Skip to content
arrow_back
search
ISM-2039 policy ASD Information Security Manual (ISM)

Review Threat Model During Software Development

Regularly update the software threat model to match current and changing threats.

record_voice_over

Plain language

This control is about regularly reviewing your software's threat model during its development to ensure it stays current with any changes to the threats it faces. If this isn't done, your software might be vulnerable to new security risks that could lead to data breaches, financial losses, or harm to your organisation's reputation.

Framework

ASD Information Security Manual (ISM)

Control effect

Proactive

Classifications

NC, OS, P, S, TS

ISM last updated

May 2025

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

The software threat model is reviewed throughout the software development life cycle to ensure it reflects the as-built software and any changes to the threat environment.
policy ASD Information Security Manual (ISM) ISM-2039
priority_high

Why it matters

Failure to regularly update the threat model can miss new attack paths, leaving as-built software vulnerable to exploitation as requirements and threats change.

settings

Operational notes

Review and update the threat model at each SDLC phase gate and after significant design, dependency, or deployment changes so it matches the as-built system and current threats.

Mapping detail

Mapping

Direction

Controls