Skip to content
arrow_back
search
ISM-0501 policy ASD Information Security Manual (ISM)

Transport of Keyed Cryptographic Equipment

Cryptographic equipment is moved securely depending on the sensitivity of its keys.

record_voice_over

Plain language

Transporting cryptographic equipment safely and securely is crucial because it often holds sensitive keys that can unlock sensitive information. If these keys fall into the wrong hands, it could lead to unauthorised access and potential data breaches, harming your business's reputation and financial security.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Feb 2022

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Keyed cryptographic equipment is transported based on the sensitivity or classification of its keying material.
policy ASD Information Security Manual (ISM) ISM-0501
priority_high

Why it matters

If keyed cryptographic equipment is transported without safeguards matching the key material classification, keys may be exposed, enabling decryption and unauthorised system access.

settings

Operational notes

Transport keyed cryptographic equipment using controls matched to the keying material classification (e.g., courier/escort, tamper-evident packaging), and maintain documented chain-of-custody at each handover.

Mapping detail

Mapping

Direction

Controls