Skip to main content

Information security

The policies under this outcome outline how entities classify and handle official information to guard against information compromise. They also set out how to provide appropriate and secure access to official information, mitigate common and emerging cyber threats and safeguard official information and communication technology systems.

The 4 core requirements in these policies, and the accompanying supporting requirements, set out what entities must do to achieve the information security outcome.

Outcome

Each entity maintains confidentiality, integrity and availability of all official information.

Core requirement

Each entity must:

  1. identify information holdings
  2. assess the sensitivity and security classification of information holdings
  3. implement operational controls for these information holding proportional to their value, importance and sensitivity.

Key topics

  • Official information
  • Sensitive and security classified information
  • Caveats and accountable material
  • Information management markers
  • Minimum protections for sensitive and security classified information
  • Disposal of sensitive and security classified information
  • Emergencies, breaches or security violations involving security classified information
  • Minimum protections and handling requirements for sensitive and security classified information

Read Policy 8: Sensitive and classified information

Core requirement

Each entity must enable appropriate access to official information. This includes:

  1. sharing information within the entity, as well as with other relevant stakeholders
  2. ensuring that those who access sensitive or security classified information have an appropriate security clearance and need to know that information
  3. controlling access (including remote access) to supporting ICT systems, networks, infrastructure, devices and applications.

Key topics

  • Internal and external information sharing
  • The need-to-know principle
  • Personnel security requirements for access to sensitive and security classified resources
  • Temporary access to classified resources
  • ICT access controls

Read Policy 9: Access to information

Core requirement

Each entity must mitigate common and emerging cyber threats by:

  1. implementing the following mitigation strategies from the Strategies to Mitigate Cyber Security Incidents:
    1. application control
    2. patching applications
    3. restricting administrative privileges
    4. patching operating systems
  2. considering which of the remaining mitigation strategies from the Strategies to Mitigate Cyber Security Incidents you need to implement to protect your entity.

Key topics

  • Achieving PSPF maturity with the mandated mitigation strategies
  • Implementing the Essential Eight and other Strategies to Mitigate Cyber Security Incidents
  • Cyber security responsibilities when transacting online with the public

Read Policy 10: Safeguarding information from cyber threats

Core requirement

Each entity must assess ensure the secure operation of their ICT systems to safeguard information and the continuous delivery of government business by applying the Australian Government Information Security Manual’s cyber security principles during all stages of the lifecycle of each system.

Key topics

  • Ensuring secure ICT systems at all stages of their lifecycle
  • Authorising ICT systems to operate
  • Secure internet gateways

Read Policy 11: Robust ICT systems