top of page

Top 8 Australian Cybersecurity Frameworks

If you're an Australian business and confused about which cybersecurity frameworks you should be complying with, you're not alone. Unlike the United States, Australia currently doesn't have clear mandatory minimum cybersecurity standards for businesses.



This is likely to change in the near future. The Australian government is being pressured to follow the United States lead in lifting the nation's cybersecurity posture.

When this national security reform is complete, industry-specific regulatory standards will likely be introduced to strengthen the specific vulnerabilities that are unique to each sector. In the interim, Australian businesses are critically exposed to Nation-State threat actors, and so, must take ownership of their cyber threat resilience now.



According to the 2020 Australian Digital Trust Report, a 4-week disruption to critical digital infrastructures caused by a cyberattack would cost the Australian economy AU$30 billion (1.5% of GDP) or 163,000 jobs.



To assist in the effort of strengthening the Nation's cyber threat resilience, we've compiled a list of the top cybersecurity controls and frameworks impacting Australian businesses in 2023.



1. Essential Eight

Essential Eight was developed by the Australian Cyber Security Centre (ASCS) in 2017 to help Australian businesses mitigate cybersecurity threats and data breaches. This framework is recommended by the Australian Signals Directorate (ASD) for all Australian organizations. For more information about the security standards of the ASD, refer to this Information Security Manual (ISM).


Essential Eight (also known as the ASD Essential Eight) is comprised of eight basic mitigation strategies, or security controls, that are divided across three primary objectives.


Each of the listed strategies under each objective links to an implementation guideline post by the Australian Government.



Top 8 Australian Cybersecurity Frameworks
Top 8 Australian Cybersecurity Frameworks

Objective 1: Prevent Cyberattacks

This initial strategy aims to protect internal systems from malicious software such as, malware, ransomware, and other cyber threats.

Objective 1  includes 4 security controls.



Objective 2: Limit Extent of Cyberattacks

This objective aims to limit the penetration depth of all malicious injections. This is achieved by discovering and remediating all security vulnerabilities so that threat actors cannot exploit them.


Objective 1  includes 3 security controls:


Objective 3: Data Recovery and System Availability

This objective covers the final stage of cyber security incidents. Sensitive data resources must be continuously backed up to support system availability through immediate data recovery.


This objective includes the 8th and final security control - Daily backups.

For each mitigation strategy, the Australian SIgnals DIrectorate recommends for the Essential EIght framework to be implemented in three phases:


  • Maturity Level One - Partily aligned with the mitigation strategy objectives

  • Maturity Level Two - Mostly aligned with the mitigation strategy objectives

  • Maturity Level Three - Fully aligned with the mitigation strategy objectives

The minimal recommended baseline for cyber threat protection is Maturity Level Three.



Which Industries Does the Essential Eight Apply To?


The Australian Signals Directorate recommends all Australian Government entities and businesses implement the Essential Eight framework for best cybersecurity practice.

Is the Essential Eight Mandatory for Australian Businesses?


The Australian Federal government will mandate the Essential Eight framework for all 98 non-corporate Commonwealth entities. Compliance with this framework is expected for both corporate and non-corporate Commercial entities (NCCEs). To evaluate compliance, these entities will undergo a comprehensive audit every 5 years commencing on June 2022


Previously, Government entities were expected to comply with only the top 4 Essential Eight strategies. But after an audit revealed abysmal cyber resilience across multiple government departments, compliance expectations have expanded to all eight strategies with the inclusion of NCCEs.


Since 2018, it has become mandatory for all businesses with an annual turnover of at least $3 million, to report data breaches to the OAIC - whether or not they've embraced the Essential Eight framework.


How UpGuard Can Help you Comply with the Essential Eight

UpGuard empowers Australian businesses to achieve compliance with Essential Eight security controls. UpGuard's comprehensive attack surface monitoring engine provides vulnerability analytics to support application hardening efforts and audits the complete threat landscape to keep patch applications up to date.


2. Australian Energy Sector Cyber Security Framework (AESCSF)

The Australian Energy Sector Cyber Security Framework (AESCSF) is an annual assessment of cybersecurity resilience across the Australian energy sector.

The AESCSF was developed in 2018 as a collaborative effort between:


  • The Australian Energy Market Operator (AEMO)

  • The Australian Government

  • The Cyber Security Industry Working Group (CSIWG)

  • Critical Infrastructure Centre (CIC)

  • Australian Cyber Security Centre (ACSC)


In an effort to apply the highest level of cyber threat protection to Australian energy infrastructures, the AESCSF combines aspects of recognized security frameworks with a risk-management approach such as:



To access resources for the latest AESCSF 2020-21 program, refer to the Australian Energy Market Operator website.

Which Industries Does the Australian Energy Sector CyberSecurity Framework (AESCSF) Apply To?


The AESCSF has been designed for the Australian Energy sector.

Is the Australian Energy Sector CyberSecurity Framework (AESCSF) Mandatory for Australian Businesses?


The AESCSF is not a mandatory security framework for the Australian Energy Sector. However, because critical infrastructures are currently being targeted by cybercriminals, this framework is recommended for its clear maturity pathway programs.

How UpGuard Can Help You Comply with the AESCSF


UpGuard supports many of popular the cybersecurity risk assessments and cybersecurity frameworks being leveraged by AESCSF.


3. CIS Controls

Center for Internet Security (CIS) Controls are a set of different security efforts designed to protect systems from common cyber-attacks. These mitigation strategies have been designed to disrupt the cyberattack lifecycle.



Top 8 Australian Cybersecurity Frameworks
Top 8 Australian Cybersecurity Frameworks


The CIS framework has been recently updated from version 7.1 to version 8. Version 8 is more aligned with the latest digital transformation trends that are expanding the threat landscape. These include:


  • The prevalence of work-from-home arrangements

  • Increased reliance on cloud-based solutions

  • Increased mobile endpoints

  • Increased adoption of virtualization

  • The transition to hybrid workforces that deviate between office and home environments


Another obvious change in CIS version 8 is the reduction of controls - they've dropped from 20 to 18.


The updated list of CIS controls are outlined below:

  • CIS Control 1: Inventory and Control of Enterprise Assets

  • CIS Control 2: Inventory and Control of Software Assets

  • CIS Control 3: Data Protection

  • CIS Control 4: Secure Configuration of Enterprise Assets and Software

  • CIS Control 5: Account Management

  • CIS Control 6: Access Control Management

  • CIS Control 7: Continuous Vulnerability Management

  • CIS Control 8: Audit Log Management

  • CIS Control 9: Email Web Browser and Protections

  • CIS Control 10: Malware Defenses

  • CIS Control 11: Data Recovery

  • CIS Control 12: Network Infrastructure Management

  • CIS Control 13: Network Monitoring and Defense

  • CIS Control 14: Security Awareness and Skills Training

  • CIS Control 15: Service Provider Management

  • CIS Control 16: Application Software Security

  • CIS Control 17: Incident Response Management

  • CIS Control 18: Penetration Testing


Difference Between CIS Controls and CIS Benchmarks

CIS controls are a list of recommended strategies for securing systems and devices. CIS Benchmarks are hardening strategies for specific vendor products.

The range of CIS Benchmarks includes 100+ security best practices across 25+ vendors. To access this list


For more details, see the complete list of CIS Benchmarks

Which Industries Does the CIS Framework Apply To?

CIS controls are not industry-specific, any organization can strengthen its security posture by implementing CIS controls.


CIS controls are especially beneficial to industries that store copious amounts of sensitive end-user information such as finance, healthcare, education, and law.

Are CIS Controls Mandatory for Australian Businesses?


At the time of writing this, adopting the CIS controls framework is not a mandatory requirement for Australian businesses.


CIS controls are not mandatory, by they're recommended for the superior sensitive data protection they offer. Because this framework is industry agnostic, it can be readily confirmed to most security requirements.


How UpGuard Can Help You Comply with the CIS Controls

UpGuard offers a CIS controls security standard questionnaire to assess compliance against the best practice guidelines for cybersecurity outlined in the 18 CIS Controls.


4. Cloud Controls Matrix (CCM)

This Cloud Control Matrix (CCM) is a cybersecurity framework for cloud computing environments. This control framework was created by the Cloud Security Alliance (CSA) - a not-for-profit dedicated to promoting best practices for cloud computing security.

The CCM covers the primary components of cloud technology across 16 domains which branch out into 133 control objectives. This framework can be used to surface security deficiencies in cloud implementation efforts and provide guidance on security controls that could remediate them.


The CCM is particularly effective because it maps its controls to prominent security standards and regulations such as:


CCM caters to all parties in a cloud computing relationship - cloud customers and cloud solution providers.



Cloud Customers

The CCM offers the Consensus Assessments Initiative Questionnaire (CAIQ) for customers that wish to scrutinize the security efforts of their cloud providers, namely which security controls are implemented for PaaS, IaaS, and SaaS products. The CAIQ has recently been updated to version 4 which can be accessed here.


Cloud Solution Providers (CSPs)


Vendors offering cloud products can submit self-assessments with the CAIQ to demonstrate their compliance with CMS standards. This proof of compliance can be sent to clients or used to apply for the Security, Trust, Assurance, and Risk Registry (STAR).


There are two benefits to being included in this registry. The first is that compliance with the CCM matrix is verified by CSA which strengthens the appeal of vendor relationship. The second is that vendors included in the registry have all of their security control documentation publically available, which reduces the complexity of vendor assessments.


For more details about the Cloud Control Matrics, refer to the Cloud Security Alliance website.


Is the Cloud Control Matrix Mandatory for Australian Businesses?

The CCM matrix is not a mandatory requirement in Australia. However, this framework is designed to map to mandatory regulations and frameworks.


The Cloud Security Alliance has created a series of mappings to the Cloud Control Matrix (CCM) that can be accessed here.


CSA is regularly updating this list, so if your required cybersecurity framework mapping is not included in this list, contact CSA to confirm whether it will be in the future.

How UpGuard Can Help You Comply with the Cloud Controls Matrix (CCM)

UpGuard supports compliance with each of the CCM control objectives by offering security questionnaires associated with the standards the CCM maps to. UpGuard offers a custom questionnaire builder to empower organizations to contextualize their CCM compliance.



5. Control Objectives for Information Technology (COBIT)

COBIT was developed by the IT Governance Institute (ITGI) and the Information Systems Audit and Control Association (ISACA). This IT management framework is designed to support the development, organization, and implementation of processes that improve IT governance and cybersecurity best practices.


The COBIT framework is commonly used to achieve compliance with the Sarbanes-Oxley Act (SOX). But for general use-cases, COBIT allows organizations to evaluate the effectiveness of their IT investments in light of their business goals.


COBIT 2019 is the latest version of the framework, upgraded from COBIT 5. COBIT 5 was the most celebrated framework because it enforced accountability, which prevented stakeholder.


The COBIT 2019 framework consists of 6 principles, outlined below. The 5 principles that governed the COBIT 5 framework are also listed for comparison.

COBIT 2019 Principles:

  • Principle 1: Provide stakeholder value

  • Principle 2: Holistic approach

  • Principle 3: Dynamic governance system

  • Principle 4: Governance distinct from management

  • Principle 5: Tailored to enterprise needs

  • Principle 6:  End-to-end governance system

COBIT 5 Principles:

  • Principle 1: Meeting stakeholder needs

  • Principle 2: Covering the enterprise end to end

  • Principle 3: Applying a single integrated framework

  • Principle 4: Enabling a holistic approach

  • Principle 5: Separating governance from management


To contextualize a potential COBIT implementation, refer to these case studies.

Which Industries Does COBIT Apply to?


COBIT supports all organizations that depend on the reliable distribution of relevant information. This broad categorization includes both government entities and private sector organizations.


Is the COBIT Framework Mandatory for Australian Businesses?


COBIT is not a mandatory cybersecurity framework in Australia. However, because Australian businesses issuing and registering securities in the United States need to be compliant with SOX, this group would do well to implement COBIT since it supports SOX compliance.


How UpGuard Can Help You Comply with COBIT


UpGuard makes it easier for Australian businesses to achieve SOX compliance, which in turn, supports the progression to COBIT compliance.

Some of the protocols that support this effort include:

  • Ensuring the correct information security policies are in place

  • Implementing safeguards to detect and remediate data leaks 

  •  Remediating vulnerabilities placing sensitive data at risk.


6. Australian Government Protective Security Policy Framework (PSPF)


The Protective Security Policy Framework (PSPF) empowers Australian Government entities, to protect their people, information, and assets. Its goal is to cultivate a positive security culture across all entities. This protection is valid on Australian soil and overseas.


The PSPF aims to implement the following policies. Each policy links to core requirements guidelines.




There are 5 PSPF principles that represent desired security outcomes:

  1. Security is everyone's responsibility -  A positive security culture supports the achievement of security outcomes.

  2. Security enables the business of government - Services can be delivered more efficiently if they're secure.

  3. Security measures protect assets and people from their associated cyber risks.

  4. Each department takes ownership of its inherent and residual risks.

  5. Security incident responses should be continuously reviewed and improved.


Which industries Does the PSPF Apply To?

The Protective Security Policy Framework (PSPF) applies to all Australian government entities and non-corporate Commonwealth entities.  

Is the Protective Security Policy Framework (PSPF) Mandatory for Australian Businesses?


The PSPF must be applied to Australian Government entities and non-corporate government entities in accordance with their risk profiles.


The PSPF became a critical requirement for government bodies in 2018 when the Attorney-General established the framework as an Australian Government Policy.

The PSPF is also considered a best cybersecurity practice for all Australian state and territory agencies.


How to Be Compliant With the Protective Security Policy Framework (PSPF)

UpGuard supports compliance with the Protective Security Policy Framework (PSPF) by offering a single pain of visibility into the entire attack surface to help all departments take ownership of their security posture



7. The Australian Security of Critical Infrastructure Act 2018

The Australian Security of Critical Infrastructure Act 2018 (SOCI Act) seeks to protect Australian Infrastructures from foreign cyberattacks. The range of powers, functions, and obligations in this Act applies to specific critical infrastructure assets in the electricity, gas, water, and ports sectors.


There are three primary directives of the Australian Security of Critical Infrastructure Act:

  1. Owners and operators of critical infrastructures must register all relevant assets.

  2. Owners and operators of critical infrastructures must supply the Department of Home Affairs with all required information that could support the security efforts of the center.


  3. Owners and operators of critical infrastructures must comply with all instructions from the Minister of Home Affairs that support the mitigation of national security risks where all other risk mitigation efforts have. been exhausted.


On 10 December 2020, the Australian government introduced the Security Legislation Amendment Bill to broaden the definition of critical infrastructures in the SOCI Act.

This amendment broadens the application of the SOCI Act to 11 classes of critical infrastructures including:

Top 8 Australian Cybersecurity Frameworks

  • Communications

  • Data storage and processing

  • Defence

  • Financial services and markets

  • Food and grocery

  • Health care and medical

  • Transport

  • Higher education and research

  • Energy

  • Space technology

  • Water and Sewerage

More information about the Act can be accessed via the resources below:

Note:


The SOCI Act framework has undergone reforms to strengthen the cybersecurity of Australia's critical infrastructures. The updated framework is outlined in the SLACIP Act.

Which Industries Does the Australian Security of Critical Infrastructure Act Apply To?


Australian Security of Critical Infrastructure Act 2018 applies to the electricity, gas, water, and ports sectors that possess a specific range of critical assets.

Is the Security of Critical Infrastructure Act 2018 Mandatory for Australian Businesses?


At the time of writing this, there are no announcements enforcing compliance with SOCI 2018.


How UpGuard Can Help You Comply with the Australian Security of Critical Infrastructure Act 2018


UpGuard supports compliance with SOCI 2018 and its reformed security controls by helping critical infrastructures discover and remediate data leaks and vulnerabilities exposing critical assets and third-party vendors in the supply chain.


8. ISO/IEC 38500

The ISO/IEC 38500 is an international standard for an IT governance framework. It ensures the security of all management processes and decisions that impact the current and future use of Information Technology.

ISO/IEC 38500 empowers multiple parties to take ownership of a company's security posture including:

  • Executive managers

  • Users with access to all of the organization's resources.

  • Third-party vendors

  • Technical specialists

  • Consultants

  • Auditors

This framework is supported by six principles:

  1. Establish clear responsibilities

  2. Support the objectives of the organization

  3. Make strategic acquisitions

  4. Ensure KPIs are exceeded

  5. Ensure conformance with rules

  6. Consider all human factors

For more information, refer to the official ISO/IEC 38500 2015 standard document.

Is the ISO/IEC 38500 Mandatory for Australian Businesses?

ISO 38500 is an international standard for IT security, so Australian businesses are expected to be compliant with this framework.

All types of businesses should strive to be ISO 38500 compliant including:

  • Public and private companies

  • Government entities

  • Not-for-profits

  • Businesses of all sizes, regardless of their IT usage.


40 views0 comments

Comments


bottom of page