Encryption software that implements an ASD Approved Cryptographic Algorithm (AACA) is used if an organisation wishes to reduce the handling requirements for ICT equipment or media that contains sensitive data.
Topic
Reducing handling requirements
Applicable to
Official
History
Priority
must
Dec 2021
Removed
The recommendation that cryptographic products have completed an ASD Cryptographic Evaluation before being used for the protection of data at rest or in transit has been replaced with a recommendation for the use of cryptographic products that have been evaluated and certified under the Common Criteria against a Protection Profile.
2015
Agencies must use an encryption product that implements an ASD Approved CryptographicAlgorithm (AACA) if they wish to reduce the storage or physical transfer requirements for ICTequipment or media that contains sensitive information to an unclassified level.