Skip to content
arrow_back
search
ISM-0467 policy ASD Information Security Manual (ISM)

Using HACE for Secure Communication of Data

Use HACE to secure SECRET and TOP SECRET data on less secure networks.

record_voice_over

Plain language

Imagine you're sending a super important letter through the post. You wouldn't want just anyone to read it, right? This control makes sure that when you send important digital data, it stays private and only the right people can see it, even if it travels along a less secure or public route. Without these measures, your sensitive information could be intercepted and misused, leading to potential financial or reputational harm.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

S, TS

ISM last updated

Aug 2023

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

HACE is used to protect SECRET and TOP SECRET data when communicated over insufficiently secure networks, outside of appropriately secure areas or via public network infrastructure.
policy ASD Information Security Manual (ISM) ISM-0467
priority_high

Why it matters

If HACE is not used, SECRET/TOP SECRET data sent over public or insufficiently secure networks can be intercepted and compromised.

settings

Operational notes

Confirm HACE is enabled for all SECRET/TOP SECRET communications over public/insufficient networks, and regularly validate keys, configs and compliance.

Mapping detail

Mapping

Direction

Controls