Skip to content
arrow_back
search
ISM-1448 policy ASD Information Security Manual (ISM)

Use Ephemeral DH or ECDH for TLS Key Establishment

Use temporary DH or ECDH keys for secure TLS connections.

record_voice_over

Plain language

This control is about using temporary keys to secure information when you connect to a website. It's like using a new, unique lock each time you mail a package so even if someone gets hold of one lock, they can't open future packages. If you skip this step, the data you send could be intercepted and misused by eavesdroppers, putting confidential information at risk.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Feb 2022

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

When using DH or ECDH for key establishment of TLS connections, the ephemeral variant is used.
policy ASD Information Security Manual (ISM) ISM-1448
priority_high

Why it matters

Without ephemeral DH/ECDH, loss of forward secrecy means stolen TLS keys can decrypt captured traffic, exposing sensitive data and harming trust.

settings

Operational notes

Enforce DHE/ECDHE-only TLS cipher suites and disable static DH/ECDH; periodically scan services/configs to confirm ephemeral key exchange is negotiated.

Mapping detail

Mapping

Direction

Controls