ISM-0467

HACE is used to protect SECRET and TOP SECRET data when communicated over insufficiently secure networks, outside of appropriately secure areas or via public network infrastructure.

Topic
Encrypting data in transit
Applicable to
Secret, Top Secret

History

Priority
required
Sep 2023
HACE is used to protect SECRET and TOP SECRET data when communicated over insufficiently secure networks, outside of appropriately secure areas or via public network infrastructure.
A minor language change was made to the existing control on encrypting SECRET and TOP SECRET data in transit.
Sep 2022
ASD-approved HACE is used to protect SECRET and TOP SECRET data when communicated over insufficiently secure networks, outside of appropriately secure areas or via public network infrastructure.
Language associated with ‘High Assurance Cryptographic Equipment’ was amended to ‘ASD-approved High Assurance Cryptographic Equipment’ noting that ASD is the sole authority for approving of cryptographic equipment as High Assurance Cryptographic Equipment.
Dec 2021
HACE is used to protect SECRET and TOP SECRET data when communicated over insufficiently secure networks, outside of appropriately secure areas or via public network infrastructure.
Miscellaneous changes were made to rationale and security controls throughout the publication. This included:
• A review from the Using the Information Security Manual chapter through to the Guidelines for Media chapter.
• Security controls suitable for all audiences have been identified with the ‘All’ applicability marking while additional security controls suitable for just government audiences have been identified with the O, P, S and TS applicability markings.
• Security controls suitable for specific classifications have been amended to include their classification(s) in the wording of the security controls to reduce the reliance on applicability markings to confer suitability.
• Tables in security controls have been converted into prose to allow for inclusion in the SSP annex template and the XML list of security controls.
• The use of ‘official’ and ‘highly classified’ terminology has been replaced with specific classifications to remove ambiguity.
• Security controls relating to high assurance ICT equipment have had their applicability narrowed to ‘S, TS’ reflecting that they are intended for the protection of SECRET and TOP SECRET systems and data.
2015
Agencies must use HACE products if they wish to communicate classified information overnetworks of a lower classification or public network infrastructure.
2010
Agencies are required to use HGCE if they wish to communicate classified information over unclassifiedor public networks.