Skip to content
arrow_back
search
ISM-1324 policy ASD Information Security Manual (ISM)

Certificate Generation for Secure Authentication

Certificates must be created using approved secure tools to verify identities.

record_voice_over

Plain language

This control is all about using trusted methods to create digital certificates. These certificates are like secure ID cards for your computer systems, making sure only authorised users can access your services. If you don't use a secure method for creating these certificates, you risk opening the door to cyber-attacks where intruders can pretend to be legitimate users.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Feb 2022

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Certificates are generated using an evaluated certificate authority or hardware security module.
policy ASD Information Security Manual (ISM) ISM-1324
priority_high

Why it matters

Weak certificate generation (non-evaluated CA/HSM) enables forged identities and MITM, causing unauthorised access and data compromise.

settings

Operational notes

Use only evaluated CA/HSMs; restrict key access, log issuance, and rotate/revoke certificates before expiry or on suspected compromise.

Mapping detail

Mapping

Direction

Controls