PSPF Infosec 11 Robust Ict Systems
PSPF Infosec 11 Robust Ict Systems
B. Requirements
B.1 Core requirement
Each entity must have in place security measures during all stages of ICT systems
development. This includes certifying and accrediting ICT systems in accordance with the
Information Security Manual when implemented into the operational environment.
C. Guidance
C.1 Security measures during ICT system development or improvement
2. When establishing new ICT systems or implementing improvements to current ICT systems, it is more cost
effective to address security issues during conception, architecture and design, than retrofitting security
protections at a later time. 1
3. As such, Requirement 1 mandates that entities must address security in the early phases of ICT system
development. Table 1 outlines key security issues that may warrant consideration during system
development; ongoing consideration of these security matters throughout the ICT system’s life cycle is
important to maintaining information security.
1 Given the potential inter-relationship between privacy and security issues, entities are encouraged to consider relevant
Australian Privacy Principles in project conception and design. For information, see the OAIC Guide to securing personal
information.
4. For guidance, see the Australian Signals Directorate (ASD) Information Security Manual (ISM).
Table 1 Security issues to consider for new ICT systems or when implementing improvements to current systems
Security issue Matters for consideration
Information Preparing relevant documentation supports implementing PSPF policy and ISM guidance. Preparing a
security security risk management plan is mandated in the PSPF policy: Security planning and risk
documentation management.
Information Vulnerability management includes monitoring and managing vulnerabilities in, and changes to, a
security system that can provide valuable information about exposure to threats.
monitoring
Change management includes implementing routine and urgent changes to software or systems to
maintain security (including if the change triggers the need for reaccreditation).
Communications Infrastructure security includes goods cable management and emanations security regimes that help
security entities maintain the integrity and availability of communications infrastructure as well as the
confidentially of information:
a. Cable management practices can protect information from deliberate or inadvertent access.
b. Countermeasures reduce the risk of information being intercepted and systems
compromised.
Systems and devices security includes measures that minimise data spills or unauthorised disclosure
of information as data flows in and out of digital gateways.
Product security Entities need assurance that products with a security function perform as claimed by the vendor and
provide the necessary security to mitigate security threats. Assurance is achieved through formal and
impartial evaluation. ASD manages a number of evaluation programs and the results are listed on an
Evaluated Products List. For other products, vendor support can be a prime method of ensuring
product security.
Media security Implementing sound security practices when connecting, storing, transferring, sanitising, destroying
or disposing of media plays a major role in preventing classified or sensitive data spills and avoiding
malicious attacks.
Media security is particularly important when decommissioning an ICT system. The PSPF policy:
Sensitive and classified information, supported by the ISM, provides guidance on the sanitisation or
destruction of ICT media and equipment.
Software security It is important to implement and maintain measures to protect against software vulnerabilities that
may be used to undermine the integrity or availability of systems or information.
Access control Well-structured and robust ICT systems allow necessary access for personnel to undertake their work
while protecting information, technology and intellectual property. The PSPF policy: Access to
information requires entities to control access to ICT systems, networks (including remote access),
infrastructure and applications. See the PSPF policy: Access to information supporting requirement 5
(and related guidance).
Administrator Restricting administrative privileges is one of the most effective ways to safeguard ICT systems. For
rights policy and guidance on restrictions of administrative privileges, see the PSPF policy: Safeguarding
information from cyber threats Requirement 3 (and related guidance).
Network security Network management practices and procedures assist in identifying and addressing network
structure or configuration vulnerabilities.
Cryptography Cryptography is primarily used to restrict access to information to authorised users. It provides
confidentiality, integrity, authentication and nonrepudiation of information. Encryption protects the
confidentiality of data by making it unreadable to unauthorised users.
Cross domain Mitigating risks by securely managing data flows between different security domains includes:
security a. deploying and configuring gateways to manage information flow paths (ingress and egress of
traffic) across approved systems on entity networks
b. implementing gateway firewalls to protect against intrusions, particularly for sensitive
networks (AUSTEO or AGAO)
c. using diodes to protect against data spills and malicious actors seeking to use information
flow paths to intrude or attack information
d. allowing web access while protecting against the execution and spread of malicious software
e. sharing peripherals between ICT components and ensuring unauthorised information does
not pass between security domains.
Data transfers and Implement procedures to ensure that content leaves a security domain in a secure manner.
content filtering
Apply content filtering techniques to reduce the risk of unauthorised or malicious content crossing a
security boundary.
i
The entity Chief Security Officer (or delegate) represents the minimum level for an accreditation authority for PROTECTED
and OFFICIAL systems. An entity may wish elevate accreditation decisions to the accountable authority to align with
accreditation of SECRET systems and to ensure whole of enterprise risks are considered.
ii
For TOP SECRET systems, accreditation is determined by ASD.
14. To assist with the correlation of logged events, it is important to establish an accurate time source, and use
it consistently across systems.
2
Under s95B of the Privacy Act, entities are required to take contractual measures to ensure that a contracted service provider
(including a cloud provider), does not do an act, or engage in a practice, that would breach an APP. For guidance, see the PSPF
policy: Security governance for contracted goods and service providers.