Management of Cyber Security Supply Chain Risks
Management of Cyber Security Supply Chain Risks
Management of Cyber Security Supply Chain Risks
2
Canberra ACT
14 December 2022
Dear Mr Speaker
Dear President
In accordance with the authority contained in the Auditor-General Act 1997, I have
undertaken an independent performance audit in the Australian Federal Police, the
Australian Taxation Office, and the Department of Foreign Affairs and Trade. The report
is titled Management of Cyber Security Supply Chain Risks. Pursuant to Senate Standing
Order 166 relating to the presentation of documents when the Senate is not sitting, I
present the report of this audit to the Parliament.
Following its presentation and receipt, the report will be placed on the Australian National
Audit Office’s website — http://www.anao.gov.au.
Yours sincerely
Grant Hehir
Auditor-General
3
AUDITING FOR AUSTRALIA
The Auditor-General is head of the
Australian National Audit Office
(ANAO). The ANAO assists the
Auditor-General to carry out his
duties under the Auditor-General
Act 1997 to undertake
performance audits, financial
statement audits and assurance
reviews of Commonwealth public
sector bodies and to provide
independent reports and advice
for the Parliament, the Australian
Government and the community.
The aim is to improve
Commonwealth public sector
administration and accountability.
For further information contact:
Australian National Audit Office
GPO Box 707
Canberra ACT 2601
Audit team
Edwin Apoderado
Benjamin Siddans
Zhiying Wen
Ji-Young Kim
Jason Ralston
David Willis
Stevan Serafimov
Olivia Robbins
Jo Rattray-Wood
Sherry Wang
Xiaoyan Lu
Lesa Craswell
4
Contents
Summary and recommendations.................................................................................................................... 7
Background ............................................................................................................................................... 7
Conclusion ................................................................................................................................................. 9
Supporting findings .................................................................................................................................. 10
Recommendations ................................................................................................................................... 12
Summaries of entity responses ............................................................................................................... 13
Key messages from this audit for all Australian Government entities .....................................................14
Audit findings.............................................................................................................................................. 17
1. Background ............................................................................................................................................. 18
Introduction .............................................................................................................................................. 18
Protective Security Policy Framework maturity self-assessment model .................................................18
Managing cyber security supply chain risk .............................................................................................. 21
Rationale for undertaking the audit ......................................................................................................... 24
Audit approach ........................................................................................................................................ 25
2. Managing cyber security risks in procurements ...................................................................................... 29
Have entities established an appropriate risk management framework for assessing and
managing procurement cyber security risks?..................................................................................... 29
Have entities established fit-for-purpose contracting arrangements that support the management
of procurement cyber security risks? ................................................................................................. 33
Have entities established fit-for-purpose arrangements for the management of contracted
providers’ compliance with relevant Protective Security Policy Framework requirements? ..............38
3. Compliance with Protective Security Policy Framework requirements ...................................................42
Have cyber security controls been implemented for relevant Protective Security Policy
Framework requirements? ................................................................................................................. 43
Is the performance of security controls for relevant Protective Security Policy Framework
requirements appropriately monitored? ............................................................................................. 46
Is performance of security controls for relevant Protective Security Policy Framework
requirements accurately reported? .................................................................................................... 50
Appendices ................................................................................................................................................. 55
Appendix 1 Entity responses ................................................................................................................. 56
Appendix 2 Improvements observed by the ANAO ............................................................................... 62
Appendix 3 Policy 10 and Essential Eight Maturity Model Timeline ......................................................64
5
Auditor-General Report No.9 2022–23
Management of Cyber Security Supply Chain Risks
51% 72%
of non-corporate Commonwealth entities reported of non-corporate Commonwealth entities reported not
not fully implementing PSPF Policy 6 in 2020–21. fully implementing PSPF Policy 10 in 2020–21.
Summary and recommendations
Background
1. Australian Government entities deliver a wide range of digital services to the community
and hold large volumes of data across their computer networks, some of which is highly sensitive.
Australian Government entities rely on a system of organisations, people, activities, information,
and resources to deliver digital services and to maintain the security of government computer
networks and data. This system can be referred to as an entity’s supply chain.1
2. Cyber security continues to be a risk for all Australian individuals, organisations and
government entities, with over 67,500 cybercrimes being reported to the Australian Signals
Directorate’s Australian Cyber Security Centre (ACSC) in 2020–21 — an increase of 13 per cent
since the previous financial year.2 In addition, ACSC has reported that contractors holding
government information had a significant increase in malicious cyber activities.3 This increases
the cyber security risks arising from an entity’s supply chain as the risks can originate from
suppliers, manufacturers, distributors, and retailers that support products and services used by
the entity. ACSC recommends that all Australian organisations prioritise the implementation of
the Essential Eight Maturity Model (Essential Eight), including knowing their networks and
evaluating risks associated with cyber supply chains.
3. The Attorney-General has established the Protective Security Policy Framework (PSPF) as
Australian Government policy and non-corporate Commonwealth entities (NCEs) subject to the
Public Governance, Performance and Accountability Act 2013 must apply the PSPF.4 PSPF Policy
5: Reporting on security (Policy 5) sets out the maturity self-assessment model for annual PSPF
reporting. The maturity self-assessment model requires entities to assess their security capability
and implementation of the PSPF requirements.5 The PSPF specifies that the ‘Managing’ maturity
level provides the minimum required level of protection of an entity’s people, information and
assets.6
4. Requirements for NCEs to manage cyber security supply chain risks are outlined in PSPF
Policy 6: Security governance for contracted goods and service providers (Policy 6) and the
Commonwealth Procurement Rules (CPRs). The CPRs were updated in December 2020 to include
managing cyber security risks within government procurements and contracts. These are
supported by requirements in PSPF Policy 10: Safeguarding data from cyber threats (Policy 10),
which outlines the mandatory PSPF cyber security requirements. Since April 2013, the PSPF has
1 Australian Cyber Security Centre, Glossary: Supply Chain [Internet], ASD,2020, available from
https://www.cyber.gov.au/acsc/view-all-content/glossary/supply-chain [accessed 19 July 2022].
2 The Australian Cyber Security Centre formally became part of Australian Signals Directorate on 1 July 2018.
3 Australian Cyber Security Centre, ACSC Annual Cyber Threat Report | 1 July 2020 to 30 June 2021 [Internet].
4 Attorney-General’s Department, Applying the Protective Security Policy Framework [Internet], AGD, available
from https://www.protectivesecurity.gov.au/about/applying-protective-security-policy-framework [accessed
19 September 2022].
5 The 16 PSPF policies are across four outcomes: governance, information, personnel and physical. These
outcomes outline the end-state that the government wants to achieve.
6 Attorney-General’s Department, Protective Security Policy Framework | Policy 5: Reporting on security, AGD,
2018, available from https://www.protectivesecurity.gov.au/system/files/2021-06/pspf-policy-5-reporting-
on-security.pdf [accessed 8 August 2022], p. 3.
7
mandated NCEs implement four of the ACSC’s Essential Eight Maturity Model, known as the Top
Four.7
7 The Top Four are: application control; patching applications; restricting administrative privilege; and patching
operating systems.
Australian Cyber Security Centre, Essential Eight Maturity Model [Internet], ASD, 2017, available from
https://www.cyber.gov.au/acsc/view-all-content/publications/essential-eight-maturity-model [accessed 18
September 2022].
8 Attorney-General’s Department, Protective Security Policy Framework | Assessment Report 2020–21, p.10.
9 Auditor‐General Report No.32 2020–21 Cyber Security Strategies of Non‐Corporate Commonwealth Entities, p.
70.
10 Auditor‐General Report No.4 2021–22 Defence’s Contract Administration — Defence Industry Security
Program, p. 8; and Auditor‐General Report No.6 2021–22 Management of the Civil Maritime Surveillance
Services Contract, pp. 8-9.
11 These goods and services include 'Information Technology and Telecommunications'; and 'Engineering and
Research and Technology Based Services'.
12 Australian Cyber Security Centre, ACSC Annual Cyber Threat Report | 1 July 2020 to 30 June 2021 [Internet].
8
Summary and recommendations
9. This audit was identified as a Joint Committee of Public Accounts and Audit (JCPAA)
priority for 2021-22.
10. This audit will examine the effectiveness of the implementation of Policy 6 by selected
NCEs and the effectiveness of selected contracted providers’ compliance with the relevant PSPF
requirements relating to procurement cyber security risks. It will provide Parliament transparency
and insights on the management of procurement cyber security risks.13
Conclusion
14. The implementation of arrangements by selected entities for managing cyber security
risks within procurements and specific contracted providers under the PSPF have not been fully
effective.
15. ATO has largely effective arrangements for assessing and managing procurement cyber
security risks in accordance with the PSPF. AFP and DFAT have partially effective arrangements
for assessing and managing procurement risks related to cyber security in accordance with the
PSPF.
16. AFP and DFAT do not manage compliance of contracted providers with the PSPF
requirements for cyber security. ATO had largely established arrangements to manage
compliance of their contracted providers with limited assurance over reporting and methods of
enforcement of the PSPF requirements for cyber security.
13 The recommendations from the Auditor‐General Report No.32 2020–21 Cyber Security Strategies of Non‐
Corporate Commonwealth Entities and JCPAA Report 485: Cyber Resilience will be assessed as part of the
2022-23 Auditor-General Implementation of parliamentary committee and Auditor-General recommendations
— Attorney-General’s portfolio performance audit.
9
Supporting findings
Managing cyber security risks in procurements
17. All three entities have defined roles and responsibilities for managing procurement cyber
security risks. The procurement teams are responsible for identifying, assessing, and managing
cyber security risks within procurements. The entities have cyber security specialists who can
provide advice on cyber security risks associated with a procurement.
18. None of the three entities’ processes required procurement teams to consult with cyber
security specialists when assessing procurement cyber security risks or when considering
mandatory PSPF cyber security requirements. Of the three entities, ATO has processes for
assisting procurement teams with assessing and managing procurement cyber security risks and
consideration of mandatory PSPF cyber security requirements. AFP and DFAT have not
implemented processes for assessing and managing procurement cyber security risks, including
documenting any assessments performed relating to mandatory PSPF cyber security
requirements.
19. All three entities have contract clauses requiring contracted providers to comply with the
PSPF, ACSC’s Information Security Manual (ISM) and the respective entities’ policies. ATO
performs ongoing assessments of its security terms and conditions to ensure protective security
requirements address identified cyber security risks.
20. DFAT and AFP use contract management plans to specify roles and responsibilities for each
contract. ATO has a generic contract management plan that covers ICT contracts and is developing
detailed plans for each contracted provider. ATO’s generic contract management plan does not
detail roles and responsibilities for each ICT contract.
21. All three entities have incident management processes within contracting arrangements.
ATO is the only entity that has arrangements for monitoring performance against mandatory PSPF
cyber security requirements. However, the ATO has not detailed how non-compliance with
mandatory PSPF cyber security requirements is to be managed.
22. All selected contracts required contracted providers to adhere to the PSPF, ISM and entity
internal policy requirements. None of the entities had processes, performance measures and
service level agreements related to managing non-compliance with PSPF, ISM and entity internal
policy requirements. Further, none of the entities had processes for verifying the reliability of
cyber security related performance information provided by contracted providers.
23. AFP and DFAT do not monitor compliance against PSPF, ISM and entity internal policy
requirements for the selected contracts. ATO has established a Cyber Threat Assurance Program
and risk management processes for assessing compliance against mandatory PSPF cyber security
requirements. The assurance program included a quarterly audit of contracted provider
implementation of the Top Four mitigation strategies. The risk management processes included
the use of risk registers to monitor the implementation of some mandatory PSPF cyber security
controls and ATO policy requirements.
10
Summary and recommendations
14 For example, penalties related to availability or service quality requirements, but did not include non-
compliance against relevant mandatory PSPF cyber security and department security policy requirements.
11
Recommendations
Recommendation no. 1 To improve the quality of risk assessments:
Paragraph 2.15 (a) Australian Federal Police and Department of Foreign Affairs
and Trade improve processes and guidance for assessing and
managing cyber security risks within procurements,
including documenting the consideration of mandatory PSPF
cyber security requirements; and
(b) Australian Federal Police, Australian Taxation Office and
Department of Foreign Affairs and Trade implement
processes to assist with identifying when procurement
teams are required to consult with cyber security specialists
on cyber security risks and mandatory PSPF cyber security
requirements.
Australian Federal Police response: Agreed, agreed in part.
Australian Taxation Office response: Agreed.
Department of Foreign Affairs and Trade response: Agreed.
12
Summary and recommendations
Recommendation no. 4 Australian Federal Police and Department of Foreign Affairs and
Paragraph 3.37 Trade specify requirements relating to reporting performance
against relevant cyber security and entity policy requirements in
contractual arrangements.
Australian Federal Police response: Agreed in part.
Department of Foreign Affairs and Trade response: Agreed.
13
The review has identified opportunities for improvement to our risk assessment processes and
performance reporting. The ATO operates under the principle of continuous improvement and
welcome the findings from the ANAO to further strengthen the procurement program.
Key messages from this audit for all Australian Government entities
31. Below is a summary of key messages, including instances of good practice, which have
been identified in this audit and may be relevant for the operations of other Australian
Government entities.
Governance and risk management
• Assurance arrangements such as the Cyber Threat Assurance Program approach established
by ATO to check on the implementation of mandatory PSPF cyber security requirements can
assist with monitoring of compliance against cyber security contract requirements.
• Procurement specialists should ensure that contractual arrangements support the delivery of
goods and services to meet the requirements of the entity.
Procurement and contract management
• Appropriate guidance relating to contracting templates, clauses and tools can help
operationalise entity requirements when addressing cyber security risks within procurements
and contracts.
• Regular assessment of security terms and conditions when changes in goods, services or
business environment occur can assist with achieving government security requirements.
• Procurement and contract management arrangements should include a framework to guide
appropriate levels of engagement between procurement and cyber security specialists, such
14
Summary and recommendations
as specifying factors related to the type of procurement and level of risk arising from
information communications technology (ICT).
Performance and impact measurement
• Cyber security contract terms and conditions that associate performance measures and
financial consequences for non-compliance can assist with establishing performance
expectations.
• When entities contract for delivery of ICT goods and services, arrangements should be in place
that provide equivalent level of assurance over goods and services delivered internally.
Entities cannot outsource security responsibilities and need arrangements to assure cyber
security controls are implemented, operated, and maintained by contracted providers.
15
Audit findings
17
1. Background
Introduction
1.1 Australian Government entities deliver a wide range of digital services to the community.
Australian Government entities also hold increasingly large volumes of data across their computer
networks, some of which is highly sensitive. Australian Government entities rely on a system of
organisations, people, activities, information, and resources to deliver digital services and to
maintain the security of government computer networks and data. This system can be referred to
as an entity’s supply chain.15
1.2 Cyber security continues to be a risk for all Australian individuals, organisations and
government entities, with over 67,500 cybercrimes being reported to the Australian Signals
Directorate’s Australian Cyber Security Centre (ACSC) in 2020–21 — an increase of 13 per cent since
the previous financial year.16 In addition, ACSC has reported that contractors holding government
information had a significant increase in malicious cyber activities.17 This increases the cyber
security risks arising from an entity’s supply chain as the risks can originate from suppliers,
manufacturers, distributors, and retailers that support products and services used by the entity.
ACSC recommends that all Australian organisations prioritise the implementation of the Essential
Eight Maturity Model (Essential Eight), including knowing their networks and evaluating risks
associated with cyber supply chains.
1.3 In addition to the ACSC’s guidance, the Attorney-General’s Department (AGD) updated the
Protective Security Policy Framework (PSPF) in March 2022 to mandate all Essential Eight mitigation
strategies from 1 July 2022 for non-corporate Commonwealth entities (NCEs).18 The
Attorney-General has established the PSPF as Australian Government policy and NCEs subject to
the Public Governance, Performance and Accountability Act 2013 must apply the PSPF.19 The
Commonwealth Procurement Rules (CPRs) were updated in December 2020 to include managing
cyber security risks within government procurements and contracts.
15 Australian Cyber Security Centre, Glossary: Supply Chain [Internet], ASD,2020, available from
https://www.cyber.gov.au/acsc/view-all-content/glossary/supply-chain [accessed 19 July 2022].
16 The Australian Cyber Security Centre formally became part of Australian Signals Directorate on 1 July 2018.
17 Australian Cyber Security Centre, ACSC Annual Cyber Threat Report | 1 July 2020 to 30 June 2021 [Internet].
18 Attorney-General’s Department, Protective Security Policy Framework | Policy 10: Safeguarding data from
cyber threats, AGD, 2018, available from https://www.protectivesecurity.gov.au/system/files/2022-03/pspf-
policy-10-safeguarding-data-from-cyber-threats.pdf [accessed 19 July 2022].
19 Attorney-General’s Department, Applying the Protective Security Policy Framework [Internet], AGD, available
from https://www.protectivesecurity.gov.au/about/applying-protective-security-policy-framework [accessed
19 September 2022].
18
Background
maturity of their security capability. The annual PSPF assessment report shows the extent to which
an entity has self-assessed it has:
• achieved the security outcomes through effectively implementing and managing
requirements under the PSPF;
• implemented and managed security capability at a specific maturity;
• identified the key security risks to its people, information, and assets; and
• taken measures to mitigate or manage identified risks.20
1.5 The maturity self-assessment model requires entities to assess their security capability and
implementation of the requirements in the 16 PSPF policies within the context of their specific risk
environment and risk tolerances.21 To assess the maturity of the implementation of each PSPF
policy, entities are to consider their effectiveness in implementing the core and supporting
requirements for each policy. Entities assess the effectiveness of their implementation of the PSPF
requirements against four different levels: Partial, Substantial, Full and Excelled. Descriptions for
each implementation level are outlined in Table 1.1.
Table 1.1: Implementation levels of PSPF requirements
Implementation levela Description
Partial Requirement is not implemented, is partially progressed or is not well-
understood across the entity.
Substantial Requirement is largely implemented but may not be fully effective or
integrated into business practices.
Full Requirement is fully implemented and effective and is integrated, as
applicable, into business practices.
Excelled Requirement and relevant better-practice guidance are proactively
implemented in accordance with the entity’s risk environment, are effective in
mitigating security risk and are systematically integrated into business
practices.
Note a: The ‘Yes or No’ implementation level has been excluded from the table as the selected requirements for the
audit are evaluated in the PSPF using the levels specified in the table.
Source: PSPF Policy 5: Reporting on security.
1.6 Based on entities’ assessment of their implementation of the requirements for each PSPF
policy, the entities can select four maturity levels under the PSPF maturity self-assessment model:
Ad hoc, Developing, Managing and Embedded. The selected maturity level is for the overall PSPF
Policy. The description for each PSPF maturity level is outlined in Table 1.2.
20 Attorney General’s Department, Protective Security Policy Framework | Security governance, AGD, available
from https://www.protectivesecurity.gov.au/policies/security-governance [accessed 24 August 2022].
21 The 16 PSPF policies are across four outcomes: governance, information, personnel and physical. These
outcomes outline the end-state that the government wants to achieve.
19
Table 1.2: Maturity levels of the PSPF maturity self-assessment model
Maturity level Maturity rating Description
◕
Substantial, but not fully effective implementation and
Developing management of PSPF mandatory and supporting
requirements.
22 Attorney-General’s Department, Protective Security Policy Framework | Policy 5: Reporting on security, AGD,
2018, available from https://www.protectivesecurity.gov.au/system/files/2021-06/pspf-policy-5-reporting-
on-security.pdf [accessed 8 August 2022], p. 3.
20
Background
23 The core requirements specify what entities must do to achieve the government’s desired protective security
outcomes. This is the mandatory requirement under PSPF Policy 6.
24 GOV-12 was a PSPF mandatory requirement prior to 30 September 2018 and specified that, ‘Agencies must
ensure the contracted service provider complies with the requirements of this policy and any protective
security protocols.’ The GOV-12 requirement was replaced by the PSPF core requirement Policy 6: Security
Governance for contracted goods and service providers on 1 October 2018.
25 Supporting requirements specify the standard approach for achieving the core requirements.
21
When managing contracts, entities must put in place the following measures over the life of a
contract:
a. ensure that security controls included in the contract are implemented, operated and
maintained by the contracted provider and associated subcontractor; and
b. manage any changes to the provision of goods or services, and reassess security risks.
Requirement 4. Completion or termination of a contract
Entities must implement appropriate security arrangements at completion or termination of a
contract.
Source: PSPF Policy 6: Security governance for contracted goods and service providers.
1.13 Policy 6 provides details to support the CPRs that govern how entities procure goods and
services.26 The CPRs provide guidance on general procurement risk, but limited guidance regarding
considerations of cyber security risks. In December 2020, Department of Finance updated CPR rule
8.3, to align with existing PSPF policies, specifying that relevant entities should be considering and
managing procurement security risks including in relation to cyber security risks. It requires that
NCEs and prescribed corporate Commonwealth entities listed in section 30 of the Public
Governance, Performance and Accountability Rule 2014 specifically consider the cyber security risk
associated with each procurement, which is outlined in Box 2.
Relevant entities should consider and manage their procurement security risk, including in
relation to cyber security risk, in accordance with the Australian Government’s Protective
Security Policy Framework.a
Note a: The mandatory supporting Requirement 1 of Policy 6 requires the assessment and management of security
risks of procurements.
Source: Commonwealth Procurement Rules.
1.14 The Australian Government is a large procurer of information communications technology
(ICT) related goods and services, with 19,270 contracts worth approximately $14.8 billion
committed in 2021–22.27 This commitment introduces dependencies on significant supply chains.
In November 2019, the ACSC published Cyber Supply Chain Risk Management that suggested all
organisations should consider supply chain risks, specifically in relation to cyber security risks, as
cyber security risks are generally transferred through the entities within the supply chain.28
26 Attorney-General’s Department, Protective Security Policy Framework | Policy 6: Security governance for
contracted goods and service providers [Internet], AGD, 2018, available from
https://www.protectivesecurity.gov.au/system/files/2021-10/policy-6_security-governance-for-contracted-
goods-and-service-providers.pdf [accessed 24 August 2022].
27 These goods and services include 'Information Technology and Telecommunications'; and 'Engineering and
Research and Technology Based Services'.
28 Australian Cyber Security Centre, Cyber Supply Chain Risk Management [Internet].
22
Background
Each entity must mitigate common and emerging cyber threats by:
a. implementing the following mitigation strategies from the Strategies to Mitigate Cyber
Security Incidents:
i. application control
ii. patching applications
iii. restricting administrative privileges
iv. patching operating systems
b. considering which of the remaining mitigation strategies from the Strategies to Mitigate
Cyber Security Incidents you need to implement to protect your entity.
Source: Adapted from PSPF Policy 10: Safeguarding information from cyber threats.
1.16 Since the introduction of the Essential Eight Maturity Model in June 2017, Policy 10 has
provided NCEs guidance on implementing the ‘Maturity Level Three’ requirements — as set out in
the Essential Eight Maturity Model — to achieve a PSPF maturity rating of ‘Managing’.30 ACSC
reviews the cyber threat landscape on a regular basis and updates the Essential Eight according to
the threats at the time. The ANAO assessed selected entities using the Maturity Model in place at
the planning of this audit in September 2021, as entities would not be reporting against changes
29 The Top Four are: application control; patching applications; restricting administrative privilege; and patching
operating systems.
Australian Cyber Security Centre, Essential Eight Maturity Model [Internet], ASD, 2017, available from
https://www.cyber.gov.au/acsc/view-all-content/publications/essential-eight-maturity-model [accessed 18
September 2022].
30 Attorney-General’s Department, Protective Security Policy Framework | Policy 10: Safeguarding data from
cyber threats, [Internet].
23
introduced in October 2021.31 As at September 2021, there were three maturity levels in the
Essential Eight Maturity Model, as defined in Table 1.3.32
Table 1.3: Maturity levels of the Essential Eight Maturity Model (June 2017 to
September 2021)
Maturity level Description
Maturity Level One Partially aligned with the intent of the mitigation strategy.
Maturity Level Two Mostly aligned with the intent of the mitigation strategy.
Maturity Level Three Fully aligned with the intent of the mitigation strategy.
Source: Adapted from the ACSC’s Essential Eight Maturity Model.
1.17 AGD consulted with ACSC to improve the interaction between the PSPF and the Essential
Eight Maturity Model. This consultation has resulted in updates to Policy 10 to ensure appropriate
alignment between the ACSC’s Essential Eight Maturity Model and the PSPF maturity model. In
March 2022, AGD updated Policy 10 to mandate the Essential Eight strategies to mitigate cyber
security incidents from 1 July 2022, and advised entities that to achieve a PSPF maturity rating of
‘Managing’, NCEs must implement Essential Eight Maturity Level Two for each mitigation strategy.33
31 ANAO assessed against the September 2021 version of the model to allow entities sufficient time to respond
to any changes that may have subsequently applied.
In October 2021, ACSC updated the Essential Eight to include four maturity levels rather than three and
updated requirements throughout the other maturity levels to address current cyber threats. Originally,
Maturity Level One was the lowest maturity level, but this did not differentiate those organisations that did
not meet Maturity Level One requirements. NCEs that did not meet Maturity Level One maturity
requirements were those that did not implement any Essential Eight mitigation strategies. This has resulted in
the inclusion of Maturity Level Zero to acknowledge weaknesses in an organisation’s overall cyber security
posture.
32 See Appendix 3 for a description of the key changes in Policy 10 and the Essential Eight Maturity Model and
the applicable Policy 10 requirements for this audit.
33 Appendix 3 describes the applicable periods for the various versions of Policy 10.
34 Attorney-General’s Department, Protective Security Policy Framework | Assessment Report 2020–21, p.10.
35 Auditor‐General Report No.32 2020–21 Cyber Security Strategies of Non‐Corporate Commonwealth Entities, p.
70.
24
Background
1.19 The limited influence and control over outsourced service providers of ICT and cyber
security services increases the cyber security risks arising from an entity’s supply chain. The
management of cyber security risks within procurements continues to be challenging for NCEs with
51 per cent being reported in AGD’s PSPF Assessment Report 2020–21 as not fully implementing
Policy 6.
1.20 Auditor‐General Report No. 4 2021–22 Defence’s Contract Administration — Defence
Industry Security Program and Auditor‐General Report No. 6 2021–22 Management of the Civil
Maritime Surveillance Services Contract have further indicated poor administration of government
procurements, including monitoring and treatment of non‐compliance with contractual
requirements.36
1.21 The Australian Government has committed $14.8 billion in information communications
technology (ICT) related goods and services contracts in 2021–22.37 These commitments indicate
the Australian Government’s reliance on contracted providers for its ICT capabilities. This
dependency on contractors for ICT capabilities and the increase in malicious cyber activities against
contractors who hold government information increases the risks associated with government
supply chains.38
1.22 This audit was identified as a Joint Committee of Public Accounts and Audit (JCPAA) priority
for 2021-22.
1.23 This audit will examine the effectiveness of the implementation of Policy 6 by selected NCEs
and the effectiveness of selected contracted providers’ compliance with the relevant PSPF
requirements relating to procurement cyber security risks. It will provide Parliament transparency
and insights on the management of procurement cyber security risks.39
Audit approach
1.24 The following three NCEs were selected for this audit:
• Australian Federal Police (AFP);
• Australian Taxation Office (ATO); and
• Department of Foreign Affairs and Trade (DFAT).
1.25 The 2020–21 Policy 6 and Policy 10 maturity ratings, as self-assessed by the selected entities,
are outlined in Table 1.4.
36 Auditor‐General Report No.4 2021–22 Defence’s Contract Administration — Defence Industry Security
Program, p. 8; and Auditor‐General Report No.6 2021–22 Management of the Civil Maritime Surveillance
Services Contract, pp. 8-9.
37 These goods and services include 'Information Technology and Telecommunications'; and 'Engineering and
Research and Technology Based Services'.
38 Australian Cyber Security Centre, ACSC Annual Cyber Threat Report | 1 July 2020 to 30 June 2021 [Internet].
39 The recommendations from the Auditor‐General Report No.32 2020–21 Cyber Security Strategies of Non‐
Corporate Commonwealth Entities and JCPAA Report 485: Cyber Resilience will be assessed as part of the 2022
Auditor-General Implementation of parliamentary committee and Auditor-General recommendations —
Attorney-General’s portfolio performance audit.
25
Table 1.4: Selected entities and their 2020-21 Policy 6 and 10 self-assessed maturity
ratings
Entity Policy 6 maturity rating Policy 10 maturity rating
Australian Federal Police ● ◕
Australian Taxation Office ● ◕
Department of Foreign Affairs
and Trade ● ◕
Key:
Ad hoc
◑ Partial or basic implementation and management of PSPF mandatory and supporting
requirements.
Developing
◕ Substantial, but not fully effective implementation and management of PSPF mandatory and
supporting requirements.
Managing
● Complete and effective implementation and management of PSPF mandatory and supporting
requirements.
Embedded Comprehensive and effective implementation and proactive management of PSPF
mandatory and supporting requirements and excelling at implementation of better-practice
guidance.
Source: Reported 2020–21 Policy 6 and 10 maturity ratings for selected entities.
1.26 Contracts were selected for each entity to support the assessment against Policy 6
requirements. The contracts selected were based on contract value, and the type of goods and
services being provided, with a focus on goods and services relating to handling of sensitive
information, security functions and management of privileged user access. These functions were
suggested as higher priority by the ACSC.40
1.27 The contracts selected were with DXC Technology (DXC), Hitachi Vantara (Hitachi), and
Telstra Australia (Telstra). A summary of contract details has been provided in Table 1.5.
Table 1.5: Summary of contract details
Entity Contracted Provider Value ($) Contract Scope of Services
milliona Initiation
Australian Hitachi Vantara Australia 24 September Provision of ICT facilities
Federal Pty Limited trading as 2017 and ongoing system
Police Hitachi Data Systems Pty management services.
Ltd These are to be provided in
(Hitachi) AFP’s ICT environment.
40 Australian Cyber Security Centre, , Cyber Supply Chain Risk Management [Internet].
26
Background
41 NCEs were required to report in 2020–21 against PSPF Policy 10 and the Essential Eight Maturity Model
requirements prior to changes in the Essential Eight Maturity Model in September 2021.
27
1.32 The ANAO examined the implementation and performance of the respective cyber security
related services specific to each contract and on the applications and systems relevant to the
contracts. The ANAO tested the operating effectiveness of controls between 1 January 2021 and 1
June 2022.
Audit methodology
1.36 The audit methodology included:
• examination of NCEs’ documentation for managing procurements related to the selected
contracted providers against Policies 6 and 10;
• system testing and technical assessment of the cyber security controls implemented by
the contracted providers against the requirements in Policy 10;
• examination of the contracted providers’ cyber security reporting and documentation;
and
• meetings with the NCEs’ and contracted providers’ staff.
1.37 The audit was conducted in accordance with ANAO Auditing Standards at a cost to the ANAO
of approximately $609,561.
1.38 The team members for this audit were Edwin Apoderado, Benjamin Siddans, Zhiying Wen,
Ji-Young Kim, Jason Ralston, David Willis, Stevan Serafimov, Olivia Robbins, Jo Rattray-Wood,
Sherry Wang, Xiaoyan Lu, and Lesa Craswell.
28
2. Managing cyber security risks in
procurements
Areas examined
This chapter examines whether the selected entities have established effective arrangements for
assessing and managing procurement risks related to cyber security in accordance with the
Protective Security Policy Framework (PSPF) requirements.
Conclusion
Australian Taxation Office (ATO) has largely effective arrangements for assessing and managing
procurement cyber security risks in accordance with the PSPF. Australian Federal Police (AFP) and
Department of Foreign Affairs and Trade (DFAT) have partially effective arrangements for
assessing and managing procurement risks related to cyber security in accordance with the PSPF.
Areas for improvement
The ANAO made the following recommendations aimed at:
• all three entities improving processes and guidance for assessing and managing cyber security
risks within procurements, including documenting the consideration of mandatory PSPF
cyber security requirements and identifying when procurement teams should consult cyber
security specialists; and
• all three entities implementing processes for verifying the reliability of performance
information and managing non-compliance with relevant mandatory PSPF security
requirements, including establishing relevant performance measures.
2.1 The Public Governance Performance and Accountability Act 2013 (PGPA Act) requires
entities to demonstrate how public resources have been applied to achieve their purposes. The
Attorney-General’s Directive on the Security of Government Business establishes the Protective
Security Policy Framework (PSPF) as an Australian Government policy.42 The PSPF Policy 6: Security
governance for contracted goods and service providers (Policy 6) requires entities to manage cyber
security risks arising from procuring goods and services and ensure that contracted providers
comply with relevant PSPF cyber security requirements.
2.2 This chapter examines whether audited entities have established sound risk management
and contracting frameworks for managing procurement cyber security risks. Policy 6 requires (see
Box 1) these frameworks to include processes for identifying and documenting risks, establishing
contract terms and conditions, and oversight of contracted provider performance.
42 The Attorney-General issued the Directive on the Security of Government Business in October 2018 as part of
updates to the Protective Security Policy Framework.
29
cyber security risks within procurements. The entities have cyber security specialists who can
provide advice on cyber security risks associated with a procurement.
None of the three entities’ processes required procurement teams to consult with cyber
security specialists when assessing procurement cyber security risks or when considering
mandatory PSPF cyber security requirements. Of the three entities, ATO has processes for
assisting procurement teams with assessing and managing procurement cyber security risks
and consideration of mandatory PSPF cyber security requirements. AFP and DFAT has not
implemented processes for assessing and managing procurement cyber security risks, including
documenting any assessments performed relating to mandatory PSPF cyber security
requirements.
2.3 When the provision of digital services is outsourced to external providers, accountability for
the good or service and associated delivery outcomes (including managing security risks) remains
with the entity. Policy 6 provides guidance on assessing and managing the cyber security risks in
procurements. It outlines the mandatory requirements (see Box 1) for identifying, documenting and
mitigating cyber security risks.
2.4 Establishing an appropriate risk management framework helps entities understand cyber
security risks associated with a procurement and assists with identifying suitable security
treatments.
2.5 The ANAO reviewed entities’ processes and procedures to assess whether the Policy 6
requirements had been clearly defined and addressed. Policy 6 requires risk management processes
to:
• define the roles and responsibilities for assessing and managing procurement cyber
security risks; and
• identify and document mitigations for procurement cyber security risks, including
consultation with IT security experts and specifying mandatory security requirements.
2.6 The results of the review for each audited entity are summarised in Table 2.1.
30
Managing cyber security risks in procurements
Managing ● Complete and effective implementation and management of PSPF mandatory and supporting
requirements.
Comprehensive and effective implementation and proactive management of PSPF mandatory
Embedded
and supporting requirements and excelling at implementation of better-practice guidance.
Note a: The ‘Entity Self-Assessment’ rating is the entity reported PSPF maturity level for the entities’ overall
environment. The ‘ANAO analysis’ assessment maturity level rating only relates to processes for managing
cyber security risk.
Source: ANAO analysis.
31
provide guidance on identifying and managing procurement risks, with specific focus on
understanding risks in information communications technology (ICT) procurements. The guideline
does not provide details on how cyber security risks and mandatory PSPF cyber security
requirements are considered as part of risk assessments. AFP has advised the ANAO that cyber
security risks are assessed as part of considerations of AFP’s general security environment. The
guideline was approved in October 2021 and AFP adopted a staged approach to its implementation.
As of June 2022, the guideline had not been implemented and AFP did not have a documented
implementation plan.
2.12 ATO has procurement and contract management frameworks that set out the principles for
managing vendors, roles and responsibilities, the relationship management approach, and
assurance and reporting requirements. ATO uses questionnaires to assist procurement teams to
assess the procurement security risks. These questionnaires address all PSPF requirements,
including those relating to cyber security. The questionnaires are completed by the procurement
team and provided to ATO’s cyber security specialists if further advice is required. ATO’s cyber
security specialists provide advice on cyber security risks and considerations relating to the
procurement. Procurement teams are not required to consult with ATO’s cyber security specialists
on all procurements, including ICT-related procurements. No questionnaire was completed in
relation to the DXC contract.
2.13 DFAT’s 2021 Security Risk Management Policy consists of tools and templates for assessing
the operational impact of security risks. Those tools and templates do not include details on how
cyber security risks and mandatory PSPF cyber security requirements are considered within
procurements. The policy does not specify processes for identifying, assessing, and managing
procurement cyber security risks.
2.14 DFAT developed the Cyber Security Supply Chain Policy (Supply Chain Policy) in June 2021
to support the 2021 Security Risk Management Policy. The Supply Chain Policy provides details for
identifying, assessing, and managing procurement cyber security risks. The Supply Chain Policy
requires DFAT’s cyber security specialists to perform a preliminary cyber security assessment to
understand the supply chain risks from a contracted provider. These assessments and the decisions
for not performing assessments are not required to be documented under the Supply Chain Policy.
DFAT has recently developed a Procurement Policy in June 2022 that specifies the roles and
responsibilities for documenting these assessments. This policy only applies to new procurements
and not contract variations nor extensions and has not been applied to the Telstra contract.
32
Managing cyber security risks in procurements
Recommendation no. 1
2.15 To improve the quality of risk assessments:
(a) Australian Federal Police and Department of Foreign Affairs and Trade improve
processes and guidance for assessing and managing cyber security risks within
procurements, including documenting the consideration of mandatory PSPF cyber
security requirements; and
(b) Australian Federal Police, Australian Taxation Office and Department of Foreign Affairs
and Trade implement processes to assist with identifying when procurement teams are
required to consult with cyber security specialists on cyber security risks and mandatory
PSPF cyber security requirements.
Australian Federal Police response: Agreed, agreed in part.
2.16 The AFP agrees to improve the quality of risk assessments in support of complex
procurements including determining when procurement teams should escalate risks for further
consideration.
Australian Taxation Office response: Agreed.
2.17 The ATO will ensure guidance material includes directions for engaging cyber security
specialists, to improve the quality of risk assessments. This will help inform cyber security risks and
mandatory PSPF cyber security requirements in procurements.
Department of Foreign Affairs and Trade response: Agreed.
2.18 The department agrees to the recommendation and has already taken steps in line with
this recommendation to improve processes. This includes the implementation of the new
enterprise Procurement Policy in early 2022 which embeds the consideration of cyber security risks
during procurements, in accordance with PSPF policies 6 and 10, as well as the introduction of the
revised Cyber Security Supply Chain Policy in 2021. Additional policy and process improvements
will be implemented to further address this recommendation.
33
ATO is the only entity that has arrangements for monitoring performance against mandatory
PSPF cyber security requirements. However, the ATO has not detailed how non-compliance
with mandatory PSPF cyber security requirements is to be managed.
2.19 A contract is a legally enforceable document between two or more parties. The contract
specifies each party’s rights and obligations in performance of that contract. It is important that
contracts are effectively managed to achieve security outcomes. Ineffective contracting
arrangements can lead to increased risks to people, information, and assets. The specification of
relevant security terms and conditions supports the effective management of security outcomes
and ensures that security requirements are legally enforceable.
2.20 The ANAO reviewed entities’ processes and procedures to assess whether the Policy 6
requirements had been clearly defined and addressed. Policy 6 requires contracted providers to
protect Australian Government information resources in the same manner as the procuring entity.
This can be achieved by implementing contracting arrangements that:
• include cyber security terms and conditions as part of procurement and contract
management documents;
• have defined the roles and responsibilities for managing cyber security requirements
within contracts;
• have appropriate procedures to assess and manage cyber security incidents arising from
the selected contracted providers; and
• have appropriate procedures for managing performance against the contract
requirements relating to PSPF requirements.
2.21 The results of the review for each audited entity are summarised in Table 2.2.
34
Managing cyber security risks in procurements
35
• management and monitoring against malicious software (malware) and viruses43;
• system security accreditation requirements; and
• compliance reporting against ATO’s security requirements.
2.25 In addition to including cyber security terms and conditions within procurement and
contract management guidance, Policy 6 requires entities to perform ongoing assessments of
contract conditions to ensure protective security requirements address identified cyber security
risks. These assessments include monitoring and reviewing risks when changes are required to the
provision of goods and services.
2.26 All three entities require risks to be documented within a risk management plan prior to
agreement of the contract, including when a risk review is required before issuing any contract
variation. The ANAO reviewed the selected contracts and associated variations relating to cyber
security. None of the entities had risk management plans, nor evidence of their risk assessments
and considerations of mandatory PSPF cyber security requirements prior to issuing of contract
variations.
2.27 AFP and DFAT have not reviewed nor updated their selected contracts in relation to changes
in the mandatory PSPF cyber security requirements. Contract variations that occurred between
2018 and 2022 did not consider the mandatory PSPF cyber security requirements.44 ATO made
several variations against its selected contract which related to changes in the mandatory PSPF
cyber security requirements.
2.28 DXC maintains a risk register, which it is required to report to the ATO, to support regular
monitoring of risks and associated controls. The risk register specifies the risks and controls that
need to be managed by the contracted provider as part of the contract. Although the selected
contract required the contracted provider to comply with all PSPF and ISM controls, the risk
registers only specified some mandatory PSPF cyber security requirements. ATO did not document
its consideration of all mandatory PSPF cyber security requirements during the risk assessment
process.
43 Malware is software that cybercriminals use to harm your computer system or network.
44 The CPRs were updated in 2018 to include the requirement for security risks to be considered as part of
procurements.
36
Managing cyber security risks in procurements
2.30 None of the entities’ procurement and contract management processes required
procurement and contract management teams to consult with cyber security specialists during
procurement and contract development processes. Further, where the cyber security specialists
were not engaged, the decision and reasons for not engaging the cyber security specialists were not
recorded.
2.31 The ANAO reviewed the contract management processes supporting the selected contracts.
AFP and DFAT have contract management plans specific to the selected contracts, which outlined
roles and responsibilities for both the entity and contracted provider. ATO applies a generic contract
management plan to all ICT contracts and contracted providers.
2.32 ATO’s generic contract management plan describes contract management processes and
requirements that are applicable across multiple service providers. Given the generic nature of the
plan, it only specified the critical contract management roles for managing a contract and did not
specify who in the ATO or contracted provider is responsible for managing risks relating to a specific
contract.
2.33 A February 2021 ATO internal audit report on vendor management identified similar
concerns with contract management plans not specifying details on how contracts will be managed
over the contract period. ATO advised the ANAO that a specific DXC contract management plan is
still being drafted as of June 2022.
Incident management
2.34 Oversight of incidents through timely and thorough reporting allows entities to adjust
security practices and contract conditions to mitigate cyber security risks. It is important that
entities include such contract terms and conditions to ensure that service providers notify entities
of actual or suspected cyber security incidents, especially if the incident affects the delivery of goods
or services stated in the contracts.
2.35 All three entities have a process for managing a range of security incidents, which is
supported by procedures for handling most common cyber security risks and issues. Contracted
providers are required to report incidents using entity specific security incident management
processes, including contacting the relevant security teams for assistance with assessing suspected
or actual incidents.
2.36 All three entities hold monthly contracted provider discussions. Contracted providers are
required to report on security incidents as part of monthly reporting requirements. This reporting
includes details of the incidents, such as the priority and impact, affected systems and users, and
whether service level agreements were met.
2.37 A review of the selected contracts identified terms and conditions for reporting security
incidents, including roles and responsibilities, timeframes, reporting requirements, and the
provision of data, such as security event logs. The ANAO noted that the monthly reporting was
focussed on operational and service delivery risks, rather than security risks.
Performance management
2.38 Contract arrangements that include ongoing assessments of compliance with contract
security conditions will help ensure that vendors are adhering to essential security requirements
37
within contracts. This ongoing oversight and management is important given the constantly
changing security risks and environment.
2.39 All three entities have regular contracted provider meetings that discuss performance
against contract terms and conditions, including key performance indicators and measures. AFP
and DFAT selected contracts specified requirements for contracted providers to comply with PSPF
and entity internal policy requirements. AFP and DFAT do not monitor performance against the
PSPF and entity internal policy requirements, including mandatory PSPF cyber security
requirements. Consequently, Hitachi and Telstra do not report on their implementation and
performance against PSPF, entity internal policy requirements and mandatory PSPF cyber security
requirements.
2.40 ATO specified contract terms and conditions relating to the mandatory PSPF cyber security
requirements, and monitored performance through the following mechanisms:
• monthly contracted provider meetings, included a review of cyber security risks and some
of the controls relating to mandatory PSPF cyber security requirements;
• an annual independent Infosec Registered Assessors Program (IRAP) assessment for the
systems it supports within the contract45; and
• ATO Cyber Governance and Operations (CGO) quarterly assurance audits assess and
require input from contracted providers on implementation and performance against the
Essential Eight mitigation strategies.
2.41 Although the ATO has mechanisms in place, it has not detailed how non-compliance with
mandatory PSPF cyber security requirements is to be managed.
38
Managing cyber security risks in procurements
2.42 Security environments and risks constantly change, and sound contract management
arrangements can help ensure adherence to security requirements within contracts. Contract
management arrangements that include continuous evaluation of compliance against contract
requirements can provide a flexible approach to managing contracts. It allows protective measures
to be adjusted based on changes in the environment and risks. Policy 6 requires accountable
authorities to continuously evaluate compliance against contract conditions and terminate
contracts if the contracted provider fails to comply with contract provisions.
2.43 The ANAO reviewed entity procedures and processes to assess whether the Policy 6
requirements had been clearly defined and addressed. Policy 6 requires contracting arrangements
to:
• establish performance measures and service level agreements to assess contractor
performance; and
• have appropriate procedures for managing compliance against the contract requirements.
2.44 The results of the review for each audited entity are summarised in Table 2.3.
Table 2.3: Entities’ management of contracted provider compliance with relevant PSPF
requirementsa
Process Entity Self-Assessment ANAO Analysis
Component
AFP ATO DFAT AFP ATO DFAT
Service Level
Agreements ● ● ● ◑ ◑ ◑
● ● ● ◑ ◕ ◑
Compliance and
Assurance
Activities
Key:
Ad hoc
◑ Partial or basic implementation and management of PSPF mandatory and supporting
requirements.
Developing
◕ Substantial, but not fully effective implementation and management of PSPF mandatory and
supporting requirements.
Managing
● Complete and effective implementation and management of PSPF mandatory and
supporting requirements.
Embedded Comprehensive and effective implementation and proactive management of PSPF
mandatory and supporting requirements and excelling at implementation of better-practice
guidance.
Note a: The ‘Entity Self-Assessment’ rating is the entity reported PSPF maturity level for the entities’ overall
environment. The ‘ANAO analysis’ assessment maturity level rating only relates to processes for managing
cyber security risk.
Source: ANAO analysis.
39
Service level agreements
2.45 The specification of important security considerations should be documented in the
contract and service level agreements. This ensures that the security considerations are verifiable
and enforceable.46
2.46 As described in paragraph 2.23, all three entities specify security requirements as broad
contract obligations, such as requiring contracted providers to adhere to the PSPF, ISM and entities’
internal policies. None of the selected contracts had service level agreements (SLAs) and key
performance indicators (KPIs) relating to measuring adherence to the mandatory PSPF cyber
security requirements. The SLAs and KPIs were focussed on the management of services, such as
maintenance activities and availability of systems. There was limited performance information on
adherence to PSPF, ISM and entities’ internal policy requirements.
46 Australian Cyber Security Centre, Protecting Against Cyber Threats to Managed Service Providers and their
Customers [Internet], ASD, 2022, available from https://www.cyber.gov.au/acsc/view-all-
content/advisories/protecting-against-cyber-threats-managed-service-providers-and-their-customers
[accessed 3 August 2022].
47 As per paragraph 2.27, ATO did not document the consideration of all mandatory PSPF cyber security
requirements.
40
Managing cyber security risks in procurements
2.51 None of the audited entities have processes for verifying the completeness and accuracy of
performance information provided by contracted providers. All three entities rely on discussions
with contracted providers to confirm their understanding and robustness of performance
information. Entities do not have set processes to ensure information is complete and accurate,
such as verification against independent information sources or application of contracted providers’
quality assurance processes.
2.52 AFP and DFAT have not assessed contracted provider compliance with relevant PSPF
requirements since the initiation of those contracts. Without appropriate contract terms and
conditions, and processes for verifying performance information, compliance with mandatory PSPF
cyber security requirements cannot be accurately assessed and enforced.
Recommendation no. 2
2.53 Australian Federal Police, Australian Taxation Office and Department of Foreign Affairs
and Trade should implement processes for verifying the reliability of performance information
and managing non-compliance by contracted providers against the PSPF, ISM and entity internal
policy requirements, including establishing performance measures focussed on compliance
against PSPF, ISM and entity internal policy requirements.
Australian Federal Police response: Agreed.
2.54 The AFP agrees to improve internal information security policy pertaining to the oversight
of vendors.
2.55 The AFP agrees to improve monitoring of security controls via the inclusion of relevant
performance measures surrounding vendor security obligations and that relevant reporting
mechanisms are specified.
Australian Taxation Office response: Agreed.
2.56 The ATO will ensure reliability of performance information is verified and performance
measures focus on compliance against PSPF, ISM and entity internal policy requirements.
Department of Foreign Affairs and Trade response: Agreed.
2.57 DFAT agrees to the recommendation and will establish a framework that supports the
review and management of contracted ICT provider performance and non-compliance.
41
3. Compliance with Protective Security Policy
Framework requirements
Areas examined
This chapter examines whether the selected entities have established effective arrangements to
manage compliance of their contracted providers with the Protective Security Policy Framework
(PSPF) requirements for cyber security.
Conclusion
Australian Federal Police (AFP) and Department of Foreign Affairs and Trade (DFAT) do not
manage compliance of contracted providers with the PSPF requirements for cyber security.
Australian Taxation Office (ATO) had largely established arrangements to manage compliance of
their contracted providers with limited assurance over reporting and methods of enforcement of
the PSPF requirements for cyber security.
Areas for improvement
The ANAO made the following recommendations aimed at:
• Australian Federal Police and Department of Foreign Affairs and Trade specifying
requirements for the implementation and monitoring of the mandatory Protective Security
Policy Framework cyber security requirements in contractual arrangements;
• Australian Federal Police and Department of Foreign Affairs and Trade establishing periodic
assessments of security terms and conditions of their contracts to address associated cyber
security risks;
• Australian Federal Police and Department of Foreign Affairs and Trade specifying
requirements relating to reporting performance against relevant cyber security and entity
policy requirements in contractual arrangements; and
• all three entities improving processes for verifying cyber security related performance
information provided by contracted providers.
3.1 The PSPF Policy 6: Security governance for contracted goods and service providers (Policy 6)
requires entities to establish measures for ongoing management of protective security within
contracts (see Box 1). These measures must ensure contracted providers implement, operate and
maintain security controls in accordance with contract terms and conditions, including complying
with relevant PSPF cyber security requirements. Ongoing monitoring supported by appropriate
performance measures and reliable performance information helps ensure that goods and services
are delivered in accordance with contract terms and conditions.
3.2 The PSPF Policy 10: Safeguarding data from cyber threats (Policy 10) sets the mandatory
cyber security requirements for non-corporate Commonwealth Entities (see Box 3). As discussed in
paragraph 1.31, Policy 6 requires contracted providers who provide goods and services related to
managing Australian Government information to implement, operate and maintain security
controls relevant to mandatory PSPF cyber security requirements.
3.3 This chapter examines if the goods and services delivered by the contracted providers of the
three audited entities were compliant with the requirements detailed in the Policy 10 of the PSPF.
42
Compliance with Protective Security Policy Framework requirements
This examination includes the assessment of the implementation of relevant cyber security controls
by contracted providers and the entities’ arrangements for managing and verifying contracted
provider compliance with mandatory PSPF cyber security requirements.
3.4 Where services have been outsourced to a contracted provider, entities are accountable for
ensuring that the services delivered are aligned with those that were procured. Entities are also
accountable for ensuring that the goods and services delivered by the contracted provider are
compliant with relevant policies, including the Protective Security Policy Framework (PSPF).
3.5 To achieve full implementation for each of the Top Four mitigation strategies under Policy
10, entities were required to implement the ‘Maturity Level Three’ requirements set by the
Australian Signals Directorate’s Australian Cyber Security Centre (ACSC).48 As outlined in Table 1.3,
the ACSC defines ‘Maturity Level Three’ as ‘fully aligned with the intent of the mitigation strategy’.
To reach ‘Maturity Level Three’ for each of the Top Four, entities are required to49:
• implement application control on all workstations and servers to restrict execution of
unapproved or malicious programs and implement Microsoft’s latest recommended block
rules to prevent application control bypasses50;
• patch security vulnerabilities assessed as extreme risks in applications and operating
systems within 48 hours from vendor release, including using an automated mechanism
to confirm and record that patches have been installed, and update or replace
unsupported applications and operating systems51; and
43
• restrict administrative access to the level required for personnel to undertake their duties,
including regularly validating the requirement for such access and preventing privileged
users from accessing email and the Internet.52
3.6 The ANAO reviewed the implementation of relevant PSPF requirements against the cyber
security related services and systems within the selected contracts. The relevant services provided
by the selected contracted providers has been described in Table 1.6. The contracted providers’
implementation of the Top Four mitigation strategies, as assessed by the ANAO, is presented in
Table 3.1 below.
Table 3.1: Top Four mitigation strategy implementationa
Top Four Entity Self-Assessmentb ANAO Analysis
AFP ATO DFAT AFP ATO DFAT
Application
control
N/A ◕ N/A N/A ● N/A
Patching
applications ◕ N/A N/A ◑ N/A N/A
◕ ◕ ◕ ● ● ◑
Patching
operating
systems
◕ ●
Restricting
administrative N/A N/A N/A N/A
privileges
Key:
Ad hoc
◑ Partial or basic implementation and management of PSPF mandatory and supporting
requirements.
Developing
◕ Substantial, but not fully effective implementation and management of PSPF mandatory and
supporting requirements.
Managing
● Complete and effective implementation and management of PSPF mandatory and supporting
requirements.
Embedded Comprehensive and effective implementation and proactive management of PSPF
mandatory and supporting requirements and excelling at implementation of better-practice
guidance.
Note a: The ‘Not Applicable’ (N/A) specifies the mitigation strategies that are not relevant to the nature of the contract.
The assessment was limited to mitigation strategies that were relevant to the nature of the contracts.
Note b: The ‘Entity Self-Assessment’ rating is the entity reported PSPF maturity level for the entities’ overall
environment. The ‘ANAO analysis’ assessment maturity level rating only relates to the selected contract.
Source: ANAO assessment contracted providers’ Top Four mitigation strategy implementation.
Application controls
3.7 Of the three entities, application controls are applicable to ATO’s contract with DXC. ATO’s
application control strategy requires the approval of application control policies prior to their
implementation by DXC in accordance with ATO’s change management policies and procedures. The
52 Privileged users are a subset of users that can change or bypass a system’s security controls. Restricting
administrative privileges and monitoring privileged users can prevent or limit an adversary from accessing
systems following a cyber intrusion.
44
Compliance with Protective Security Policy Framework requirements
ANAO assessed that DXC had implemented ATO’s policy and procedural requirements for application
control.
3.8 AFP manages the implementation of application control policies and monitoring of
associated security events directly, while application controls are not relevant to the services Telstra
provides to DFAT.53
Patching applications
3.9 Application patching requirements and relevance varied by entity. As specified in Table 1.6,
application controls are not relevant to the services provided by Telstra to DFAT and, as a result,
the ANAO did not assess Telstra’s compliance with application patching requirements.
3.10 The ANAO assessed all applications installed on a sample of servers managed by Hitachi and
identified that required patching timeframes and Policy 10 requirements were not always met.
Issues identified included:
• delays in patching vendor-supported applications of up to 11 months, which exceeds
required timeframes; and
• the presence of applications that were no longer vendor-supported and required to be
removed by Policy 10, and correspondingly had not been updated in several years.
3.11 The above issues related to applications managed by AFP on servers managed by Hitachi.
3.12 Although Hitachi had met requirements for patching applications, the ANAO assessed that
AFP had not established processes for ensuring that requirements for patching applications on
Hitachi managed servers were met. AFP did not obtain performance reporting relating to patching
applications on Hitachi managed servers and was not aware of the issues on the sampled servers.
3.13 ATO has a patch management process for applications with patching timeframes aligned
with ISM requirements. Contracted providers are responsible for deploying ATO-approved patches
in accordance with ATO’s patching and change management processes.
53 The infrastructure used by Telstra to provide communications services to DFAT does not support the
execution of a variety of applications as a general-purpose computer might.
45
years. Telstra did not perform a risk assessment and did not receive authorisation from DFAT to
cease the installation of the operating system updates. DFAT do not receive performance reporting
related to patch management for Telstra devices and has not established processes for monitoring
Telstra’s performance against its patch management standards and the PSPF.
3.17 The ANAO assessed that DFAT and Telstra had not implemented the requirements for
patching operating systems.
3.20 The Australian Signals Directorate’s Australian Cyber Security Centre (ACSC) highlights the
importance of government agencies managing cyber supply chains and has reported a significant
increase in malicious cyber activities against contractors holding government information.54 The
ACSC recommends that all Australian organisations prioritise the implementation of the Essential
Eight Maturity Model, including assessing their own network and evaluating risks associated with
cyber supply chains.
3.21 The Protective Security Policy Framework (PSPF) Policy 6: Security governance for
contracted goods and service providers (Policy 6) recommends entities establish robust governance
and assurance process so contracted providers implement applicable protective security
requirements. The PSPF recommends that non-corporate Commonwealth entities (NCEs) include
contract requirements that require contracted providers to perform periodic reviews of security
54 Australian Cyber Security Centre, Cyber Security for Contractors [Internet], ASD, 2021, available from
https://www.cyber.gov.au/sites/default/files/2021-10/PROTECT%20-
%20Cyber%20Security%20for%20Contractors%20%28October%202021%29.pdf [accessed 21 September
2022].
46
Compliance with Protective Security Policy Framework requirements
arrangements under the contract to ensure the arrangements are current and address risks and
security environments.
3.22 The ANAO reviewed entity procedures and processes to assess whether the Policy 6
requirements had been clearly defined and addressed. Policy 6 requires procedures and processes
for monitoring performance of security controls to:
• specify contract terms and conditions requiring the monitoring of relevant PSPF
requirements by contracted providers;
• have guidance and support mechanisms to assist contracted provider monitoring and
reporting;
• have mechanisms for contracted providers to raise concerns with monitoring the
performance of security controls for relevant PSPF requirements; and,
• establish effective arrangements for contracted providers to report on the performance
of relevant provisions of PSPF and Information Security Manual (ISM).
Table 3.2: Arrangements for monitoring security controls for relevant PSPF
requirementsa
Process Component Entity Self-Assessment ANAO Analysis
AFP ATO DFAT AFP ATO DFAT
● ● ● ◑ ◕ ◑
Contract terms and
conditions for monitoring
security controls
Guidance and Support ● ● ● ◕ ● ◑
Issue Management ● ● ● ◑ ● ◑
Performance Reporting ● ● ● ◑ ● ◑
Key:
Ad hoc
◑ Partial or basic implementation and management of PSPF mandatory and supporting
requirements.
Developing
◕ Substantial, but not fully effective implementation and management of PSPF mandatory and
supporting requirements.
Managing
● Complete and effective implementation and management of PSPF mandatory and supporting
requirements.
Embedded Comprehensive and effective implementation and proactive management of PSPF
mandatory and supporting requirements and excelling at implementation of better-practice
guidance.
Note a: The ‘Entity Self-Assessment’ rating is the entity reported PSPF maturity level for the entities’ overall
environment. The ‘ANAO analysis’ assessment maturity level rating only relates to the selected contract.
Source: ANAO analysis.
47
conditions for specific PSPF cyber security requirements and advised the ANAO that it took this
approach to ensure a flexible approach to the contract and its management. ATO established
agreed upon procedures with DXC that specify the timeframes for patching, and monitoring and
reporting requirements. ATO has not specified terms and conditions for managing non-compliance
against the broad contract clauses and the agreed upon procedures.
3.24 AFP and DFAT also have broad clauses requiring contracted providers to provide goods and
services in accordance with PSPF and entity internal policies. AFP and DFAT do not monitor
contracted provider performance against the PSPF and entity internal policies.
3.25 Policy 6 requires entities to periodically assess the effectiveness of its security terms and
conditions included in the contract to ensure cyber security risks are being addressed. As described
in paragraph 2.27, of the audited entities, ATO has assessed the effectiveness of their contracts in
addressing associated cyber security risks.
Recommendation no. 3
3.26 To improve monitoring of security controls:
(a) Australian Federal Police and Department of Foreign Affairs and Trade specify
requirements relating to the implementation and monitoring of the mandatory
Protective Security Policy Framework cyber security requirements in contractual
arrangements; and
(b) Australian Federal Police and Department of Foreign Affairs and Trade establish periodic
assessments of security terms and conditions of their contracts to address associated
cyber security risks.
Australian Federal Police response: Agreed, agreed in part.
3.27 The AFP agrees to improve monitoring of security controls via the inclusion of relevant
performance measures surrounding vendor security obligations and that relevant reporting
mechanisms are specified.
3.28 The AFP agrees to improve internal information security policy pertaining to the oversight
of vendors.
Department of Foreign Affairs and Trade response: Agreed.
3.29 DFAT agrees to the recommendation. The department will implement a program of
routine reviews to ensure model security contract clauses used for ICT procurements remain
compliant and address cyber risks appropriately.
48
Compliance with Protective Security Policy Framework requirements
3.31 No guidance was provided by DFAT to Telstra regarding monitoring of cyber security
controls.
Issue management
3.32 AFP and DFAT have arrangements by which contracted providers could raise issues relating
to security controls. As described in paragraphs 3.12 and 3.16, the ANAO did not observe that any
issues were raised by the contracted providers. AFP and DFAT do not monitor contracted provider
performance against mandatory PSPF cyber security requirements.
3.33 ATO and DXC have an effective process by which issues can be raised and managed. DXC
perform annual assessments of ATO’s environment to assess compliance with relevant ISM
requirements, the results of which are provided to ATO, and remediation activities are monitored
at monthly performance meetings. DXC notifies ATO of issues relating to patching operating
systems, including proposed remediations that could disrupt business operations, with DXC
performing remediation activities after ATO has provided written approval to proceed.
Performance reporting
3.34 ATO receives reporting directly relevant to mandatory PSPF cyber security and ATO’s policy
requirements. DXC provides information on cyber security related activities, such as uplift projects,
incidents, assessments, risks and controls. Monthly, quarterly and yearly performance reports
provide information on cyber security requirements relating to patch management, user access
management and malware protection.
3.35 AFP receives monthly reports from Hitachi however these do not report the implementation
of patch management, nor provide reporting on performance against the PSPF requirements or
AFP’s policies related to cyber security.
3.36 Reports provided by Telstra to DFAT specify the overall performance against terms and
conditions specified in the contract, but do not provide information about compliance with PSPF
cyber security requirements and DFAT policies. Telstra does not provide reporting on the
implementation of patch management on relevant devices.
49
Recommendation no. 4
3.37 Australian Federal Police and Department of Foreign Affairs and Trade specify
requirements relating to reporting performance against relevant cyber security and entity policy
requirements in contractual arrangements.
Australian Federal Police response: Agreed in part.
3.38 The AFP agrees to improve procurement arrangements to ensure that contracts more
clearly articulate vendor PSPF obligations.
3.39 The AFP agrees to improve internal information security policy pertaining to the oversight
of vendors.
Department of Foreign Affairs and Trade response: Agreed.
3.40 DFAT agrees to develop model clauses and/or requirements to be specified in contractual
agreements with providers of ICT goods and/or services to ensure the department receives
performance reporting against cyber security and entity policy requirements.
3.41 The department will uplift model clauses and/requirements in new procurement activities,
taking into consideration limitations that may be introduced by Whole of Government (WofG)
Head Agreements that the department is required to utilise.
3.42 The Protective Security Policy Framework (PSPF) requires non-corporate Commonwealth
entities (NCEs) to put in place measures for ensuring security controls included in the contract are
implemented, operated and maintained by the contracted provider. The Australian Signals
Directorate’s Australian Cyber Security Centre (ACSC) advises that it is important for entities to gain
independent assurances of the security posture of contracted providers.55 The accuracy of the
information used to support such assurances is important to allow entities to allocate resources to
areas of impact and priority.
55 Australian Cyber Security Centre, Cyber Supply Chain Risk Management [Internet].
50
Compliance with Protective Security Policy Framework requirements
3.43 The ANAO has conducted a series of audits of cyber security and identified ongoing low
levels of cyber resilience of NCEs, inaccurate assessments and high rates of non-compliance with
the Top Four mitigation strategies mandated by Policy 10.
3.44 The ANAO reviewed entity procedures and processes to assess whether the Policy 6
requirements had been clearly defined and addressed including, whether entities have established
compliance and assurance mechanisms to ensure the accuracy of performance information to
support the management of performance.
Table 3.3: Arrangements for accurate performance reportinga
Process Entity Self-Assessmentb ANAO Analysis
Component
AFP ATO DFAT AFP ATO DFAT
Compliance
and assurance ● ● ● ◑ ◕ ◑
Performance
management ● ● ● ◑ ◕ ◑
Key:
Ad hoc
◑ Partial or basic implementation and management of PSPF mandatory and supporting
requirements.
Developing
◕ Substantial, but not fully effective implementation and management of PSPF mandatory and
supporting requirements.
Managing
● Complete and effective implementation and management of PSPF mandatory and supporting
requirements.
Embedded Comprehensive and effective implementation and proactive management of PSPF
mandatory and supporting requirements and excelling at implementation of better-practice
guidance.
Note a: The assessment was limited to mitigation strategies that were relevant to the nature of the contracts.
Note b: The ‘Entity Self-Assessment’ rating is the entity reported PSPF maturity level for the entities’ overall
environment. The ‘ANAO analysis’ assessment maturity level rating only relates to the selected contract.
Source: ANAO analysis.
51
Recommendation no. 5
3.46 To improve quality of performance reporting:
(a) Australian Federal Police and Department of Foreign Affairs and Trade establish a
performance framework supporting Recommendation 4, including validating the
accuracy of performance reporting provided by contracted providers in relation to cyber
security; and
(b) Australian Taxation Office improve processes for verifying performance information
provided by contracted providers, including documenting verification activities.
Australian Federal Police response: Agreed in part.
3.47 The AFP agrees to improve internal information security policy pertaining to the oversight
of vendors.
3.48 The AFP agrees to improve monitoring of security controls via the inclusion of relevant
performance measures surrounding vendor security obligations and that relevant reporting
mechanisms are specified.
3.49 The AFP agrees to improve procurement arrangements to ensure that contracts more
clearly articulate vendor PSPF obligations.
Australian Taxation Office response: Agreed.
3.50 The ATO will improve the quality of performance reporting for verifying performance
information provided by contracted providers, and documenting verification activities.
Department of Foreign Affairs and Trade response: Agreed.
3.51 DFAT agrees to include contractual performance parameters in relation to cyber security
within all new ICT procurement activities, taking into consideration potential limitations in WofG
procurement arrangements and head agreements.
3.52 To support Recommendations 2 and 4, DFAT will ensure contract management plans for
new procurements will include routine engagement of internal cyber security specialists to
validate performance reporting against these requirements.
3.53 AFP and DFAT advised the ANAO that their Cyber Security Operations Centres (CSOC)
manage cyber security risks and monitor security events, including those relating to contracted
providers. Both CSOCs monitor activity performed by contracted providers and scan for
vulnerabilities within entity systems. Neither CSOC identified the issues discussed in paragraphs
3.10 and 3.16.
Performance management
3.54 As discussed in paragraph 2.47, all three entities have established mechanisms within
contracts to address deviations in expected performance, including financial penalties,
performance, and service credits, but these mechanisms did not cover cyber security risks or
52
Compliance with Protective Security Policy Framework requirements
controls.56 AFP has not applied penalties or credits since the award of the Hitachi contract. In 2019
ATO received service credits from DXC due to risk management requirements not being met and
DFAT received service credits from Telstra due to distributed denial of service requirements not
being met.
3.55 As described in paragraphs 3.10 and 3.16, the ANAO assessed the patch management
processes of AFP and DFAT as not meeting PSPF and entity policy requirements. Neither entity
monitors patch management processes of their contracted provider, nor has patch management
been identified as a contractual performance issue.
3.56 AFP advised the ANAO that its patch management standards are predominantly focussed
on systems managed by AFP and not by contracted providers, and that as the standards do not
consider external factors that may exist for contracted providers, AFP has made a business decision
not to apply those standards to its contracted providers. AFP did not document the risk assessment
associated with the business decision. AFP further advised ANAO that it uses longer patching
timeframes than those specified in the PSPF and ACSC Essential Eight to ensure the published
patches are operating effectively, and because it would prefer to wait to apply a single security
patch than a series of patches that may not resolve the security risk.
3.57 No security reports, or reports of security incidents, have been provided to DFAT since the
start of the Telstra contract. DFAT stated in one instance it needed to contact Telstra to obtain
information on a known security vulnerability, which was not initially reported by Telstra.
56 For example, penalties related to availability or service quality requirements, but did not include non-
compliance against relevant mandatory PSPF cyber security and department security policy requirements.
53
Appendices
55
Appendix 1 Entity responses
56
Appendix 1
57
ANAO comment on Australian Federal Police response
(a) Paragraph 1.11 outlines non-corporate Commonwealth Entities’ responsibilities for
security risks from procuring goods and services, including ensuring contracted providers
comply with relevant Protective Security Policy Framework (PSPF) requirements.
(b) As discussed in paragraph 2.39, 2.46, 2.47, 3.12 and 3.24, AFP requires contracted vendors
to comply with PSPF and internal policy requirements but does not monitor performance
against those requirements. These requirements include mandatory PSPF cyber security
requirements. As discussed, in paragraph 3.31. AFP did not provide guidance to contracted
providers on how to report compliance against PSPF and entity security policy
requirements.
(c) Paragraph 2.11 outlines AFP’s approach to identifying and managing ICT procurement
risks. AFP does not provide sufficient guidance to assist with the consideration of cyber
security risks and mandatory PSPF cyber security requirements within risk assessments.
As discussed in paragraphs 2.50 to 2.52 and 3.45, AFP does not verify the reliability of
performance information nor does it receive information relating to cyber security. AFP
does not assess or monitor contracted provider compliance against relevant PSPF
requirements and AFP's internal policies. AFP's response does not address these
deficiencies.
58
Appendix 1
59
Auditor-General Report No. 9 2022–23
Management of Cyber Security Supply Chain Risks
60
Appendix 1
61
Appendix 2 Improvements observed by the ANAO
1. The existence of independent external audit, and the accompanying potential for scrutiny
improves performance. Improvements in administrative and management practices usually
occur: in anticipation of ANAO audit activity; during an audit engagement; as interim findings are
made; and/or after the audit has been completed and formal findings are communicated.
2. The Joint Committee of Public Accounts and Audit (JCPAA) has encouraged the ANAO to
consider ways in which the ANAO could capture and describe some of these impacts. The ANAO’s
2021–22 Corporate Plan states that the ANAO’ s annual performance statements will provide a
narrative that will consider, amongst other matters, analysis of key improvements made by
entities during a performance audit process based on information included in tabled performance
audit reports.
3. Performance audits involve close engagement between the ANAO and the audited entity
as well as other stakeholders involved in the program or activity being audited. Throughout the
audit engagement, the ANAO outlines to the entity the preliminary audit findings, conclusions
and potential audit recommendations. This ensures that final recommendations are appropriately
targeted and encourages entities to take early remedial action on any identified matters during
the course of an audit. Remedial actions entities may take during the audit include:
• strengthening governance arrangements;
• introducing or revising policies, strategies, guidelines or administrative processes; and
• initiating reviews or investigations.
4. In this context, the below actions were observed by the ANAO during the course of the
audit. It is not clear whether these actions and/or the timing of these actions were planned in
response to proposed or actual audit activity. The ANAO has not sought to obtain assurance over
the source of these actions or whether they have been appropriately implemented.
62
Appendix 2
63
Appendix 3 Policy 10 and Essential Eight Maturity Model Timeline
1. The diagram describes the history of the Protective Security Policy Framework (PSPF)
Policy 10 (Policy 10) and Essential Eight Maturity Model. The applicable mandatory PSPF cyber
security requirements for this audit is the November 2019 version of the Policy 10 requirements
(see Box 3). The November 2019 Policy 10 requirements were applicable to non-corporate
Commonwealth Entities (NCEs) during the planning of this audit in September 2021. The July 2021
Essential Eight Maturity Model changes were not mandated in Policy 10 until March 2022 and not
required to be implemented by NCEs until July 2022.
64
Figure A.1 Key changes in Protective Security Policy Framework Policy 10 and Essential Eight Maturity Model
July 2021
June 2017
Essential Eight Maturity Model includes
Essential Eight Maturity Model November 2019
April 2013 Maturity Level Zero
developed Policy 10 requirement to consider
Policy 10 mandated Top Four and baselines Maturity Level Two
Mitigation Strategies all of the mitigation strategies
2014 2015 2016 2017 2018 2019 2020 2021 2022 2023
Audit Period
Source: ANAO analysis of PSPF Policy 10 and the Essential Eight Maturity Model.