Information security
Outcome
Each entity maintains the confidentiality, integrity and availability of all official information.
There are four core information security requirements that entities apply to achieve the information security outcome. The information security requirements apply to all information assets owned by the Australian Government, or those entrusted to the Australian Government by third parties, within Australia.
Core requirements for information security
| Policy title | Core requirement |
|
Sensitive and classified information |
Each entity must:
|
|
Access to information |
Each entity must enable appropriate access to official information. This includes:
|
|
Safeguarding information from cyber threats |
Each entity must mitigate common and emerging cyber threats by:
|
|
Robust ICT systems |
Each entity must ensure the secure operation of their ICT systems to safeguard information and the continuous delivery of government business by applying the Australian Government Information Security Manual’s cyber security principles during all stages of the lifecycle of each system. |