Skip to content
arrow_back
search
ISM-0457 policy ASD Information Security Manual (ISM)

Use Evaluated Crypto for Sensitive Data Encryption

Use approved cryptographic tools to encrypt sensitive or protected data to ensure security.

record_voice_over

Plain language

This control is about making sure that when we lock up sensitive or important information with digital 'locks', we use only trusted and approved methods. If these methods aren't followed, there's a risk your confidential information could be unlocked and accessed by people who shouldn't have it, leading to privacy breaches or financial loss.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

OS, P

ISM last updated

Aug 2025

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Cryptographic equipment, applications or libraries that have completed a Common Criteria evaluation against an ASD-endorsed Protection Profile are used when encrypting media that contains OFFICIAL: Sensitive or PROTECTED data.
policy ASD Information Security Manual (ISM) ISM-0457
priority_high

Why it matters

Without Common Criteria-evaluated crypto, OFFICIAL:Sensitive/PROTECTED media may be decrypted by attackers, causing breaches and loss.

settings

Operational notes

Maintain an approved list of Common Criteria-evaluated crypto (ASD-endorsed Protection Profiles) and revalidate versions before use.

Mapping detail

Mapping

Direction

Controls