The Guidelines for Cryptography, published by the Australian Signals Directorate (ASD), provide authoritative advice and requirements for government agencies and large organizations on the secure use of cryptographic technologies.
The Guidelines for Cryptography help organizations implement strong cryptographic controls, select approved algorithms and protocols, and manage cryptographic keys securely to protect sensitive information against evolving cyber threats.
The guidelines support the overarching Australian Government Information Security Manual (ISM) framework by offering detailed guidance on cryptographic practices, including algorithm usage, key management, protocol selection, and migration to post-quantum cryptography, as mandated by 2030.
The guidelines provide a structured framework to secure information through robust cryptographic standards and practices, with 7 sections below:
The Guidelines for Cryptography apply primarily to:
Discover how organisations can address the guidelines through our comprehensive cybersecurity solutions and learn more about the requirements.
Thales’ solutions can help organisations address the guidelines, focusing on Cryptographic Fundamentals, ASD-Approved Cryptographic Algorithms and Protocols, Transport Layer Security and Secure Shell by simplifying compliance and automating security with visibility and control, thereby reducing the burden on security and compliance teams.
ASD Compliance Solutions
Protect applications and APIs at scale in the cloud, on-premises, or in a hybrid model. Our market leading product suite includes Web Application Firewall (WAF), protection against Distributed Denial of Service (DDoS) and malicious BOT attacks, security for APIs, and a secure Content Delivery Network (CDN).
Discover and classify sensitive data across hybrid IT and automatically protect it anywhere, whether at rest, in motion, or in use, using encryption tokenization and key management. Thales solutions also identify, evaluate, and prioritize potential risks for accurate risk assessment as well as identify anomalous behavior, and monitor activity to verify compliance, allowing organizations to prioritize where to spend their efforts.
Provide seamless, secure and trusted access to applications and digital services for customers, employees and partners. Our solutions limit the access of internal and external users based on their roles and context with granular access policies and Multi-Factor Authentication that help ensure that the right user is granted access to the right resource at the right time.