Skip to content
arrow_back
search
ISM-0496 policy ASD Information Security Manual (ISM)

Use ESP Protocol for Secure IPsec Connections

ESP protocol is needed to securely encrypt and authenticate IPsec connections.

record_voice_over

Plain language

This control is about using the ESP (Encapsulating Security Payload) protocol to secure communications over the internet. It matters because, without the right protection, your data could be intercepted and read by the wrong people, leading to loss of privacy or exposure of sensitive information.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Feb 2022

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

The ESP protocol is used for authentication and encryption of IPsec connections.
policy ASD Information Security Manual (ISM) ISM-0496
priority_high

Why it matters

Without ESP, IPsec traffic may lack encryption/authentication, enabling interception or tampering and exposing sensitive data in transit.

settings

Operational notes

Regularly confirm IPsec tunnels use ESP (not AH) with approved ciphers and integrity checks; review configs after changes and test to detect fallback to insecure settings.

Mapping detail

Mapping

Direction

Controls