Skip to content
arrow_back
search
ISM-1765 policy ASD Information Security Manual (ISM)

Use RSA with 3072-bit Modulus for Security

Ensure RSA uses at least a 3072-bit size for secure digital signatures and key transport.

record_voice_over

Plain language

This rule says that if you use RSA encryption, you need to make sure the keys are long enough, specifically at least 3072 bits. It matters because shorter keys can be broken by hackers, which means your sensitive information, like digital signatures and data transfers, could be exposed or tampered with.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

S, TS

ISM last updated

Nov 2024

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

When using RSA for digital signatures, and transporting encryption session keys (and similar keys), a modulus of at least 3072 bits is used, preferably 3072 bits.
policy ASD Information Security Manual (ISM) ISM-1765
priority_high

Why it matters

Using RSA keys under 3072 bits weakens signatures and session-key transport, increasing risk of forgery or key recovery and loss of trust.

settings

Operational notes

Audit certificates and configs to ensure RSA keys are ≥3072 bits for signatures and key transport; block weaker keys and track crypto library defaults.

Mapping detail

Mapping

Direction

Controls