ICT Security Policy PDF
ICT Security Policy PDF
ICT Security Policy PDF
SHARED SERVICES
ACT Government
ICT Security Policy
CMTEDD
Chief Minister, Treasury and Economic
Development Directorate
Contents
Introduction .............................................................................................................................. 4
Purpose ...................................................................................................................................... 4
Background ................................................................................................................................ 4
Scope ......................................................................................................................................... 4
Compliance ................................................................................................................................ 5
Reference ................................................................................................................................... 5
Contact Officer ........................................................................................................................... 5
Responsibilities........................................................................................................................ 6
Information Security ................................................................................................................ 8
Acceptable use of ICT resources ............................................................................................... 8
Information classification ............................................................................................................ 8
Personal information .................................................................................................................. 9
Physical security of ICT resources ............................................................................................. 9
Stolen, lost or damaged ICT resources.................................................................................... 10
Security training and communication ....................................................................................... 10
Identity and access management ......................................................................................... 17
Identification of users ............................................................................................................... 17
Identity management federation ............................................................................................... 17
Authentication of users ............................................................................................................. 17
Authorisation to use ICT resources .......................................................................................... 18
Access to ICT systems and information ................................................................................... 18
Privileged access ..................................................................................................................... 19
Working offsite – employee remote access ............................................................................. 19
Vendor access to ICT systems ................................................................................................ 20
Logging and monitoring ............................................................................................................ 21
Auditing .................................................................................................................................... 21
Governance, compliance and risk management................................................................... 12
Registration and inventory of ICT systems .............................................................................. 12
Ownership of ICT systems ....................................................................................................... 13
Risk management of ICT systems ........................................................................................... 13
Risk triage of ICT systems ....................................................................................................... 14
Shadow ICT systems ............................................................................................................... 14
Exemption from security assessment ...................................................................................... 15
Compliance with ICT Security policies ..................................................................................... 15
Policy waivers ........................................................................................................................... 16
Storage .................................................................................................................................. 17
Network drives and Storage Area Network (SAN) ................................................................... 23
Local drives .............................................................................................................................. 23
Removable devices .................................................................................................................. 23
Storage in outsourced or cloud arrangements ......................................................................... 23
Sanitisation and Disposal ......................................................................................................... 24
Availability and resilience ...................................................................................................... 25
Criticality and availability .......................................................................................................... 25
Data backup and restore .......................................................................................................... 25
Disaster recovery ..................................................................................................................... 25
Business continuity................................................................................................................... 26
Operational security .............................................................................................................. 27
Network segregation ................................................................................................................ 27
Production information in non-production environments.......................................................... 27
Gateway security ...................................................................................................................... 28
Use of web presence for delivery of ACT services .................................................................. 29
Configuration of email services ................................................................................................ 29
Secure programming ................................................................................................................ 30
Secure platforms ...................................................................................................................... 30
Secure data transfers ............................................................................................................... 30
Secure desktops....................................................................................................................... 31
Vulnerability Management ........................................................................................................ 31
Reporting and disclosure of vulnerabilities .............................................................................. 32
Incident response and investigations ....................................................................................... 32
Notification of data breaches .................................................................................................... 33
Associated documents .......................................................................................................... 35
Introduction
Purpose
This policy establishes the Information Security regulatory framework for information being
processed in electronic form for the ACT Government.
The ICT Security Policy derives its authority from the ACT Government Protective Security Policy
Framework (PSPF) and supplements the PSPF with policies to support Information Security.
The policy will:
• provide a secure and effective Information and Communications Technology (ICT) based
Information Security environment
• ensure all information assets when in electronic form are continuously available and
protected to a level commensurate with the assessed risk and value/classification of the
asset
• define standards for the defence against unauthorised access, use, modification,
disclosure, damage or destruction of information assets
• mandate processes to minimise risks associated with disruption or failure of ICT systems.
Background
In fulfilling its commitment to the community, the ACT Government collects, receives, and
develops information.
If information assets are lost, inappropriately changed, or disclosed to unauthorised parties, it has
the potential to harm the reputation of the ACT Government and disrupt the business functions of
directorates, the delivery of justice, and the national security of the Australian Government.
The ACT Attorney-General through the Protective Security Policy Framework instructs
directorates and agencies to:
• identify vulnerabilities and their levels of security risk;
• achieve the mandatory requirements for protective security expected by government;
• develop an appropriate security culture and proportionate measures to securely meet
their business goals; and
• meet the expectations for the secure conduct of government business.
The ICT Security Policy was developed to assist directorates and agencies with a baseline of
mandatory cybersecurity rules and practices for ICT systems.
Scope
This policy must be observed by all ACT Government employees and contractors, agents of the
ACT Government, and incorporated bodies.
It applies to all ICT assets including but not limited to:
• physical or logical computing devices either owned, leased, or used by the ACT
Government to hold or process ACT Government electronic information.
• cloud services and outsourced ICT solutions, and
• ICT hardware, software and operating systems
• any electronic information held on those assets.
This policy excludes non-electronic information.
Compliance
Failure to comply with this policy will result in disciplinary action under the terms and conditions of
the contract of employment or engagement or prosecution under the appropriate Act.
Reference
This policy provides a whole of government Information security regulatory framework to ensure
the ACT Government meets its obligations to protect and safeguard official information assets as
set out in, but not limited to, the following legislation and authorities:
ACT Criminal Code 2002
ACT Information Privacy Act 2014
ACT Workplace Privacy Act 2011
ACT Freedom of Information Act 2016
ACT Public Sector Management Act 1994 (PSMA), including Public Sector Management
Standards
Electronic Transactions Act 2001
Australian Government Information Security Manual (ISM) 2017
Australian Government Protective Security Policy Framework
ACT Protective Security Policy Framework (ACT PSPF) 2017
Shared Services processes, directions and procedures
ISO/IEC 27001 – Information Security Management
ISO/IEC 27002 – Code of Practice for Information Security Practice
ISO/IEC 31000 - Risk Management
HB 171 – Guidelines for the Management of IT Evidence
Contact Officer
For all queries about this policy, staff should contact ICT Security.
Responsibilities
Role Responsibilities
ACT Government Comply with the policy and adopt the password standard.
employees and
contractors
JACS Security & Responsible for developing whole-of-government policy on public sector
Emergency Management protective security.
Branch
ICT Security Responsible for developing whole-of-government ICT security policy, standards
and strategies.
A team comprised of the ITSA, ITSMs, security analysts and investigators who
provide ICT security advice and implement and operate whole-of-government
security measures.
Agency Security Advisors Responsible for day-to-day management of the protective security measures
within the directorate or agency.
Develops, implements and monitors directorate or agency security procedures
and systems.
Analyses the directorate or agency’s security environment and posture, and plans
measures to manage security risks.
Agency Security The delegate of the Director-General or CEO with authority to approve protective
Executives security programs for their directorate or agency.
Shared Services Responsible for the security of ACT Government ICT infrastructure and Whole-of-
Government ICT systems.
System Owner Person within an ACT Government directorate who has the authority to make
binding financial and operational decisions regarding an ICT system, and
accepting the risks associated with the system on behalf of the Director General.
This person is at executive or senior executive level.
A System Owners owns an ICT system at the business unit or directorate level.
An Enterprise System Owner owns a Whole of Government or multi-directorate
system.
Senior Executive A role performed by the Chief Technology Officer, Shared Services.
Responsible for Security
System Owner of Shared Services ICT infrastructure.
Provides executive oversight of the ICT Security function.
Information Technology Also referred to as the Chief Information Security Officer (CISO).
Security Advisor (ITSA)
A Whole-of-Government role that manages the strategic direction of ICT security
for ACT Government and the implementation and operation of Whole-of-
Government security measures.
Information Technology A delegate of the ITSA responsible for a specialist discipline in ICT security.
Security Manager (ITSM)
Role Responsibilities
System manager A directorate officer who is responsible for the integrity and operation of the ICT
system; negotiates service levels; authorises access levels and access; and
reviews audit logs.
Information owner The ACT Government owns all information it develops and generates; however,
the ACT Government is a nebulous concept from the point of identifying
ownership. As such, the owner of the information is defined as the originator of
the information.
Information Security
Acceptable use of ICT resources
ACT Government provides ICT resources to its employees to serve the ACT community. These
resources must only be used for approved purposes to ensure the community gets the best value
from its investment. ICT Security logs and monitors your use of ACT Government ICT resources
(e.g. Internet, email, instant messaging) and may use this data as evidence in any disciplinary
matter.
Instructions
When using ACT Government ICT resources, all ACT Government employees and contractors
must comply with all laws of the ACT and Australia and comply with the ACT Government
Acceptable Use Policy.
Reference
Acceptable Use Policy
Information classification
There are two types of official Territory information:
• information that does not need increased security (public or UNCLASSIFIED information);
and
• information that needs increased security to protect its confidentiality (any information
with a Dissemination Limiting Marker or DLM such as Sensitive: Personal or For Official
Use Only).
All ACT Government employees and contractors are responsible for making this decision about
the Territory information they own and handle, using a process called information
classification. The information classification is then used to determine how the data must be
handled and protected.
The ACT Government information classification scheme and protection requirements are defined
in the ACT Protective Security Policy Framework (PSPF).
Instructions
1. Understand and remain aware of the ACT Information Security guidelines.
2. Ensure all official Territory information is classified correctly.
3. Do not change the classification of Territory information without approval of the
information owner.
4. Information owners should use the Information Security Assessment template to assist
with determining information security requirements.
Reference
ACT Protective Security Policy Framework
ACT Information Security Guidelines
Territory Records Standards for Records Management
Corporate Fact Sheet: Information Classification
ACT Government Information Security Assessment template
Personal information
The ACT Government collects, holds, uses and discloses personal information to effectively carry
out functions or activities under the Public Sector Management Act 1994, the Territory Records
Act 2002, the Freedom of Information Act 1989, the Information Privacy Act 2014, Health
Records (Privacy and Access) Act 1997 and several other pieces of legislation relating to our
functions.
All ACT Government employees and contractors are responsible for complying with the
Information Privacy Act and the Territory Privacy Principles. Specific instructions relating to ICT
usage are described below.
Instructions
1. When starting a new ICT initiative, perform a threshold assessment to determine the
presence and sensitivity of personal information.
2. When indicated by a threshold assessment, perform a privacy impact assessment (PIA)
to determine the handling requirements of personal information.
3. Information owners should use the Information Security Assessment template or similar
mechanism to assist with performing a threshold assessment and PIA.
4. When sensitive personal information including personal health information is present,
engage ICT Security to determine the protective measures required through the Risk
Management of ICT Systems instructions.
5. Cloud services that will handle sensitive personal information should be hosted in
Australia unless there are mitigations preventing vendor and third party access to the
data.
References
Guide to undertaking privacy impact assessments, Office of the Australian Information
Commissioner
ACT Government Information Security Assessment template
Information Privacy Act 2014 (ACT)
Territory Privacy Principles
Directorate Privacy Policies
Health Records (Privacy and Access) Act 1997
Instructions
1. Access to secure areas is restricted to authorised ACT Government personnel. Access
must be controlled using passwords, locks or access-control devices.
Reference
ACT Government Physical Security Policy
Instructions
1. Refer all incidents of lost, stolen or damaged ICT equipment to the Directorate ICT team
for investigation.
2. Issues such as the value of the missing item/s and any information stored on such items
must be identified.
3. Where the incident is considered significant, Directorate ICT teams must escalate it to
ICT Security for investigation. ICT Security will prepare an incident report including the
findings of the investigation. A copy of the report will be kept in Security and a copy will be
delivered to the ACT Audit Office.
Reference
Acceptable Use of ICT Resources Policy
Instructions
1. Security awareness training must be conducted within each directorate. It is the
directorate’s responsibility to ensure that this training is relevant to the directorate’s work
environment. ICT Security can assist in development of training and can conduct training
seminars on request.
2. Directorates must include topics about information security, including confidentiality,
privacy and procedures relating to system access, in formal staff induction sessions and
refresh the awareness of existing staff on a regular basis.
3. Each employee, on commencement of employment, must agree that they will not divulge
any official information that they may have access to in the normal course of their
employment. Staff must also agree that they will not seek access to data that is not
required as part of their normal duties.
4. System Administrators should be properly trained in all aspects of system security prior to
supporting these systems.
5. Directorates should conduct annual refresher training on the ICT Security Policy and
security awareness to ensure that all staff are familiar with changes in policy and security
practices.
Instructions
1. Directorates should use the Recommended Sample Clauses for Cloud Security
developed by the GSO and ICT Security when negotiating contracts with cloud vendors.
2. Directorates must not agree to contract terms that compromise privacy, the confidentiality
of sensitive information, the availability of critical services or the ability of the Territory to
investigate security incidents or vulnerabilities in the ICT system.
3. Directorates should not release official information to third parties who are not already
contracted to the Territory.
4. Directorates should consult with Shared Services to determine if an ICT system already
exists to perform the required service that suits the information security requirements of
the business.
Reference
Recommended Sample Clauses for Cloud Security
Instructions
5. Directorates must register ICT systems including cloud services with Shared Services
ICT.
6. Shared Services will assist directorates to discover unregistered ICT systems and cloud
services.
7. Shared Services ICT will maintain an inventory of ICT systems including cloud services.
8. The ICT system inventory should include at least the:
a. system name and type;
b. business criticality of the system;
c. classification of the information handled by the system;
d. products used and vendors;
e. Security Point of Contact (SPOC) of the vendor, including contact details; and
f. System Owner and the directorate SPOC (typically the Business System
Manager).
9. Directorates must notify Shared Services of changes to these details during the life of the
system.
Instructions
1. System Owners must be a member of the ACT Public Service with the delegation to
accept security risk on behalf of the Director-General.
2. Directorates must name the System Owner when registering an ICT system.
3. Directorates must advise Shared Services ICT when the System Owner changes.
Reference
ACT Protective Security Policy Framework
Instructions
1. The System Owner of an ICT system needing a high-assurance assessment must ensure
a SRMP is developed that documents the security risks and treatments recommended to
protect it.
2. ICT Security will develop SRMPs for Whole-of-Government business systems and
strategic platforms (including cloud services).
3. ICT Security will help directorates identify and assess security risks to information and
ICT systems and advise on appropriate security controls to implement the risk treatments.
4. Security controls are derived from the Australian Government Information Security
Manual (ISM) in the first instance. Security controls should also be drawn from relevant
international standards and industry advice, such as ISO 27001 and Cloud Security
Alliance Cloud Controls Matrix (CCM).
5. The CISO endorses the SRMP. Endorsement of a SRMP demonstrates that it identifies
all known security risks and recommends appropriate controls to bring risk to an
acceptable level.
6. The SSICT Security Executive also endorses the SRMP for any cloud services.
7. The System Owner approves the SRMP after endorsement. Approval constitutes
acceptance of residual risk levels and commitment to implement the advised risk
treatments and security controls.
8. ICT Security holds and publishes (to approved viewers) approved SRMPs on a secure
repository.
9. The SRMP must be approved before Territory information is transferred to an ICT system
or cloud service.
10. Directorates must review SRMPs every three years, or when a significant change has
occurred in the business, technology or security environment.
11. SRMPs for Whole-of-Government business systems and strategic platforms should be
audited before the system goes into production, and bi-annually thereafter.
12. Directorates should incorporate Extreme and High risks from SRMPs into their wider
directorate risk management plan.
Reference
ACTIA Risk Management Framework
ICT Security Risk Management Standard
Australian Government Information Security Manual (ISM)
Cloud Security Alliance Cloud Controls Matrix (CCM)
Instructions
1. ICT Security provide self-assessment tools and processes to directorates that enable
triaging of ICT systems.
2. Directorates must still register triaged ICT systems including cloud services.
3. Directorates must still name the System Owner.
Instructions
1. Directorates must manage the security risk of shadow ICT.
2. Directorates should review ICT Security reporting of shadow ICT monthly and, in
conjunction with Shared Services, identify system owners, contacts and other service
management details that enable visibility of their ICT systems including cloud services.
3. ICT Security will add high risk cloud services to a list of unsanctioned services.
4. Directorates should block unsanctioned services.
Instructions
At the discretion of the CISO or their delegate, changes to ICT systems may be exempt from
security assessment if:
1. The system meets the triage criteria for Low Assurance in the Security Assurance Model.
2. The system already has a valid SRMP, and the change does not materially impact
security risks.
3. The system is a subsystem and is included in a larger SRMP, and the change does not
impact security risks in the system or related systems.
4. The SRMP has not been approved but has been reviewed by ICT Security and is close to
completion. The Change Owner commits to completion within 30 working days.
5. The Change is for work that will be carried out in a non-production environment only (e.g.
Create a Private DMZ in DTE Test).
6. The Change is to install software into production for Pre-Prod testing, i.e. the Exemption
is for Tech Review only – the SRMP must be completed before go-live.
7. The Change relates to the implementation of infrastructure only, e.g.:
• physical infrastructure (e.g. network infrastructure for a new building);
• upgrade to an existing component of the SOE or server system software; or
• a product classed as “Infrastructure” (like AD, FIM, SCCM, or SCOM).
8. The Change is simple remedial work to a Production system (e.g. to clear files cached on
assets) unrelated to a change to an application.
Instructions
1. The CISO or their delegate periodically audit ACT Government ICT systems for
compliance with this policy.
2. Cloud service providers who are independently assessed as compliant with controls of
the ASD Information Security Manual, ISO 27000 standards and/or Cloud Security
Alliance Cloud Controls Matrix (CCM) are compliant with many aspects of this policy.
Policy waivers
Policy waivers exist to accommodate those unique and rare circumstances where directorates
have a strong business case for implementing information technology components that are non-
compliant with an existing policy.
Instructions
Policy waivers are to comply with the ACT Government Policy Waiver Procedure.
Reference
ACT Government Policy Waiver Procedure
Instructions
1. System Owners must ensure that all users are uniquely identifiable, and their identity is
authenticated each time they access ACT Government ICT resources.
2. System Owners must ensure employees and contractors are positively identified before
being authorised to access ACT Government ICT resources.
3. ACT Government will issue each employee and contractor with a unique user identity in
accordance with the User Identity Standard.
4. System Owners should ensure service providers leverage the unique user identities
provided by ACT Government to enable single sign-on and consistent security activities
such as authentication, access control and auditing.
5. System Owners of WhoG systems should ensure ICT service providers leverage the
unique user identities provided by ACT Government to enable single sign-on and related
security activities.
Instructions
1. Cloud services must, on a risk-assessed basis, leverage Shared Services ICT Active
Directory via identity management federation.
2. Cloud services should leverage Shared Services ICT Active Directory via identity
management federation when more than 50 users are present or when the service is
shared across multiple directorates.
3. Cloud services should leverage ACT Government’s iConnect Customer Identity and
Access Management (CIAM) service when providing services to the public.
Authentication of users
ICT systems that use weak methods of authenticating the identity of users are vulnerable to
compromise.
Instructions
1. ICT systems must enforce the password length and complexity requirements of the
Password Standard for all users.
2. Multi-factor authentication must be used for remote access that provides access to any
DLM level information or administrative capability.
Instructions
1. System Owners are the authority for approving access by any user to a business system.
2. System Owners must ensure that a user’s access to ICT resources is removed when they
no longer require access to a system, for example when employment is terminated,
contract expired or the user transfers to a different business area.
3. System Owners should ensure ICT systems are configured to suspend a user’s access
after 90 days of inactivity.
a. Directorates must ensure that Shared Services receives separation notification
within 3 weeks of a staff member leaving. Shared Services will ensure the
account is disabled within one week after this notification.
b. Directorates must ensure that a similar process is applied to any cloud services
which are not centrally managed via the ACT Government identity management
services.
c. Exemption from this policy is by prior written approval of the user’s manager.
Instructions
1. Unauthorised access to information is strictly prohibited and failure to comply with this
policy will render the offender subject to disciplinary sanctions under the PSMA and other
legislative instruments.
2. Access to information and ICT resources must only be granted to employees and
contractors who have been identified according to the requirements of the User Identity
Standard.
3. Access to information stored on or processed in application systems or storage devices
will be based on the need-to-know principle according to the requirements of the Access
Control Policy.
4. Access to information and ICT resources must only be granted to employees and
contractors who have been deemed suitable to have access appropriate to their role.
5. All detected unauthorised access to ACT Government information assets must be
reported to ICT Security.
Reference
Acceptable Use of ICT Resources Policy
User Identity Standard
Access Control Policy
Public Sector Management Act and Standards
Privileged access
Access to ICT systems and information is granted in a manner that balances the business need
for appropriate access to information with controls that prevent unauthorised access.
Access controls ensure the confidentiality, integrity and availability of information and ICT
resources for authorised personnel in a way that meets both business and security requirements.
Instructions
1. Privileged access to Shared Services hosted ICT resources handling DLM information
must only be granted to employees and contractors who have been vetted to a personnel
security clearance of at least Baseline.
2. Privileged access to ICT resources handling UNCLASSIFIED (no DLM) information
should only be granted to employees and contractors who have been vetted with a
criminal record check. ICT Security may on a risk-assessed basis recommend security
clearance at a higher level for sensitive and critical systems.
3. System Owners must ensure they can suspend or revoke privileges.
Instructions
1. ACT Government employees shall use only approved remote access facilities that have
been authorised and/or provided by the ACT Government.
2. The use of any other method of connectivity to the ACT Government ICT infrastructure
will be deemed a violation of security with the offender being sanctioned under the PSMA
and other appropriate legislation.
3. For Home-Based work: Approved requests will be assessed for security risk by the IT
Security Advisor or their delegate prior to home-based work commencing.
4. Employee authentication to the ACT Government network shall comply with the User
Identity Standard.
5. If information is transferred to the remote device, then the remote device shall be secured
in accordance with the ACT PSPF.
6. The communications link (wired or wireless) between the remote device and the ACT
Government network shall be an appropriately secured connection in accordance with the
ACT PSPF.
Reference
Remote Access Policy
Remote Connection Standard
User Identity Standard
Encryption Policy
Instructions
1. Only remote access methods endorsed by the CISO shall be used to connect to ACT
Government domains.
2. Authentication to the ACT Government network shall comply with the ACT Government
User Authentication Standard.
3. Applications being accessed shall reside on a server or servers owned exclusively by a
Directorate or the server or servers shall only support the application being accessed by
multiple Agencies.
4. A contract for services shall include a non-disclosure and confidentiality agreement and
any support staff and subcontracting parties be bound by the conditions of the contract.
Shared Services has a template agreement from “remote access agreement” form, which
is the preferred document to ensure compliance with policy and security requirements.
Copies of such contracts or deeds of agreement must be lodged with the SS ICT Security
Manager Operations or their delegate.
5. The communications link (wired or wireless) between the remote device and the ACT
Government network shall be a secure connection in accordance with the ISM.
Reference
Remote Vendor Access Policy
Remote Connection Standard
Instructions
1. Activities that should be logged include:
a. authorised access
b. privileged access
c. unauthorised access attempts
d. system alerts or failures.
2. Activities that must not be logged include:
a. passwords
b. sensitive information such as bank accounts or tax file numbers.
3. The level of monitoring required for individual facilities should be determined by a risk
assessment.
4. All logging and monitoring will be performed in accordance with the Logging and
Monitoring Standard and be conducted with due regard to the ACT Workplace Privacy Act
2011.
Auditing
Non-compliance with the ICT Security Policy puts at risk the confidentiality, integrity and
availability of ACT Government ICT services and systems, and electronic information. ACT
Government uses compliance checking and auditing to identify non-compliance and reduce
future incidents. Reducing non-compliance will reduce the risks to the environment.
The following audits are performed at regular intervals:
• Privileged access (conducted by ICT Security)
• Generic user accounts (facilitated by ICT teams and conducted by the Directorate)
Examples of other audits and checks performed on an ad hoc or on demand basis include but are
not limited to:
• password complexity
• domain access – success and failure
• Internet usage
• email usage
• network storage
• installed software.
Requests for audits and compliance investigations can be made by submitting a request in
accordance with the ICT Security Incident Response Policy.
Instructions
1. The CISO or their delegate shall:
a. Undertake compliance audits across the ACT Government in accordance with the
agreed ICT and Information Security audit program
b. Provide reports to the security executive on compliance across the ACT
Government
c. Conduct authorised investigations into incidents of non-compliance with ICT
policy
d. Assist authorised officers in the conduct of criminal and administrative
investigations.
2. All audits will be conducted with due regard to the ACT Workplace Privacy Act 2011.
Reference
Monitoring and Logging Standard
ICT Security Incident Response Policy
Storage
The storage of electronic data is to be controlled. Some storage methods are unsuitable for
sensitive information (classified with a DLM). The information classification scheme used by the
ACT Government is defined in the ACT PSPF, and its application is described in the fact sheet
Information Classification Scheme.
The protection of classified data depending on the classification level is outlined in the ACT
PSPF.
Local drives
Users storing official information on a local drive are responsible for its safekeeping.
Storing official information on local drives can place it at risk, because local drives are not
regularly backed up like network drives. If the information is deleted, corrupted or modified in an
unwanted way, it cannot be recovered to its previous “known good” state.
User should not store sensitive information on a local drive without additional protection.
Storing sensitive information (classified with a DLM) on the local drive of a mobile device like a
laptop computer places it at higher risk. If the device is lost or stolen, someone who finds the
device can potentially access the information.
Removable devices
Users storing official information on removable media are responsible for its safekeeping.
Alternative data storage media options may be used for official business records once these
records are captured in the current records management system. It is important to realise that
once an electronic record is transferred to another storage media it is no longer backed up or
secured. The secure physical storage of alternative media is essential, particularly for data of a
sensitive nature.
Users should not store sensitive information on removable media without additional protection.
Encryption of removable media may be required to protect sensitive information (classified with a
DLM) in certain circumstances. Encryption must be performed using an approved method that
complies with the ACT Government Encryption Standard.
Only removable media from trusted sources should be used in ACT Government devices. Media
from unknown sources must not be connected to ACT Government devices.
Instructions
1. Official information may only be stored in outsourced arrangements including cloud
services after a security risk assessment has been performed.
2. Security risk assessments must comply with the ICT Security Risk Management
Standard.
3. The System Owner must approve the arrangement (accept residual risks) before official
information is transferred from ACT Government.
Reference
ICT Security Risk Management Standard
Instructions
1. Shared Services and directorates must follow the approved Assets Disposal Process
when ICT resources are no longer required.
2. Storage media must be sanitised according to the Storage Media Sanitisation Standard
before it is reused for another purpose or disposed of.
3. Storage media must be destroyed on all assets being disposed of, in accordance with
Destruction of Data on Storage Media Fact Sheet.
Reference
Storage Media Sanitisation Standard
Assets Disposal Process
Destruction of Data on Storage Media Fact Sheet
Instructions
1. Unplanned outages in ICT systems must be reported to System Owners and ICT
Security.
2. Availability must be measured and reported to System Owners for critical business
systems and essential infrastructure, including outsourced solutions and cloud services.
Reference
Business System Criticality Guideline
Availability Management Policy
Instructions
1. All ICT resources handling official information must be backed up in accordance with the
Data Backup and Restore Standard.
2. All official information stored on backup media shall be restored and reviewed for
completeness at pre-set intervals based on the criticality of the information and as
detailed in the SRMP for the system.
3. All official information stored on backup media shall be restored in accordance with the
Data Backup and Restore Standard.
Reference
Data Backup and Restore Standard
Fact Sheet - Restoring Files and Data
Disaster recovery
Directorates must prepare a Disaster Recovery Plan (DRP) for each critical ICT system to ensure
it is able to recover from disasters ranging from physical (fire, flood, etc.) to logical (infrastructure
failure, virus outbreak, etc.). Directorates should prepare a DRP for each non-critical ICT system.
Instructions
1. Shared Services assists directorates with developing DRPs for the critical business
systems it hosts as part of the solution design process. Shared Services must meet the
requirements of the ACT PSPF for the protection of ACT Government ICT resources in
providing this service.
2. Directorates should use a methodology and template provided by Shared Services to
prepare DRPs for non-Shared Services systems.
3. System Owners should test their DRPs before a system goes into production, and
annually thereafter.
4. Shared Services should keep a copy of DRPs in a central location such as the ICT
inventory system.
Business continuity
The ACT Government must address business continuity and disaster recovery to minimise the
impact of incidents on the operations of ACT Government information management systems. To
achieve this, business continuity and disaster recovery must comply with the ACT Government
Business Continuity Management Policy.
Directorates and business units must develop and regularly test a Business Continuity Plan
(BCP) to reduce the organisation’s exposure to threats and hence reduce the risks associated
with loss of business critical information, personnel, facilities and ICT infrastructure.
Instructions
1. Directorates must establish procedures to develop and maintain BCPs that include:
a. a continuity strategy consistent with business objectives and priorities
b. a relationship to ICT system SRMPs and DRPs
c. a continuous improvement cycle for BCPs
d. incorporation of the BCP process within existing directorate processes.
2. At minimum BCPs must cover critical ICT systems used by the directorate, including
those shared with other directorates.
3. BCPS should also cover non-critical ICT systems, on a risk-assessed basis.
4. Directorates should keep a copy of the current BCP in a central location.
Reference
Business Continuity Management Policy
Operational security
Network segregation
Non-production ICT environments used for software development, etc. are characterised by
flexible access control, patch levels and other security controls. They are more vulnerable to
malicious code and insider threats and must be segregated from the production environment.
Instructions
1. Non-production ICT environments must always be segregated from production ICT
environments using approved methods and technologies.
2. New development and modification of software should only take place in a development
environment.
3. Non-production environments must be accredited to the same level of security as the
production environment if they are to handle sensitive information.
References
ACT Government ICT Technology Reference Manual
Instructions
1. Official information should not be handled by non-production ICT environments unless
explicitly permitted by the system owner. This is usually provided in written form through
approval of the system SRMP, or through approval of a Production Data Release form.
2. Personal information must not be handled by non-production ICT environments unless:
a. ICT Security has approved that the lower environment is secured to the same
standard as the production environment, and
b. System Owner has approved that the purpose for which the data will be used
meets the Appropriate Use under the Information Privacy Act.
If these conditions are not met, information with a DLM or classification must not be
transferred to or accessed from within a non-production ICT environment without first
being sanitised.
3. Approval to release Production data to Test is required and typically obtained as part of
test planning. Use the Production Data Release Procedure and form.
4. Development environments are inherently insecure and must not be used to handle
personal or sensitive information.
5. Sanitised information may be used in lower environments when the sanitisation method
used is endorsed by ICT Security. Sanitisation methods are used to depersonalise
personal information and/or reduce the sensitivity/classification of official information to
UNCLASSIFIED (no DLM).
6. ICT Security does not endorse sanitisation methods based on “shuffling” real data.
Research has established that this method is insecure, as the moved data can easily be
reassociated by inference, probability, matching against other datasets, etc.
8. When engaging external ICT and cloud service providers, System Owners should ensure
they are prohibited by written agreement from using official information in non-production
ICT environments outside the direct control of ACT Government.
9. System Owners must satisfy themselves that they are in compliance with legislation such
as the Information Privacy Act and other enactments of secrecy, and should seek legal
advice where legislation applies to their intended re-use of production data.
References
Fact Sheet: Production Information in non-production environments
Production Data Release Standard
Information Privacy Act (ACT) 2014
Gateway security
The interface between the ACT Government network and the Internet (including all other external
network connecting services) will be protected by a gateway. A gateway is a network point that
acts as an entrance to another network.
The gateway environment includes demilitarized zones (DMZs). A DMZ is a perimeter network to
house public services that is maintained outside of the internal/protected network. Since a DMZ is
usually open to allow public access to services, it is exposed to more threats than the
internal/protected network.
Shared Services will manage all activity within the gateway so as not to breach security and allow
unauthorized access between the Internet and the internal network.
Instructions
1. All ACT government internet gateways must be secured using controls that comply with
the ACT Government Gateway Security Standard.
2. All activities within ACT Government internet gateways must comply with the ACT
Government Gateway Environment Policy.
3. All servers deployed to the gateway environment must be built in accordance with the
Shared Services server build standards.
4. All applications must undergo penetration testing in accordance with the Vulnerability
Management policy before being promoted from the development environment into
production.
5. All changes to network devices are to be authorised prior to implementation by Change
Management and IT Security.
Reference
ACT Government Gateway Security Standard
ACT Government Gateway Environment Policy
Instructions
1. Domain name registration requests must be approved by the agency Director-General or
Executive Delegate.
2. Domain names must be registered with a Registrant Contact Position (an employee of the
agency).
3. Shared Services ICT as the Domain Provider reserves the right to remove the domain
from the registry if it is in breach of .gov.au policies or the Registrant Agreement.
4. Shared Services ICT has the right to reject an application for a domain name.
5. Domain name registrations are reviewed every 2 years.
Instructions
1. All parties sending email from a registered act.gov.au domain or subdomain must:
a. Provide support for SPF or DKIM or both;
b. Comply with publishing a DMARC record, which Shared Services will provide; and
c. When unable to comply, seek a waiver when using a subdomain dedicated to the
system or business function.
2. Directorates must comply with the ACT Government Email Authentication Standard and
use the forms provided by Shared Services when engaging third parties that provide mail
services.
3. ICT Security and nominated directorate contacts will assist third parties to correctly use
email authentication protocols, including making any necessary changes to Shared
Services managed systems like DNS
4. System Owners should ensure their business systems are modified to comply with the
Standard. Directorate CIOs should assist them to migrate to a dedicated mail subdomain
if they cannot support email authentication.
5. Shared Services will provide DMARC reporting and forensics capability to assist in SPF,
DKIM and alignment.
6. All domains that send no mail will have default SPF and DMARC records created that
indicate no mail is expected from the domain and a policy of REJECT.
References
ACT Government Email Authentication Standard
Secure programming
ACT Government business systems that are exposed to the wider range of threats from the
Internet should be developed using secure coding, code review and testing practices provided by
the Open Web Application Security Project (OWASP).
Instructions
1. Shared Services should adopt and promulgate OWASP standards for secure coding,
code review and testing practices for all bespoke business systems.
2. ICT Security will reduce the likelihood of relevant security risks when assessing websites,
cloud services and mobile applications that can demonstrate compliance with OWASP
standards.
Secure platforms
ICT platforms (e.g. web servers, application servers, databases) must be configured securely
according to the controls of the ASD Information Security Manual and should also be configured
in accordance with the advice of the platform vendor and industry sources of best practices such
as the Center for Internet Security (CIS) Security Benchmarks.
Instructions
1. Shared Services should adopt and promulgate CIS Security Benchmarks for all server
builds.
2. ICT Security will take into account CIS compliance when assessing relevant security risks
of ICT platforms.
Instructions
1. Approved secure data transfer methods include:
a. Secure File Transfer Protocol (SFTP) system approved by ICT Security
b. Application Programming Interfaces (APIs) that use a security protocol approved
by ICT Security, and
c. Physical transfer via encrypted media or physical safehand if encryption to ACT
Government Standard is not possible.
Secure desktops
While no single mitigation strategy is guaranteed to prevent cyber security incidents, ACT
Government implements eight essential mitigation strategies recommended by the Australian
Signals Directorate as a baseline. This baseline, known as the Essential Eight, makes it much
harder for adversaries to compromise systems. Furthermore, implementing the Essential Eight
pro-actively is more cost-effective than having to respond to a large-scale cyber security incident.
Shared Services configures ACT Government desktops (including laptops and and cloud services
providing desktop as a service) securely using the Essential Eight and in accordance with the
advice of the platform vendor. The attack surface and accumulation of vulnerabilities of the ACT
Government desktop is also limited by central management of non-standard applications by
Shared Services.
Instructions
1. ACT Government should adopt and promulgate Microsoft standards for all desktop builds.
2. ACT Government must implement standard desktops on behalf of directorates that
support the Australian Signals Directorate’s “Essential 8” mitigations, particularly
regarding:
a. Office macro security
b. Application whitelisting
c. Removal or hardening of Java, Flash and other programs that weaken desktop
security.
d. Restrict administrative privileges
3. End users must not be able to install non-standard applications without prior written
approval from ICT Security.
4. Technical staff should not be able to install non-standard applications without central
deployment.
Vulnerability Management
The ACT Government will, according to and ICT system’s assurance level, perform vulnerability
testing to identify security weaknesses caused by misconfiguration, bugs, obsolescence or design
flaws.
The ACT Government will also implement and manage malware protection tools for all endpoints
including servers, desktop computers and mobile devices, and gain assurance that service
providers do the same throughout the life of a cloud service through the governance, risk
management and compliance auditing process.
Instructions
1. Externally hosted or externally exposed business systems, including cloud services and
websites, must be vulnerability tested by ICT Security if they meet the triage criteria for
Medium or High Assurance (see the ACT Government Security Assurance Model).
2. Initial vulnerability testing must be completed, and any extreme-risk vulnerabilities
identified must be remediated before the system goes live, and before any official
information is transferred to the system.
3. ICT Security will monitor new information from a variety of government and industry
sources on emerging security vulnerabilities and threats to ICT resources.
References
Vulnerability Management Standard
Vulnerability Testing Fact Sheet
Instructions
1. Security researchers are encouraged to report identified vulnerabilities and exploits to the
ACT Government.
2. Security researchers should report security vulnerabilities to itsa@act.gov.au
3. Reports should include:
a. details of the identified vulnerability (type, products and platforms affected)
b. where identified (URL or link)
c. likely impact of exploit on users, critical infrastructure or physical safety
d. proof of concept
e. date identified
f. can it be replicated
g. evidence that the vulnerability is not already public, and
h. contact details (optional).
4. Security researchers may make public (disclose) vulnerabilities 90 days after reporting to
ACT Government, unless otherwise agreed by both parties.
5. ACT Government may acknowledge discovery of vulnerabilities but does not pay bug
bounties.
ICT Security provides investigation and digital forensic services to ensure only qualified
investigators are involved and ensures that any chain of evidence is maintained.
Instructions
1. System Owners must establish an incident reporting procedure for their ICT systems.
2. Critical response and incident reporting must comply with established directorate
procedures, e.g. directorate fraud control.
3. Where the incident involves a government system, the ICT Security team must be
notified, kept informed of developments, and involved with resolution of the incident.
4. Investigations and forensic analysis will only be conducted by ICT Security.
5. Incident response and reporting must comply with the Critical Response and Incident
Reporting Policy and the ICT Security Incident Response Policy.
6. The collection of audit trails for all ICT systems must comply with the Monitoring and
Logging Standard.
Reference
Critical Response and Incident Reporting Policy
ICT Security Incident Response Policy
Monitoring and Logging Standard
HB 171 – Guidelines for the Management of IT Evidence
Instructions
1. System Owners are responsible for assessing a suspected data breach to determine its
likely impacts. ICT Security can provide technical assistance on request.
2. System Owners must make the Director General completely aware of all information in
relation to the breach.
3. With the approval of the relevant Director General, the directorate should notify any
individuals whose personal information is involved in a data breach of their ICT systems,
where the breach is likely to result in serious harm including (but not limited to):
a. Physical
b. Reputational
c. Financial.
4. With the approval of the relevant Director General, System Owners should provide
guidance to affected individuals about the steps they should take in response to the
breach, such as:
a. Identity protection measures
Associated documents
The following ACT Government documents are part of the ICT and ICT Security policy suites that
support this ICT Security Policy:
Acceptable Use of ICT Resources Policy
Access and Use of ICT Resources Policy
Access Control Policy
Business Continuity Management Policy
Critical Response and Incident Reporting Policy
Data Backup and Restore Standard
Encryption Policy
Gateway Security Standard
ICT Security Incident Response Policy
Monitoring and Logging Standard
Password Policy and Standard
Policy Waiver Standard and Procedure
Sensitive Information in Non-Production Environments Policy
Server Hardening Standard
Software Acquisition and Control of Local Hard Drives Policy
Vulnerability Management Policy
Vulnerability Testing Fact Sheet
Glossary
Term Definition
Availability The state when data is in the location needed by the user, at the time the user
needs them, and in the form needed by the user.
Confidentiality Ensuring that information is accessible only to those authorized to have access.
Data integrity Information in a condition in which it has not been altered or destroyed in an
unauthorised manner.
ICT Asset Any physical or logical computing device either owned, leased, or used by the ACT
ICT System Government to hold or process ACT Government electronic information. Includes,
but is not limited to, ICT hardware, software and operating systems, cloud services
and outsourced ICT solutions.
Remote access The ability to get access to a computer or a network from an external location. An
external location being a premise not controlled or maintained by the ACT
Government.
Secure An environment the information owner assesses as not posing a significant risk to
environment the confidentiality of the information.
Secured Physically protected for example locked in a safe. Information can be logically
protected by implementing encryption when physical controls are inadequate.
Secured Encompasses a physical connection that provides the required level of protection
connection for the information travelling across the connection and encryption in accordance
with the ACT Government Encryption Standard where the physical connection fails
to provide the appropriate level of protection.
Whole-of- ICT systems for multiple directorates or all directorates, typically (but not always)
Government provided by Shared Services.
Strategic
platform
Metadata
Owner Senior Manager, ICT Security
Authority CTO, Shared Services ICT (Executive responsible for ICT Security)
Review cycle This document should be reviewed annually or when relevant change
occurs to technology, business or the threat environment.
Revisions
Version Published Details Author Approval
2.0 11/2009 Major revision and expansion to bring into ICT Approved by Shared
line with current ACT Government Security Services Governing
infrastructure. Committee
12/10/2009
2.1 02 2012 Changes to reflect new Shared Services ICT K Webb Executive Director,
structure, Include reference to the Workplace Shared Services ICT
Privacy Act, and changes references to
Agencies to Directorates
2.2 11/2012 Update classification system to reflect new P Major Executive Director,
classification standards and include Shared Services ICT
references to ISO 27000 series standards.
2.3 01/2014 Para 1.3 adjusted to include Instant P Major Executive Director,
messaging and the use of unapproved Shared Services ICT
hardware and software on the ACT Govt
network. Approval process for SRMPs and
Glossary updated
2.4 09/2014 Add Bolden James classifier to Header & P Major, Executive Director,
Footer. ‘PSP&G’ to ‘PSPF’. ‘Privacy Act G Tankard Shared Services ICT
1988’ to ‘Information Privacy Act 2014’.
Cosmetic changes
2.5 11/2016 Restructured for ease of reading. Added S Callahan Executive Director,
polices for governance, compliance and risk; Shared Services ICT
network segregation; vulnerability
management; cloud storage; user
identification and authentication. Revised
many other polices for cloud.
2.6 14/07/2017 Requirement for security clauses with cloud S Callahan Executive Director,
service providers; revised Secure Data Shared Services ICT
Transfers, Secure Desktops, and Sensitive
Information in Non-production Environments
2.8 12/11/2018 Notification of data breaches, email security, C Callahan CTO, Shared
identity federation, domain name policy and Services ICT
change exemption policies added. J Owen (Executive
responsible for ICT
Changes accepted by CISO. Security)
2.9 08/01/2019 Minor update to MFA rules and reference to C Callahan CISO, SS ICT
data release standard.
This is a CONTROLLED document. Copies in paper form are not controlled and
should be checked against the version on the Shared Services Portal before use.
CMTEDD
Chief Minister, Treasury and Economic
Development Directorate