Skip to content
arrow_back
search
ISM-1327 policy ASD Information Security Manual (ISM)

Secure Certificates for Network Authentication

Certificates must be secured using access controls, encryption, and authentication to prevent unauthorised access.

record_voice_over

Plain language

Certificates are a bit like digital ID cards that help keep data secure by making sure only the right people can access the network. If these certificates aren't protected properly, unauthorised people might gain access to sensitive information, which could lead to data breaches or compromise your business's reputation.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

May 2024

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Certificates are protected by logical and physical access controls, encryption, and user authentication.
policy ASD Information Security Manual (ISM) ISM-1327
priority_high

Why it matters

If certificates for network authentication are not securely protected, attackers can steal or forge them to impersonate users, enabling unauthorised access and data breaches.

settings

Operational notes

Restrict certificate private key access with least privilege, MFA, and encryption at rest; secure HSM/keystores; audit access and rotate/revoke certificates promptly on compromise.

Mapping detail

Mapping

Direction

Controls