Skip to content
arrow_back
search
ISM-1374 policy ASD Information Security Manual (ISM)

Use SHA-2 Certificates for Secure TLS Connections

Use secure certificates to prevent eavesdropping on data sent over the internet.

record_voice_over

Plain language

When you use the internet to send or receive information, there's always a risk someone could be snooping on that data. Using SHA-2 certificates for your website's secure connections helps keep your information safe from prying eyes, like encrypting your messages so only the intended recipient can read them.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Feb 2022

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

SHA-2-based certificates are used for TLS connections.
policy ASD Information Security Manual (ISM) ISM-1374
priority_high

Why it matters

Without SHA-2 TLS certificates, attackers can exploit weak/legacy hashes to impersonate services or intercept traffic, increasing risk of data breach and loss of trust.

settings

Operational notes

Regularly verify TLS certificates use SHA-2 (e.g., SHA-256/SHA-384) and replace any SHA-1-signed certificates; enforce this via scanner checks and CA policy.

Mapping detail

Mapping

Direction

Controls