Skip to content
arrow_back
search
ISM-2065 policy ASD Information Security Manual (ISM)

Ensure Secure Session Cookies with High Entropy Tokens

Web apps should use random session cookie identifiers with high entropy to ensure security.

record_voice_over

Plain language

This control is about making sure that when you log into a website, the little 'login token' it gives you is super hard for hackers to guess or fake. If these tokens aren't secure, someone could pretend to be you online, which might lead to your personal data being stolen or your accounts being misused.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

May 2025

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Web application session cookies using opaque bearer tokens that are not digitally signed use non-sequential random identifiers with a minimum of 128 bits of entropy, preferably 256 bits of entropy.
policy ASD Information Security Manual (ISM) ISM-2065
priority_high

Why it matters

Low-entropy or predictable opaque session cookie tokens can be guessed, enabling session hijacking and unauthorised access to user accounts and data.

settings

Operational notes

Generate opaque session IDs with a CSPRNG and verify at least 128 bits (preferably 256) of entropy; periodically test for predictability/non-sequential values.

Mapping detail

Mapping

Direction

Controls