Skip to content

Control: ism-0142; Revision: 5; Updated: Jun-23; Applicability: ALL; Essential Eight: N/A

The compromise or suspected compromise of cryptographic equipment or associated keying material is reported to the Chief Information Security Officer, or one of their delegates, as soon as possible after it occurs.