Skip to content
arrow_back
search
ISM-0485 policy ASD Information Security Manual (ISM)

Use Public Key Authentication for SSH Access

Ensure SSH connections use public key authentication for enhanced security.

record_voice_over

Plain language

This control requires that when someone connects to your systems over the internet using a Secure Shell (SSH), they should use a special digital key instead of just a password. This matters because passwords can be guessed or stolen, but a digital key is much harder for attackers to crack, keeping your systems safer from unauthorised access.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Aug 2018

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Public key-based authentication is used for SSH connections.
policy ASD Information Security Manual (ISM) ISM-0485
priority_high

Why it matters

Without public key SSH authentication, passwords can be stolen or brute-forced, enabling unauthorised access.

settings

Operational notes

Audit authorised_keys regularly, remove stale keys, and enforce key-only SSH (disable PasswordAuthentication).

Mapping detail

Mapping

Direction

Controls