Skip to content
arrow_back
search
ISM-1375 policy ASD Information Security Manual (ISM)

Use SHA-2 for Secure TLS Connections

TLS connections must use SHA-2 for better security, acting as a key and message verifier.

record_voice_over

Plain language

This control means that when you are using secure connections over the internet, the technology behind it should use something called SHA-2, which is like a lock and key system to keep information private and prevent tampering. It's important because if the technology used is outdated or weak, then data could be stolen or changed by cyber criminals, leading to data breaches or financial losses.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Feb 2022

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

SHA-2 is used for the Hash-based Message Authentication Code (HMAC) and pseudorandom function (PRF) for TLS connections.
policy ASD Information Security Manual (ISM) ISM-1375
priority_high

Why it matters

Using outdated hash algorithms for TLS like SHA-1 can lead to vulnerabilities, risking data confidentiality and integrity during internet communications.

settings

Operational notes

Verify TLS is configured to use SHA-2 for HMAC/PRF and monitor for unexpected downgrade to SHA-1 in negotiated cipher suites.

Mapping detail

Mapping

Direction

Controls