Skip to content
arrow_back
search
ISM-1995 policy ASD Information Security Manual (ISM)

Use ML-KEM for Secure Key Encapsulation

Ensure encryption keys are protected using recommended ML-KEM-768 or ML-KEM-1024 methods.

record_voice_over

Plain language

Using strong methods to protect digital keys that encrypt your data is crucial. If these keys aren't properly secured, your sensitive information could be exposed to hackers, leading to data breaches, financial loss, or damage to your reputation. This control ensures you use the best available methods to keep your encryption keys safe.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Nov 2024

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

When using ML-KEM for encapsulating encryption session keys (and similar keys), ML-KEM-768 or ML-KEM-1024 is used, preferably ML-KEM-1024.
policy ASD Information Security Manual (ISM) ISM-1995
priority_high

Why it matters

Using weaker or non-approved KEMs instead of ML-KEM-768/1024 can enable session key compromise, exposing encrypted data and services.

settings

Operational notes

Verify key encapsulation uses ML-KEM-768 or preferably ML-KEM-1024, and block non-approved KEM parameter sets in crypto policies.

Mapping detail

Mapping

Direction

Controls