Skip to content
arrow_back
search
ISM-0507 policy ASD Information Security Manual (ISM)

Develop and Maintain Cryptographic Key Management Processes

Ensure systems have established processes for managing cryptographic keys securely and efficiently.

record_voice_over

Plain language

This control is about making sure your organisation properly manages the keys used in cryptography, which is the method of encoding and decoding information to keep it safe. If these keys aren't handled correctly, sensitive data can be exposed to unauthorised people, leading to data breaches, legal issues, and damage to your reputation.

Framework

ASD Information Security Manual (ISM)

Control effect

Proactive

Classifications

NC, OS, P, S, TS

ISM last updated

Nov 2022

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Cryptographic key management processes, and supporting cryptographic key management procedures, are developed, implemented and maintained.
policy ASD Information Security Manual (ISM) ISM-0507
priority_high

Why it matters

Weak cryptographic key management can expose sensitive data, leading to severe breaches, financial loss, and reputational damage.

settings

Operational notes

Define key lifecycle procedures: secure generation, storage (HSM/KMS), rotation, revocation, backups, access logging and regular recovery testing.

Mapping detail

Mapping

Direction

Controls