Skip to content
arrow_back
search
ISM-0481 policy ASD Information Security Manual (ISM)

Ensure Use of High Assurance Cryptographic Protocols

Ensure only approved secure cryptographic protocols are used in equipment and software.

record_voice_over

Plain language

To keep your data safe, you need to make sure that any systems or software you use are using the strongest locks available, known as high assurance cryptographic protocols. These are like super-secure codes that protect information so that only the right people can see it. If you don't use them, it's like having a flimsy lock on your front door, making it easier for hackers to break in and steal sensitive data.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Aug 2025

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Only AACPs or high assurance cryptographic protocols are used by cryptographic equipment, applications and libraries.
policy ASD Information Security Manual (ISM) ISM-0481
priority_high

Why it matters

Failure to use high assurance cryptographic protocols can lead to data breaches, exposing sensitive information to unauthorised access.

settings

Operational notes

Audit systems to ensure only AACPs/high assurance protocols (e.g., TLS 1.2/1.3) are enabled, disable deprecated suites, and validate libraries are configured to enforce them.

Mapping detail

Mapping

Direction

Controls