Skip to content
arrow_back
search
ISM-1802 policy ASD Information Security Manual (ISM)

Operate Approved High Assurance Cryptographic Equipment

Use approved high-security cryptographic tools according to Australian guidelines.

record_voice_over

Plain language

It's all about making sure that when we use high-security equipment to encode information, like secret business emails or customer data, we are following Australia's strict rules. If we don’t stick to these guidelines, someone could potentially crack that information open, leading to data breaches that can harm trust and security.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

S, TS

ISM last updated

Aug 2023

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

HACE are issued an Approval for Use by ASD and operated in accordance with the latest version of their associated Australian Communications Security Instructions.
policy ASD Information Security Manual (ISM) ISM-1802
priority_high

Why it matters

Using non‑ASD approved HACE or operating it outside ACSIs can weaken encryption and key handling, exposing classified/sensitive data and enabling compromise.

settings

Operational notes

Regularly verify all HACE retain ASD Approval for Use, and operate/configure them strictly to the latest ACSIs, including key management, physical handling and operator procedures.

Mapping detail

Mapping

Direction

Controls