Skip to content
arrow_back
search
ISM-0469 policy ASD Information Security Manual (ISM)

Protect Data with ASD-Approved Cryptographic Protocols

Use approved cryptographic methods to secure data when it's communicated over networks.

record_voice_over

Plain language

This control is about using strong, approved methods to scramble your data when it's sent over the internet or other networks. It's important because if you don't encrypt your data properly, it could be intercepted by hackers, leading to theft of sensitive information or identity fraud.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

May 2022

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

An ASD-Approved Cryptographic Protocol (AACP) or high assurance cryptographic protocol is used to protect data when communicated over network infrastructure.
policy ASD Information Security Manual (ISM) ISM-0469
priority_high

Why it matters

Unauthorised access to unencrypted data in transit can lead to data breaches, severely damaging reputation and incurring financial penalties.

settings

Operational notes

Audit network traffic and configurations to ensure only ASD-Approved Cryptographic Protocols (AACP) protect data in transit; disable insecure protocols and ciphers.

Mapping detail

Mapping

Direction

Controls