Skip to content
arrow_back
search
ISM-0455 policy ASD Information Security Manual (ISM)

Enable Data Recovery for Encrypted Data

Ensure encrypted data can be accessed if the encryption key is lost or damaged.

record_voice_over

Plain language

This control ensures that your important data remains accessible even if something happens to damage or lose the encryption key, which is needed to unlock the data. If you don't plan for this, you could lose all your encrypted data permanently, leading to loss of critical business information, customer trust, and financial implications.

Framework

ASD Information Security Manual (ISM)

Control effect

Responsive

Classifications

NC, OS, P, S, TS

ISM last updated

Aug 2025

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Where practical, cryptographic equipment, applications and libraries provide a means of data recovery to allow for circumstances where the encryption key is unavailable due to loss, damage or failure.
policy ASD Information Security Manual (ISM) ISM-0455
priority_high

Why it matters

Loss of encryption keys without a recovery method can render critical encrypted data inaccessible, crippling operations and damaging business credibility.

settings

Operational notes

Regularly test backup key recovery processes to ensure data remains accessible even when primary encryption keys are lost.

Mapping detail

Mapping

Direction

Controls