Skip to content
arrow_back
search
ISM-1091 policy ASD Information Security Manual (ISM)

Change Keying Material When Compromised

Change encryption keys if they are compromised to maintain security.

record_voice_over

Plain language

If someone gets their hands on the keys to your safe, they can take whatever is inside. In the digital world, encryption keys protect your sensitive information, just like a safe does. If these keys are compromised, you need to change them immediately to prevent unauthorised access to your data.

Framework

ASD Information Security Manual (ISM)

Control effect

Responsive

Classifications

NC, OS, P, S, TS

ISM last updated

Nov 2021

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Keying material is changed when compromised or suspected of being compromised.
policy ASD Information Security Manual (ISM) ISM-1091
priority_high

Why it matters

Failure to replace compromised encryption keys promptly can lead to unauthorised data access, resulting in data breaches and loss of sensitive information.

settings

Operational notes

Monitor for key compromise indicators and, when suspected, revoke and rotate affected keys immediately; re-encrypt data and update dependent systems to prevent continued unauthorised access.

Mapping detail

Mapping

Direction

Controls