ensure safety.

record_voice_over

Plain language

This control is about making sure that any security choices made during software development are carefully recorded and regularly checked. If you neglect to do this, important security issues might be missed, leaving your software vulnerable to attacks or data breaches, which can be costly and damage your reputation.

Framework

ASD Information Security Manual (ISM)

Control effect

Proactive

Classifications

NC, OS, P, S, TS

ISM last updated

May 2025

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Security design decisions are documented and reviewed throughout the software development cycle.
policy ASD Information Security Manual (ISM) ISM-2034
priority_high

Why it matters

Poor documentation and review of security design can hide vulnerabilities, leading to unmitigated risks and potential breaches during software operation.

settings

Operational notes

Maintain security design artefacts (architecture, threat model, controls) and review them at key SDLC stages, recording decisions, rationale, and approvals when designs change.

Mapping detail

Mapping

Direction

Controls