Skip to content
arrow_back
search
ISM-0465 policy ASD Information Security Manual (ISM)

Use Evaluated Cryptographic Tools for Sensitive Data

Use evaluated cryptographic tools to protect sensitive data on insecure or public networks.

record_voice_over

Plain language

When you're sending important info like personal details or business data over the internet or on potentially unsafe networks, you want to make sure no one else can see it. This control is about using special tools that have been tested and approved to keep your data safe when it travels through these risky areas. Without it, sensitive information could be intercepted by someone with bad intentions, leading to identity theft, financial loss, or damage to your reputation.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

OS, P

ISM last updated

Aug 2025

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Cryptographic equipment, applications or libraries that have completed a Common Criteria evaluation against an ASD-endorsed Protection Profile are used to protect OFFICIAL: Sensitive or PROTECTED data when communicated over insufficiently secure networks, outside of appropriately secure areas or via public network infrastructure.
policy ASD Information Security Manual (ISM) ISM-0465
priority_high

Why it matters

Without Common Criteria–evaluated crypto, OFFICIAL: Sensitive/PROTECTED data sent over public or untrusted networks may be intercepted or altered, causing compromise and reportable breaches.

settings

Operational notes

Use only Common Criteria–evaluated crypto against ASD-endorsed Protection Profiles for OFFICIAL: Sensitive/PROTECTED data over public/untrusted networks; verify certificates and approved versions periodically.

Mapping detail

Mapping

Direction

Controls