Skip to content
arrow_back
search
ISM-0998 policy ASD Information Security Manual (ISM)

Using Integrity Algorithms for IPsec Connections

Use specific algorithms for authenticating IPsec connections, preferring none if AES-GCM is used.

record_voice_over

Plain language

This control is about ensuring the data that travels over the internet is genuine and hasn't been tampered with during transmission. It requires using specific methods to check the authenticity of the data. This is crucial because if this isn't done, false or harmful data could be sent or received, leading to potential data breaches or system disruptions.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Feb 2022

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

AUTH_HMAC_SHA2_256_128, AUTH_HMAC_SHA2_384_192, AUTH_HMAC_SHA2_512_256 or NONE (only with AES-GCM) is used for authenticating IPsec connections, preferably NONE.
policy ASD Information Security Manual (ISM) ISM-0998
priority_high

Why it matters

Weak or incorrect IPsec integrity algorithms allow packet tampering/spoofing, risking unauthorised access and data compromise.

settings

Operational notes

Configure IPsec to use AUTH_HMAC_SHA2_256_128/384_192/512_256, or NONE only when using AES-GCM; regularly verify peer proposals.

Mapping detail

Mapping

Direction

Controls