SHA-256 (Secure Hash Algorithm 256) belongs to the SHA-2 family and produces a 256-bit hash value from any input. This fingerprint is practically unique: even the smallest change to the input alters the hash completely. SHA-256 is used for file-integrity verification, digital signatures, and as a building block in TLS handshakes. In an ISMS, SHA-256 is listed as an approved algorithm in the cryptography policy. Older hash functions such as MD5 or SHA-1 are considered insecure and should be replaced.