Skip to content
arrow_back
search
ISM-1080 policy ASD Information Security Manual (ISM)

Use Approved Encryption for Data at Rest

Use an approved encryption algorithm to protect stored data from unauthorized access.

record_voice_over

Plain language

This control is about making sure that any data you store on your computers or servers is encrypted using a method that is approved by the Australian Signals Directorate (ASD). This matters because if someone without permission gets access to your stored data, encryption makes it unreadable to them. Without proper encryption, sensitive information like customer details or financial records could be stolen or exposed, leading to trust issues, reputational damage, or financial loss.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

May 2022

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

An ASD-Approved Cryptographic Algorithm (AACA) or high assurance cryptographic algorithm is used when encrypting media.
policy ASD Information Security Manual (ISM) ISM-1080
priority_high

Why it matters

If media is not encrypted with an ASD‑approved or high assurance algorithm, lost or stolen storage can expose sensitive data and cause breaches.

settings

Operational notes

Confirm all at-rest encryption uses an ASD‑Approved Cryptographic Algorithm or high assurance algorithm, and revalidate configs after any crypto updates.

Mapping detail

Mapping

Direction

Controls