Skip to content
arrow_back
search
ISM-1991 policy ASD Information Security Manual (ISM)

Implement ML-DSA for Enhanced Digital Signature Security

Use ML-DSA algorithms, preferring ML-DSA-87, for secure digital signatures.

record_voice_over

Plain language

This control is about using a specific kind of digital signature (called ML-DSA) to secure electronic documents or messages. It's like a super-safe way of proving a document is authentic and hasn't been tampered with. Without it, there's a risk that unsigned documents could be faked or altered, leading to data breaches or financial losses.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Nov 2024

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

When using ML-DSA for digital signatures, ML-DSA-65 or ML-DSA-87 is used, preferably ML-DSA-87.
policy ASD Information Security Manual (ISM) ISM-1991
priority_high

Why it matters

If ML-DSA-65/87 is not used, digital signatures may be forgeable (including by future quantum attacks), enabling tampered documents and fraud.

settings

Operational notes

Prefer ML-DSA-87 (or ML-DSA-65 where needed), enforce approved parameter sets in signing services, and verify signatures to detect unauthorised changes.

Mapping detail

Mapping

Direction

Controls