Skip to content
arrow_back
search
ISM-1768 policy ASD Information Security Manual (ISM)

Use Appropriate SHA-2 Output Size for Hashing

Use SHA-2 with at least 384-bit output for secure data hashing.

record_voice_over

Plain language

When you use hashing to secure your data, it's like putting a unique fingerprint on it. This control means you should use a strong type of fingerprint called SHA-2 with at least 384 bits. If you don't, your data could be vulnerable to attacks, making it possible for someone to tamper with or steal sensitive information.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

TS

ISM last updated

Nov 2024

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

When using SHA-2 for hashing, an output size of at least 384 bits is used, preferably SHA-384 or SHA-512.
policy ASD Information Security Manual (ISM) ISM-1768
priority_high

Why it matters

Using weaker SHA-2 output sizes (e.g., SHA-256) increases collision risk, enabling attackers to forge hashes and undermine integrity checks on sensitive data.

settings

Operational notes

Confirm all hashing uses SHA-384 or SHA-512 (no SHA-224/256) by reviewing configs, libraries and code paths; update legacy defaults and prevent downgrades.

Mapping detail

Mapping

Direction

Controls