Skip to content
arrow_back
search
ISM-1449 policy ASD Information Security Manual (ISM)

Protect SSH Private Keys with Passwords or Encryption

Ensure SSH keys have a password or are encrypted to prevent unauthorised access.

record_voice_over

Plain language

SSH private keys are like the master keys for accessing your computer systems remotely. If these keys fall into the wrong hands, someone could break in and control your systems. Protecting these keys with passwords or encryption is crucial to keep your digital doors locked and prevent unauthorised access.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Nov 2025

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

SSH private keys are protected with a password or a key encryption key.
policy ASD Information Security Manual (ISM) ISM-1449
priority_high

Why it matters

If SSH private keys are not protected with a passphrase or encryption, attackers can steal them and gain remote access, leading to compromise and data loss.

settings

Operational notes

Audit where SSH private keys are stored and enforce passphrases or key encryption; restrict file permissions and rotate keys when exposure is suspected.

Mapping detail

Mapping

Direction

Controls