Skip to content
arrow_back
search
ISM-1372 policy ASD Information Security Manual (ISM)

Secure Key Establishment Using DH or ECDH in TLS

Use DH or ECDH methods to securely establish keys for encrypted internet connections.

record_voice_over

Plain language

This control is about using special techniques, like DH (Diffie-Hellman) or ECDH (Elliptic Curve Diffie-Hellman), to safely set up secret keys when you're establishing a secure internet connection over TLS (Transport Layer Security). It's important because if this isn't done right, hackers could potentially intercept sensitive information that you thought was secure, like passwords or personal details.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Feb 2022

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

DH or ECDH is used for key establishment of TLS connections.
policy ASD Information Security Manual (ISM) ISM-1372
priority_high

Why it matters

If TLS does not use DH/ECDH key exchange, attackers can more easily compromise sessions and decrypt intercepted traffic.

settings

Operational notes

Confirm TLS cipher suites enforce (EC)DHE for key exchange, and disable static RSA or weak DH groups during hardening.

Mapping detail

Mapping

Direction

Controls