Skip to content
arrow_back
search
ISM-1769 policy ASD Information Security Manual (ISM)

Using AES Encryption with Strong Key Lengths

Use AES encryption with a strong key length, preferably AES-256, for enhanced security.

record_voice_over

Plain language

Using AES encryption with a strong key, like AES-256, keeps your data safe from hackers. If your data isn’t well protected, cybercriminals could steal sensitive information, leading to financial losses and damage to your reputation.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S

ISM last updated

Nov 2024

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

When using AES for encryption, AES-128, AES-192 or AES-256 is used, preferably AES-256.
policy ASD Information Security Manual (ISM) ISM-1769
priority_high

Why it matters

Using AES with weak or non-approved variants can enable data compromise, leading to unauthorised disclosure, financial loss and reputational damage. Prefer AES-256 for stronger protection.

settings

Operational notes

Regularly audit encryption configurations to ensure AES-128/192/256 only (prefer AES-256), and block legacy/weak cipher suites in applications, libraries and TLS settings.

Mapping detail

Mapping

Direction

Controls