Skip to content
arrow_back
search
ISM-0994 policy ASD Information Security Manual (ISM)

Use ECDH for Secure Key Exchanges

ECDH is preferred over DH for secure data exchanges.

record_voice_over

Plain language

This control means using a type of secure digital handshake called Elliptic Curve Diffie-Hellman (ECDH) instead of an older version called Diffie-Hellman (DH) for exchanging sensitive data. It's important because ECDH is more secure, making it harder for hackers to intercept and steal information, helping to protect your business or organisation from data breaches.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Feb 2024

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

ECDH is used in preference to DH.
policy ASD Information Security Manual (ISM) ISM-0994
priority_high

Why it matters

If ECDH is not used in preference to DH, key exchange may be weaker or misconfigured, increasing the risk of session key compromise and data exposure.

settings

Operational notes

Confirm TLS/VPN profiles negotiate ECDHE (not DHE) and disable DH cipher suites/groups; periodically scan configs and endpoints to detect regression.

Mapping detail

Mapping

Direction

Controls