Skip to content
arrow_back
search
ISM-0471 policy ASD Information Security Manual (ISM)

Use Only High Assurance Cryptographic Algorithms

Ensure cryptographic tools use only ASD-approved or high-assurance algorithms for security.

record_voice_over

Plain language

This control is about making sure that any tools or programs your business uses to secure information only rely on the most trusted and high-quality methods approved by the Australian Signals Directorate (ASD). This is important because using weak or outdated security can leave your information exposed to hackers and cybercriminals, which could lead to data breaches and potential financial and reputational damage.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Aug 2025

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Only AACAs or high assurance cryptographic algorithms are used by cryptographic equipment, applications and libraries.
policy ASD Information Security Manual (ISM) ISM-0471
priority_high

Why it matters

Using non-high assurance or deprecated cryptography can let attackers decrypt protected data, causing confidentiality loss, breaches, and financial and reputational damage.

settings

Operational notes

Regularly verify crypto libraries and configurations use only ASD-approved/AACA algorithms and approved key sizes; remove deprecated ciphers and protocols from builds.

Mapping detail

Mapping

Direction

Controls