Skip to content
arrow_back
search
ISM-2053 policy ASD Information Security Manual (ISM)

Establish Software End of Life Procedures

Create and share guidelines for safely removing and managing old software and user data.

record_voice_over

Plain language

This control is about knowing when and how to safely get rid of old software and make sure that any data or user accounts linked to it are either stored securely or destroyed if no longer needed. It matters because outdated software can be a security risk, and holding onto unnecessary user data can expose your organisation to data breaches.

Framework

ASD Information Security Manual (ISM)

Control effect

Proactive

Classifications

NC, OS, P, S, TS

ISM last updated

May 2025

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

End of life procedures for software, covering how to remove the software and how to archive or destroy any user accounts and data, are produced and made available to consumers.
policy ASD Information Security Manual (ISM) ISM-2053
priority_high

Why it matters

Without end-of-life procedures, obsolete software may remain installed and user accounts/data may persist, increasing exposure to unpatched vulnerabilities and data leakage.

settings

Operational notes

Document and publish EOL runbooks: uninstall/disable software, revoke access, archive or destroy accounts and data, and confirm completion before decommissioning.

Mapping detail

Mapping

Direction

Controls