ISM-1468

Preference is given to using the CNSA Suite algorithms and key sizes.

Topic
Protecting highly classified data
Applicable to
Secret, Top Secret

History

Priority
should
Dec 2021
Removed
Miscellaneous changes were made to rationale and security controls throughout the publication. This included:
• A review from the Using the Information Security Manual chapter through to the Guidelines for Media chapter.
• Security controls suitable for all audiences have been identified with the ‘All’ applicability marking while additional security controls suitable for just government audiences have been identified with the O, P, S and TS applicability markings.
• Security controls suitable for specific classifications have been amended to include their classification(s) in the wording of the security controls to reduce the reliance on applicability markings to confer suitability.
• Tables in security controls have been converted into prose to allow for inclusion in the SSP annex template and the XML list of security controls.
• The use of ‘official’ and ‘highly classified’ terminology has been replaced with specific classifications to remove ambiguity.
• Security controls relating to high assurance ICT equipment have had their applicability narrowed to ‘S, TS’ reflecting that they are intended for the protection of SECRET and TOP SECRET systems and data.
Oct 2019
Preference is given to using the CNSA Suite algorithms and key sizes.
Security control 1468 was modified slightly to match its associated rationale.
Sep 2019
Preference is given to using the CNSA Suite algorithms and key sizes where possible.
May 2019
Preference is given to using the CNSA Suite algorithms and key sizes where possible.
Security control 1468 was modified to include key sizes.
Apr 2019
Preference is given to using CNSA Suite algorithms over Suite B algorithms.
Security control 1468 was modified to reflect the correct terminology of ‘CNSA Suite algorithms’.
Mar 2019
Preference is given to using CNSSAM 02-15 algorithms over Suite B algorithms for the protection of highly classified information.
2017
Agencies should give preference to algorithms which meet the standards described inCNSSAM 02-15 to appropriately protect CONFIDENTIAL, SECRET and/or TOP SECRETinformation.
Control Added. No public explaination.