Skip to main content

Security governance

The policies under this outcome outline the roles and responsibilities of Accountable Authorities and the management structures and responsibilities that determine how security decisions are made. They set out how to plan, manage, monitor and report on protective security. They also articulate the governance arrangements for sharing Australian Government resources with contracted service providers and foreign partners.

The 7 core requirements in these policies, and the accompanying supporting requirements, set out what entities must do to achieve the security governance outcome.

Outcome

Each entity manages security risks and supports a positive security culture in an appropriately mature manner ensuring:

  • clear lines of accountability
  • sound planning
  • investigation and response
  • assurance and review processes
  • proportionate reporting.

Core requirement

The accountable authority is answerable to their minister and the government for the security of their entity.

The accountable authority of each entity must:

  1. determine their entity's tolerance for security risks
  2. manage the security risks of their entity
  3. consider the implications their risk management decisions have for other entities, and share information on risks where appropriate

The accountable authority of a lead security entity must:

  1. provide other entities with advice, guidance and services related to government security
  2. ensure that the security support it provides helps relevant entities achieve and maintain an acceptable level of security
  3. establish and document responsibilities and accountabilities for partnerships or security service arrangements with other entities.

Key topics

  • Accountable authority role and responsibilities
  • Security risk management
  • Lead protective security entities
  • Exceptional circumstances

Read Policy 1: Role of accountable authority

Core requirement

The accountable authority must:

  1. appoint a Chief Security Officer (CSO) at the Senior Executive Service level to be responsible for security in the entity
  2. empower the CSO to make decisions about:
    1. appointing security advisors within the entity
    2. the entity's protective security planning
    3. the entity's protective security practices and procedures
    4. investigating, responding to, and reporting on security incidents, and
  3. ensure personnel and contractors are aware of their collective responsibility to foster a positive security culture, and are provided sufficient information and training to support this.

Key topics

  • Management structures
  • Chief Security Officer responsibilities
  • Security governance committee
  • Appointing security advisors
  • Protective security planning
  • Protective security practices and procedures
  • Investigating, responding to and reporting on security incidents
  • Fostering a positive security culture
  • Security awareness training

Read Policy 2: Management structures and responsibilities

Core requirement

Each entity must have in place a security plan approved by the accountable authority to manage the entity's security risks. The security plan details the:

  1. security goals and strategic objectives of the entity, including how security risk management intersects with and supports broader business objectives and priorities
  2. threats, risks and vulnerabilities that impact the protection of an entity's people, information and assets
  3. entity's tolerance to security risks
  4. maturity of the entity's capability to manage security risks
  5. entity's strategies to implement security risk management, maintain a positive risk culture and deliver against the PSPF.

Key topics

  • Security planning approach
  • Security plan
  • Security threat levels
  • Risk-based approach to the PSPF

Read Policy 3: Security planning and risk management

Core requirement

Each entity must assess the maturity of its security capability and risk culture by considering its progress against the goals and strategic objectives identified in its security plan.

Key topics

  • Security capability maturity
  • Security risk culture
  • Monitoring security maturity

Read Policy 4: Security maturity monitoring

Core requirement

Each entity must report on security:

  1. each financial year to its portfolio minister and the Attorney-General's Department on:
    1. whether the entity achieved security outcomes through effectively implementing and managing requirements under the PSPF
    2. the maturity of the entity's security capability
    3. key risks to the entity's people, information and assets, and
    4. details of measures taken to mitigate or otherwise manage identified risks
  2. affected entities whose interests or security arrangements could be affected by the outcome of unmitigated security risks, security incidents or vulnerabilities in PSPF implementation, and
  3. the Australian Signals directorate in relation to cyber security matters.

Key topics

  • Reporting to the portfolio minister and the Attorney-General’s Department
  • Reporting to affected entities
  • Reporting on cyber security matters
  • PSPF maturity self-assessment model

Read Policy 5: Reporting on security

Core requirement

Each entity is accountable for the security risks arising from procuring goods and services, and must ensure contracted providers comply with relevant PSPF requirements.

Key topics

  • Assessing and managing security risks of procurement
  • Protective security terms and conditions in contracts
  • Ongoing management of protective security in contracts
  • Completion or termination of the contract

Read Policy 6: Security governance for contracted goods and service

Core requirement

Each entity must adhere to any provisions concerning the security of people, information and assets contained in international agreements and arrangements to which Australia is a party.

Key topics

  • International security agreements and arrangements
  • General Security Agreement security classification equivalencies
  • Handing protections for sensitive and classified resources from foreign partners
  • Security clearances for access to, release and disclosure of foreign partner sensitive and classified resources
  • Breaches or security violations of foreign partner resources
  • Security assessment visits

Read Policy 7: Security governance for international sharing