ISM-1080

An ASD-Approved Cryptographic Algorithm (AACA) or high assurance cryptographic algorithm is used when encrypting media.

Topic
Encrypting data at rest
Applicable to
all

History

Priority
must
Jun 2022
An ASD-Approved Cryptographic Algorithm (AACA) or high assurance cryptographic algorithm is used when encrypting media.
Miscellaneous changes were made to rationale and recommendations throughout the publication to clarify content. This included the adoption of ‘control’ terminology, in preference to ‘security control’ terminology, to allow for the capture of other types of controls in the future, such as privacy controls, in addition to security controls.
In addition, formatting changes were made to the system security plan annex template and the cloud controls matrix template in order to increase their alignment, such as the inclusion of an ‘implementation status’ column within the system security plan annex template. Furthermore, a new ‘responsible entity’ column was added to both templates in order to capture information on the responsible system (in the case of inherited controls) or responsible vendor (in the case of multi-vendor systems) that are responsible for the implementation of controls. Note, this column can also be used to capture information on teams or individuals that are responsible for the implementation of controls if desired.
Mar 2022
An ASD-Approved Cryptographic Algorithm (AACA) or high assurance cryptographic algorithm is used to encrypt AUSTEO and AGAO data when at rest on a system.
Miscellaneous changes were made to rationale and recommendations throughout the publication to clarify content without changing intent. This included a review from the Guidelines for System Hardening chapter through to the Guidelines for Data Transfers chapter.
2015
In addition to any encryption already in place, agencies must, at minimum, use an AACA toprotect AUSTEO and AGAO information when at rest on a system.
2010
In addition to any encryption already in place agencies must, at minimum, use a DACA to protect AUSTEOand AGAO information when at rest on a system.