Skip to content
arrow_back
search
ISM-1767 policy ASD Information Security Manual (ISM)

Use SHA-2 with Minimum 256-bit Output

When using SHA-2, ensure the hash is at least 256 bits for better security.

record_voice_over

Plain language

When you use SHA-2, make sure the hash is at least 256 bits long—like picking a thicker padlock for better security. This is important because if you use a weaker hash, it’s like leaving the door a little ajar, making it easier for cybercriminals to break in and steal or tamper with important information.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

S

ISM last updated

Nov 2024

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

When using SHA-2 for hashing, an output size of at least 256 bits is used, preferably SHA-384 or SHA-512.
policy ASD Information Security Manual (ISM) ISM-1767
priority_high

Why it matters

Using SHA-2 outputs under 256 bits (e.g., SHA-224) reduces collision resistance, increasing the risk of forged digests and compromised integrity of files, logs and signatures.

settings

Operational notes

Standardise on SHA-256 or stronger (prefer SHA-384/SHA-512) across applications, TLS/cert profiles and signing tools; explicitly disable SHA-224 and verify via config reviews and testing.

Mapping detail

Mapping

Direction

Controls