Skip to content
arrow_back
search
ISM-0999 policy ASD Information Security Manual (ISM)

Use DH or ECDH for Secure Key Establishment

For IPsec connections, use DH/ECDH methods to securely establish keys with specific group sizes for better security.

record_voice_over

Plain language

When you're connecting computers over the internet using IPsec, which is just a way to make sure the data stays private and secure, it's crucial to use specific methods called Diffie-Hellman (DH) or Elliptic Curve Diffie-Hellman (ECDH). These methods help set up a secure key to lock your data. It's important because, without the right protection, your sensitive information could be intercepted by someone else while it's being transmitted.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Feb 2022

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

DH or ECDH is used for key establishment of IPsec connections, preferably 384-bit random ECP group, 3072-bit MODP Group or 4096-bit MODP Group.
policy ASD Information Security Manual (ISM) ISM-0999
priority_high

Why it matters

Weak/non-recommended DH/ECDH groups in IPsec key exchange can enable MitM or decryption, exposing sensitive traffic.

settings

Operational notes

Regularly confirm IPsec uses approved DH/ECDH groups (e.g., 384-bit ECP, 3072/4096-bit MODP) after changes/upgrades.

Mapping detail

Mapping

Direction

Controls