Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Management of Cyber Security Supply Chain Risks

Download as pdf or txt
Download as pdf or txt
You are on page 1of 65

The Auditor-General

Auditor-General Report No. 9 2022–23


Performance Audit

Management of Cyber Security Supply Chain Risks

Australian Federal Police


Australian Taxation Office
Department of Foreign Affairs and Trade

Australian National Audit Office


© Commonwealth of Australia 2022
ISSN 1036–7632 (Print)
ISSN 2203–0352 (Online)
ISBN 978-1-76033-781-0 (Print)
ISBN 978-1-76033-782-7 (Online)
Except for the content in this document supplied by third parties, the Australian National
Audit Office logo, the Commonwealth Coat of Arms, and any material protected by a trade
mark, this document is licensed by the Australian National Audit Office for use under the
terms of a Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 Australia licence.
To view a copy of this licence, visit http://creativecommons.org/licenses/by-nc-nd/3.0/au/.
You are free to copy and communicate the document in its current form for non-commercial
purposes, as long as you attribute the document to the Australian National Audit Office and
abide by the other licence terms. You may not alter or adapt the work in any way.
Permission to use material for which the copyright is owned by a third party must be sought
from the relevant copyright owner. As far as practicable, such material will be clearly labelled.
For terms of use of the Commonwealth Coat of Arms, visit the It’s an Honour website at
https://www.pmc.gov.au/government/its-honour.
Requests and inquiries concerning reproduction and rights should be addressed to:
Senior Executive Director
Corporate Management Group
Australian National Audit Office
GPO Box 707
Canberra ACT 2601
Or via email:
communication@anao.gov.au.

Auditor-General Report No. 9 2022–23


Management of Cyber Security Supply Chain Risks

2
Canberra ACT
14 December 2022

Dear Mr Speaker
Dear President

In accordance with the authority contained in the Auditor-General Act 1997, I have
undertaken an independent performance audit in the Australian Federal Police, the
Australian Taxation Office, and the Department of Foreign Affairs and Trade. The report
is titled Management of Cyber Security Supply Chain Risks. Pursuant to Senate Standing
Order 166 relating to the presentation of documents when the Senate is not sitting, I
present the report of this audit to the Parliament.

Following its presentation and receipt, the report will be placed on the Australian National
Audit Office’s website — http://www.anao.gov.au.

Yours sincerely

Grant Hehir
Auditor-General

The Honourable the President of the Senate


The Honourable the Speaker of the House of Representatives
Parliament House
Canberra ACT

Auditor-General Report No. 9 2022–23


Management of Cyber Security Supply Chain Risks

3
AUDITING FOR AUSTRALIA
The Auditor-General is head of the
Australian National Audit Office
(ANAO). The ANAO assists the
Auditor-General to carry out his
duties under the Auditor-General
Act 1997 to undertake
performance audits, financial
statement audits and assurance
reviews of Commonwealth public
sector bodies and to provide
independent reports and advice
for the Parliament, the Australian
Government and the community.
The aim is to improve
Commonwealth public sector
administration and accountability.
For further information contact:
Australian National Audit Office
GPO Box 707
Canberra ACT 2601

Phone: (02) 6203 7300


Email: ag1@anao.gov.au
Auditor-General reports and
information about the ANAO are
available on our website:
http://www.anao.gov.au

Audit team
Edwin Apoderado
Benjamin Siddans
Zhiying Wen
Ji-Young Kim
Jason Ralston
David Willis
Stevan Serafimov
Olivia Robbins
Jo Rattray-Wood
Sherry Wang
Xiaoyan Lu
Lesa Craswell

Auditor-General Report No. 9 2022–23


Management of Cyber Security Supply Chain Risks

4
Contents
Summary and recommendations.................................................................................................................... 7
Background ............................................................................................................................................... 7
Conclusion ................................................................................................................................................. 9
Supporting findings .................................................................................................................................. 10
Recommendations ................................................................................................................................... 12
Summaries of entity responses ............................................................................................................... 13
Key messages from this audit for all Australian Government entities .....................................................14
Audit findings.............................................................................................................................................. 17
1. Background ............................................................................................................................................. 18
Introduction .............................................................................................................................................. 18
Protective Security Policy Framework maturity self-assessment model .................................................18
Managing cyber security supply chain risk .............................................................................................. 21
Rationale for undertaking the audit ......................................................................................................... 24
Audit approach ........................................................................................................................................ 25
2. Managing cyber security risks in procurements ...................................................................................... 29
Have entities established an appropriate risk management framework for assessing and
managing procurement cyber security risks?..................................................................................... 29
Have entities established fit-for-purpose contracting arrangements that support the management
of procurement cyber security risks? ................................................................................................. 33
Have entities established fit-for-purpose arrangements for the management of contracted
providers’ compliance with relevant Protective Security Policy Framework requirements? ..............38
3. Compliance with Protective Security Policy Framework requirements ...................................................42
Have cyber security controls been implemented for relevant Protective Security Policy
Framework requirements? ................................................................................................................. 43
Is the performance of security controls for relevant Protective Security Policy Framework
requirements appropriately monitored? ............................................................................................. 46
Is performance of security controls for relevant Protective Security Policy Framework
requirements accurately reported? .................................................................................................... 50
Appendices ................................................................................................................................................. 55
Appendix 1 Entity responses ................................................................................................................. 56
Appendix 2 Improvements observed by the ANAO ............................................................................... 62
Appendix 3 Policy 10 and Essential Eight Maturity Model Timeline ......................................................64

Auditor-General Report No. 9 2022–23


Management of Cyber Security Supply Chain Risks

5
Auditor-General Report No.9 2022–23
Management of Cyber Security Supply Chain Risks

 $14.8 billion committed to Information  The implementation of arrangements by


Communications Technology related goods selected entities for managing cyber
and services in 2021–22 by Australian security risks within procurements and
Government entities. specific contracted providers under the
 Australian Cyber Security Centre (ACSC) has PSPF have not been fully effective.
reported that contractors holding government  ATO has largely effective arrangements for
information had a significant increase in assessing and managing procurement
malicious cyber activities. cyber security risks in accordance with the
 Previous audits identified high rates of non‐ PSPF. AFP and DFAT have partially effective
compliance with mandatory Protective Security arrangements for assessing and managing
Policy Framework (PSPF) cyber security procurement risks related to cyber security
requirements and poor administration of in accordance with the PSPF.
government procurements, including  AFP and DFAT do not manage compliance
monitoring and treatment of non‐compliance of contracted providers with the PSPF
with contractual requirements. requirements for cyber security. ATO had
largely established arrangements to
manage compliance of their contracted
providers with limited assurance over
reporting and methods of enforcement of
the PSPF requirements for cyber security.
 The Commonwealth Procurement Rules, which
govern how entities procure goods and
services, was updated in December 2020 to
include considerations for cyber security risks.
 PSPF Policy 6 and Policy 10 outline the
 There were five recommendations aimed at
mandatory requirements for non-corporate improving management of cyber security
Commonwealth entities to manage cyber risks within procurements and monitoring
security threats arising from contracted goods of contracted provider compliance with
and service providers. security terms and conditions.

51% 72%
of non-corporate Commonwealth entities reported of non-corporate Commonwealth entities reported not
not fully implementing PSPF Policy 6 in 2020–21. fully implementing PSPF Policy 10 in 2020–21.
Summary and recommendations
Background
1. Australian Government entities deliver a wide range of digital services to the community
and hold large volumes of data across their computer networks, some of which is highly sensitive.
Australian Government entities rely on a system of organisations, people, activities, information,
and resources to deliver digital services and to maintain the security of government computer
networks and data. This system can be referred to as an entity’s supply chain.1
2. Cyber security continues to be a risk for all Australian individuals, organisations and
government entities, with over 67,500 cybercrimes being reported to the Australian Signals
Directorate’s Australian Cyber Security Centre (ACSC) in 2020–21 — an increase of 13 per cent
since the previous financial year.2 In addition, ACSC has reported that contractors holding
government information had a significant increase in malicious cyber activities.3 This increases
the cyber security risks arising from an entity’s supply chain as the risks can originate from
suppliers, manufacturers, distributors, and retailers that support products and services used by
the entity. ACSC recommends that all Australian organisations prioritise the implementation of
the Essential Eight Maturity Model (Essential Eight), including knowing their networks and
evaluating risks associated with cyber supply chains.
3. The Attorney-General has established the Protective Security Policy Framework (PSPF) as
Australian Government policy and non-corporate Commonwealth entities (NCEs) subject to the
Public Governance, Performance and Accountability Act 2013 must apply the PSPF.4 PSPF Policy
5: Reporting on security (Policy 5) sets out the maturity self-assessment model for annual PSPF
reporting. The maturity self-assessment model requires entities to assess their security capability
and implementation of the PSPF requirements.5 The PSPF specifies that the ‘Managing’ maturity
level provides the minimum required level of protection of an entity’s people, information and
assets.6
4. Requirements for NCEs to manage cyber security supply chain risks are outlined in PSPF
Policy 6: Security governance for contracted goods and service providers (Policy 6) and the
Commonwealth Procurement Rules (CPRs). The CPRs were updated in December 2020 to include
managing cyber security risks within government procurements and contracts. These are
supported by requirements in PSPF Policy 10: Safeguarding data from cyber threats (Policy 10),
which outlines the mandatory PSPF cyber security requirements. Since April 2013, the PSPF has

1 Australian Cyber Security Centre, Glossary: Supply Chain [Internet], ASD,2020, available from
https://www.cyber.gov.au/acsc/view-all-content/glossary/supply-chain [accessed 19 July 2022].
2 The Australian Cyber Security Centre formally became part of Australian Signals Directorate on 1 July 2018.
3 Australian Cyber Security Centre, ACSC Annual Cyber Threat Report | 1 July 2020 to 30 June 2021 [Internet].
4 Attorney-General’s Department, Applying the Protective Security Policy Framework [Internet], AGD, available
from https://www.protectivesecurity.gov.au/about/applying-protective-security-policy-framework [accessed
19 September 2022].
5 The 16 PSPF policies are across four outcomes: governance, information, personnel and physical. These
outcomes outline the end-state that the government wants to achieve.
6 Attorney-General’s Department, Protective Security Policy Framework | Policy 5: Reporting on security, AGD,
2018, available from https://www.protectivesecurity.gov.au/system/files/2021-06/pspf-policy-5-reporting-
on-security.pdf [accessed 8 August 2022], p. 3.

Auditor-General Report No. 9 2022–23


Management of Cyber Security Supply Chain Risks

7
mandated NCEs implement four of the ACSC’s Essential Eight Maturity Model, known as the Top
Four.7

Rationale for undertaking the audit


5. The ANAO has conducted a series of audits on cyber security and identified ongoing low
levels of cyber resilience in NCEs and high rates of non‐compliance with the Top Four mitigation
strategies. The high-rates of non-compliance continues to be an issue as AGD’s PSPF Assessment
Report 2020–21 indicated 72 per cent of NCEs reported not fully implementing Policy 10
requirements.8 The Top Four mitigation strategies were mandated by the PSPF in 2013. Auditor‐
General Report No. 32 2020–21 Cyber Security Strategies of Non‐Corporate Commonwealth
Entities noted that:
The 2018‐19 PSPF assessment report identified that one of the key challenges faced by the entities
who had not achieved the ‘Managing’ maturity level of Policy 10 was reliance on outsourced
service providers for information communications technology (ICT) and cyber security services,
whereby entities had limited influence or control over the implementation of the mitigation
strategies. 9
6. The limited influence and control over outsourced service providers of information
communications technology (ICT) and cyber security services increases the cyber security risks
arising from an entity’s supply chain. The management of cyber security risks within
procurements continues to be challenging for NCEs with 51 per cent being reported in AGD’s PSPF
Assessment Report 2020–21 as not fully implementing Policy 6.
7. Auditor‐General Report No. 4 2021‐22 Defence’s Contract Administration — Defence
Industry Security Program and Auditor‐General Report No. 6 2021–22 Management of the Civil
Maritime Surveillance Services Contract have further indicated poor administration of
government procurements, including monitoring and treatment of non‐compliance with
contractual requirements. 10
8. The Australian Government has committed $14.8 billion in ICT related goods and services
contracts in 2021–22.11 These commitments indicate the Australian Government’s reliance on
contracted providers for its ICT capabilities. This dependency on contractors for ICT capabilities
and the increase in malicious cyber activities against contractors who hold government
information increases the risks associated with government supply chains.12

7 The Top Four are: application control; patching applications; restricting administrative privilege; and patching
operating systems.
Australian Cyber Security Centre, Essential Eight Maturity Model [Internet], ASD, 2017, available from
https://www.cyber.gov.au/acsc/view-all-content/publications/essential-eight-maturity-model [accessed 18
September 2022].
8 Attorney-General’s Department, Protective Security Policy Framework | Assessment Report 2020–21, p.10.
9 Auditor‐General Report No.32 2020–21 Cyber Security Strategies of Non‐Corporate Commonwealth Entities, p.
70.
10 Auditor‐General Report No.4 2021–22 Defence’s Contract Administration — Defence Industry Security
Program, p. 8; and Auditor‐General Report No.6 2021–22 Management of the Civil Maritime Surveillance
Services Contract, pp. 8-9.
11 These goods and services include 'Information Technology and Telecommunications'; and 'Engineering and
Research and Technology Based Services'.
12 Australian Cyber Security Centre, ACSC Annual Cyber Threat Report | 1 July 2020 to 30 June 2021 [Internet].

Auditor-General Report No. 9 2022–23


Management of Cyber Security Supply Chain Risks

8
Summary and recommendations

9. This audit was identified as a Joint Committee of Public Accounts and Audit (JCPAA)
priority for 2021-22.
10. This audit will examine the effectiveness of the implementation of Policy 6 by selected
NCEs and the effectiveness of selected contracted providers’ compliance with the relevant PSPF
requirements relating to procurement cyber security risks. It will provide Parliament transparency
and insights on the management of procurement cyber security risks.13

Audit objective and criteria


11. The objective of this audit was to examine the effectiveness of selected NCEs’
arrangements for managing cyber security risks within their procurements and specific contracted
providers under the PSPF.
12. To form a conclusion against the audit objective, the ANAO adopted the following two
high-level criteria:
• Have entities established effective arrangements to assess and manage procurement risks
related to cyber security in accordance with the PSPF requirements?
• Have the contracted providers complied with the relevant PSPF requirements?
13. Three NCEs were included in this audit:
• Australian Federal Police (AFP);
• Australian Taxation Office (ATO); and
• Department of Foreign Affairs and Trade (DFAT).

Conclusion
14. The implementation of arrangements by selected entities for managing cyber security
risks within procurements and specific contracted providers under the PSPF have not been fully
effective.
15. ATO has largely effective arrangements for assessing and managing procurement cyber
security risks in accordance with the PSPF. AFP and DFAT have partially effective arrangements
for assessing and managing procurement risks related to cyber security in accordance with the
PSPF.
16. AFP and DFAT do not manage compliance of contracted providers with the PSPF
requirements for cyber security. ATO had largely established arrangements to manage
compliance of their contracted providers with limited assurance over reporting and methods of
enforcement of the PSPF requirements for cyber security.

13 The recommendations from the Auditor‐General Report No.32 2020–21 Cyber Security Strategies of Non‐
Corporate Commonwealth Entities and JCPAA Report 485: Cyber Resilience will be assessed as part of the
2022-23 Auditor-General Implementation of parliamentary committee and Auditor-General recommendations
— Attorney-General’s portfolio performance audit.

Auditor-General Report No. 9 2022–23


Management of Cyber Security Supply Chain Risks

9
Supporting findings
Managing cyber security risks in procurements
17. All three entities have defined roles and responsibilities for managing procurement cyber
security risks. The procurement teams are responsible for identifying, assessing, and managing
cyber security risks within procurements. The entities have cyber security specialists who can
provide advice on cyber security risks associated with a procurement.
18. None of the three entities’ processes required procurement teams to consult with cyber
security specialists when assessing procurement cyber security risks or when considering
mandatory PSPF cyber security requirements. Of the three entities, ATO has processes for
assisting procurement teams with assessing and managing procurement cyber security risks and
consideration of mandatory PSPF cyber security requirements. AFP and DFAT have not
implemented processes for assessing and managing procurement cyber security risks, including
documenting any assessments performed relating to mandatory PSPF cyber security
requirements.
19. All three entities have contract clauses requiring contracted providers to comply with the
PSPF, ACSC’s Information Security Manual (ISM) and the respective entities’ policies. ATO
performs ongoing assessments of its security terms and conditions to ensure protective security
requirements address identified cyber security risks.
20. DFAT and AFP use contract management plans to specify roles and responsibilities for each
contract. ATO has a generic contract management plan that covers ICT contracts and is developing
detailed plans for each contracted provider. ATO’s generic contract management plan does not
detail roles and responsibilities for each ICT contract.
21. All three entities have incident management processes within contracting arrangements.
ATO is the only entity that has arrangements for monitoring performance against mandatory PSPF
cyber security requirements. However, the ATO has not detailed how non-compliance with
mandatory PSPF cyber security requirements is to be managed.
22. All selected contracts required contracted providers to adhere to the PSPF, ISM and entity
internal policy requirements. None of the entities had processes, performance measures and
service level agreements related to managing non-compliance with PSPF, ISM and entity internal
policy requirements. Further, none of the entities had processes for verifying the reliability of
cyber security related performance information provided by contracted providers.
23. AFP and DFAT do not monitor compliance against PSPF, ISM and entity internal policy
requirements for the selected contracts. ATO has established a Cyber Threat Assurance Program
and risk management processes for assessing compliance against mandatory PSPF cyber security
requirements. The assurance program included a quarterly audit of contracted provider
implementation of the Top Four mitigation strategies. The risk management processes included
the use of risk registers to monitor the implementation of some mandatory PSPF cyber security
controls and ATO policy requirements.

Auditor-General Report No. 9 2022–23


Management of Cyber Security Supply Chain Risks

10
Summary and recommendations

Compliance with PSPF requirements


24. ATO had processes for ensuring DXC had implemented the required cyber security
controls in accordance with the PSPF requirements. DXC had implemented mitigation strategies
relating to patching operating systems and application control.
25. AFP and DFAT had processes for ensuring selected contracted providers had implemented
the required cyber security controls in accordance with some of the relevant PSPF requirements.
Hitachi had implemented patch management processes for operating systems and applications.
AFP had not implemented patch management processes for applications on Hitachi managed
servers. Telstra had implemented security measures for restricting administrative privileges to
specific network devices. However, Telstra had not implemented patches to operating systems
on network devices in accordance with PSPF requirements.
26. ATO has arrangements for monitoring cyber security issues related to the selected
contracted provider and specifies contract terms and conditions for monitoring performance for
relevant PSPF cyber security and entity policy requirements. None of the entities have specified
terms and conditions for managing non-compliance against PSPF and entity internal policy
requirements.
27. AFP and DFAT do not have contracting arrangements focussed on monitoring cyber
security issues and performance against relevant PSPF cyber security and entity policy
requirements.
28. Of the audited entities, ATO was the only entity that had processes for assessing
contracted provider compliance against mandatory PSPF cyber security requirements. ATO had
also reassessed cyber security terms and conditions for the selected contract.
29. ATO had some processes for ensuring the accuracy of some performance reporting
against relevant PSPF requirements. These processes included verification against other
information sources, however, the verification activities were not documented. AFP and DFAT did
not have processes for validating the accuracy of performance reporting against relevant PSPF
requirements. None of the contracted providers had established assurance mechanisms for
verifying the information they provide to entities.
30. All three entities have mechanisms within contracts to address deviations in expected
performance, including financial penalties, performance, and service credits, but these
mechanisms did not cover cyber security risks or controls.14 AFP has patch management
timeframes that deviate from PSPF requirements.

14 For example, penalties related to availability or service quality requirements, but did not include non-
compliance against relevant mandatory PSPF cyber security and department security policy requirements.

Auditor-General Report No. 9 2022–23


Management of Cyber Security Supply Chain Risks

11
Recommendations
Recommendation no. 1 To improve the quality of risk assessments:
Paragraph 2.15 (a) Australian Federal Police and Department of Foreign Affairs
and Trade improve processes and guidance for assessing and
managing cyber security risks within procurements,
including documenting the consideration of mandatory PSPF
cyber security requirements; and
(b) Australian Federal Police, Australian Taxation Office and
Department of Foreign Affairs and Trade implement
processes to assist with identifying when procurement
teams are required to consult with cyber security specialists
on cyber security risks and mandatory PSPF cyber security
requirements.
Australian Federal Police response: Agreed, agreed in part.
Australian Taxation Office response: Agreed.
Department of Foreign Affairs and Trade response: Agreed.

Recommendation no. 2 Australian Federal Police, Australian Taxation Office and


Paragraph 2.53 Department of Foreign Affairs and Trade should implement
processes for verifying the reliability of performance information
and managing non-compliance by contracted providers against the
PSPF, ISM and entity internal policy requirements, including
establishing performance measures focussed on compliance against
PSPF, ISM and entity internal policy requirements.
Australian Federal Police response: Agreed.
Australian Taxation Office response: Agreed.
Department of Foreign Affairs and Trade response: Agreed.

Recommendation no. 3 To improve monitoring of security controls:


Paragraph 3.26 (a) Australian Federal Police and Department of Foreign Affairs
and Trade specify requirements relating to the
implementation and monitoring of the mandatory
Protective Security Policy Framework cyber security
requirements in contractual arrangements; and
(b) Australian Federal Police and Department of Foreign Affairs
and Trade establish periodic assessments of security terms
and conditions of their contracts to address associated cyber
security risks.
Australian Federal Police response: Agreed, agreed in part.
Department of Foreign Affairs and Trade response: Agreed.

Auditor-General Report No. 9 2022–23


Management of Cyber Security Supply Chain Risks

12
Summary and recommendations

Recommendation no. 4 Australian Federal Police and Department of Foreign Affairs and
Paragraph 3.37 Trade specify requirements relating to reporting performance
against relevant cyber security and entity policy requirements in
contractual arrangements.
Australian Federal Police response: Agreed in part.
Department of Foreign Affairs and Trade response: Agreed.

Recommendation no. 5 To improve quality of performance reporting:


Paragraph 3.46 (a) Australian Federal Police and Department of Foreign Affairs
and Trade establish a performance framework supporting
Recommendation 4, including validating the accuracy of
performance reporting provided by contracted providers in
relation to cyber security; and
(b) Australian Taxation Office improve processes for verifying
performance information provided by contracted providers,
including documenting verification activities.
Australian Federal Police response: Agreed in part.
Australian Taxation Office response: Agreed.
Department of Foreign Affairs and Trade response: Agreed.

Summaries of entity responses


Australian Federal Police
The Australian Federal Police did not provide a summary response.

Australian Taxation Office


The Australian Taxation Office (ATO) welcomes the review and findings that the ATO is largely
effective in managing procurement cyber security risks in accordance with the PSPF. The ATO
delivers contemporary digital services, supporting effective and secure transactions for the
Australian community and maintains security of our organisations’ network and data. The ATO is
committed to improving the way in which we manage cyber security supply chain risks and
ensuring client interactions with the ATO remain safe and secure.
We are pleased that the review recognises the work already performed by the ATO in assessing
and managing procurement cyber security risks in accordance with the PSPF. The report found the
ATO has established arrangements in managing compliance of contracted providers and
monitoring performance against mandatory PSPF cyber security requirements. Further, the ATO
has contract management arrangements and performs ongoing assessment of its security terms
and conditions to ensure protective security measures address cyber security risks.

Auditor-General Report No. 9 2022–23


Management of Cyber Security Supply Chain Risks

13
The review has identified opportunities for improvement to our risk assessment processes and
performance reporting. The ATO operates under the principle of continuous improvement and
welcome the findings from the ANAO to further strengthen the procurement program.

Department of Foreign Affairs and Trade


The Department of Foreign Affairs and Trade (DFAT) welcomes this report and the
recommendations directed to the department.
Whilst we acknowledge the audit findings regarding the International Network Services
Agreement (Telstra), we consider the nature of this arrangement is unique and therefore not
reflective of the department's broader activities. The comparison of activities specific to this
contract against DFAT’s Protective Security Policy Framework (PSPF) reporting has the potential to
misrepresent the department’s cyber security capability across our global network and call into
question the appropriateness of our PSPF self-assessments and overall compliance.
As noted in the report and its appendices, DFAT has successfully achieved Essential 8 ‘maturity
level 2’ compliance under the ACSC’s E8 maturity model. This achievement is reflective of the
department’s significant investment in cyber security in recent years and furthermore, the
sophisticated cyber security capability that the department maintains. The department has also
embedded the consideration of cyber security risks in its contracting arrangements to align with
the procurement framework and relevant policies such as the PSPF.
Noting the opportunities to improve, the department will take steps to implement additional
processes and policies in line with the report's recommendations, whilst allowing for whole of
government ICT procurement constraints and market conditions. DFAT’s advanced cyber security
capability will continue to underpin improvements to departmental policies and processes to
ensure cyber security risks are effectively managed.

Key messages from this audit for all Australian Government entities
31. Below is a summary of key messages, including instances of good practice, which have
been identified in this audit and may be relevant for the operations of other Australian
Government entities.
Governance and risk management
• Assurance arrangements such as the Cyber Threat Assurance Program approach established
by ATO to check on the implementation of mandatory PSPF cyber security requirements can
assist with monitoring of compliance against cyber security contract requirements.
• Procurement specialists should ensure that contractual arrangements support the delivery of
goods and services to meet the requirements of the entity.
Procurement and contract management
• Appropriate guidance relating to contracting templates, clauses and tools can help
operationalise entity requirements when addressing cyber security risks within procurements
and contracts.
• Regular assessment of security terms and conditions when changes in goods, services or
business environment occur can assist with achieving government security requirements.
• Procurement and contract management arrangements should include a framework to guide
appropriate levels of engagement between procurement and cyber security specialists, such

Auditor-General Report No. 9 2022–23


Management of Cyber Security Supply Chain Risks

14
Summary and recommendations

as specifying factors related to the type of procurement and level of risk arising from
information communications technology (ICT).
Performance and impact measurement
• Cyber security contract terms and conditions that associate performance measures and
financial consequences for non-compliance can assist with establishing performance
expectations.
• When entities contract for delivery of ICT goods and services, arrangements should be in place
that provide equivalent level of assurance over goods and services delivered internally.
Entities cannot outsource security responsibilities and need arrangements to assure cyber
security controls are implemented, operated, and maintained by contracted providers.

Auditor-General Report No. 9 2022–23


Management of Cyber Security Supply Chain Risks

15
Audit findings

Auditor-General Report No. 9 2022–23


Management of Cyber Security Supply Chain Risks

17
1. Background
Introduction
1.1 Australian Government entities deliver a wide range of digital services to the community.
Australian Government entities also hold increasingly large volumes of data across their computer
networks, some of which is highly sensitive. Australian Government entities rely on a system of
organisations, people, activities, information, and resources to deliver digital services and to
maintain the security of government computer networks and data. This system can be referred to
as an entity’s supply chain.15
1.2 Cyber security continues to be a risk for all Australian individuals, organisations and
government entities, with over 67,500 cybercrimes being reported to the Australian Signals
Directorate’s Australian Cyber Security Centre (ACSC) in 2020–21 — an increase of 13 per cent since
the previous financial year.16 In addition, ACSC has reported that contractors holding government
information had a significant increase in malicious cyber activities.17 This increases the cyber
security risks arising from an entity’s supply chain as the risks can originate from suppliers,
manufacturers, distributors, and retailers that support products and services used by the entity.
ACSC recommends that all Australian organisations prioritise the implementation of the Essential
Eight Maturity Model (Essential Eight), including knowing their networks and evaluating risks
associated with cyber supply chains.
1.3 In addition to the ACSC’s guidance, the Attorney-General’s Department (AGD) updated the
Protective Security Policy Framework (PSPF) in March 2022 to mandate all Essential Eight mitigation
strategies from 1 July 2022 for non-corporate Commonwealth entities (NCEs).18 The
Attorney-General has established the PSPF as Australian Government policy and NCEs subject to
the Public Governance, Performance and Accountability Act 2013 must apply the PSPF.19 The
Commonwealth Procurement Rules (CPRs) were updated in December 2020 to include managing
cyber security risks within government procurements and contracts.

Protective Security Policy Framework maturity self-assessment model


1.4 PSPF Policy 5: Reporting on security (Policy 5) sets out the maturity self-assessment model
for annual PSPF reporting. NCEs are required to report on their security capability using a maturity
self-assessment model. Corporate Commonwealth entities and companies are not required to
comply with the PSPF. Under the maturity self-assessment model, entities assess and report on
their level of implementation and management of the requirements under the PSPF and the

15 Australian Cyber Security Centre, Glossary: Supply Chain [Internet], ASD,2020, available from
https://www.cyber.gov.au/acsc/view-all-content/glossary/supply-chain [accessed 19 July 2022].
16 The Australian Cyber Security Centre formally became part of Australian Signals Directorate on 1 July 2018.
17 Australian Cyber Security Centre, ACSC Annual Cyber Threat Report | 1 July 2020 to 30 June 2021 [Internet].
18 Attorney-General’s Department, Protective Security Policy Framework | Policy 10: Safeguarding data from
cyber threats, AGD, 2018, available from https://www.protectivesecurity.gov.au/system/files/2022-03/pspf-
policy-10-safeguarding-data-from-cyber-threats.pdf [accessed 19 July 2022].
19 Attorney-General’s Department, Applying the Protective Security Policy Framework [Internet], AGD, available
from https://www.protectivesecurity.gov.au/about/applying-protective-security-policy-framework [accessed
19 September 2022].

Auditor-General Report No. 9 2022–23


Management of Cyber Security Supply Chain Risks

18
Background

maturity of their security capability. The annual PSPF assessment report shows the extent to which
an entity has self-assessed it has:
• achieved the security outcomes through effectively implementing and managing
requirements under the PSPF;
• implemented and managed security capability at a specific maturity;
• identified the key security risks to its people, information, and assets; and
• taken measures to mitigate or manage identified risks.20
1.5 The maturity self-assessment model requires entities to assess their security capability and
implementation of the requirements in the 16 PSPF policies within the context of their specific risk
environment and risk tolerances.21 To assess the maturity of the implementation of each PSPF
policy, entities are to consider their effectiveness in implementing the core and supporting
requirements for each policy. Entities assess the effectiveness of their implementation of the PSPF
requirements against four different levels: Partial, Substantial, Full and Excelled. Descriptions for
each implementation level are outlined in Table 1.1.
Table 1.1: Implementation levels of PSPF requirements
Implementation levela Description
Partial Requirement is not implemented, is partially progressed or is not well-
understood across the entity.
Substantial Requirement is largely implemented but may not be fully effective or
integrated into business practices.
Full Requirement is fully implemented and effective and is integrated, as
applicable, into business practices.
Excelled Requirement and relevant better-practice guidance are proactively
implemented in accordance with the entity’s risk environment, are effective in
mitigating security risk and are systematically integrated into business
practices.
Note a: The ‘Yes or No’ implementation level has been excluded from the table as the selected requirements for the
audit are evaluated in the PSPF using the levels specified in the table.
Source: PSPF Policy 5: Reporting on security.
1.6 Based on entities’ assessment of their implementation of the requirements for each PSPF
policy, the entities can select four maturity levels under the PSPF maturity self-assessment model:
Ad hoc, Developing, Managing and Embedded. The selected maturity level is for the overall PSPF
Policy. The description for each PSPF maturity level is outlined in Table 1.2.

20 Attorney General’s Department, Protective Security Policy Framework | Security governance, AGD, available
from https://www.protectivesecurity.gov.au/policies/security-governance [accessed 24 August 2022].
21 The 16 PSPF policies are across four outcomes: governance, information, personnel and physical. These
outcomes outline the end-state that the government wants to achieve.

Auditor-General Report No. 9 2022–23


Management of Cyber Security Supply Chain Risks

19
Table 1.2: Maturity levels of the PSPF maturity self-assessment model
Maturity level Maturity rating Description

Ad hoc ◑ Partial or basic implementation and management of PSPF


mandatory and supporting requirements.


Substantial, but not fully effective implementation and
Developing management of PSPF mandatory and supporting
requirements.

Managing ● Complete and effective implementation and management of


PSPF mandatory and supporting requirements.
Comprehensive and effective implementation and proactive
Embedded management of PSPF mandatory and supporting requirements
and excelling at implementation of better-practice guidance.
Source: Adapted from PSPF Policy 5: Reporting on security.
1.7 The PSPF specifies that the ‘Managing’ maturity level provides the minimum required level
of protection of an entity’s people, information and assets.22 If an entity’s self-assessed maturity
level for a PSPF policy is ‘Ad hoc’ or ‘Developing’, the entity is required to provide information in its
assessment regarding the proposed strategies or implementation activities to improve the entity’s
maturity level to ‘Managing’. The entity is also required to provide the associated timeframe for
each strategy to achieve ‘Managing’ maturity.
1.8 AGD updated the PSPF maturity self-assessment model on the 8 October 2022 in response
to recommendation 9 within the Auditor-General Report No. 32 2020–21 Cyber Security Strategies
of Non-Corporate Commonwealth Entities. Recommendation 9 suggested AGD perform a review of
the PSPF maturity self-assessment model to determine if the maturity levels are fit-for-purpose and
effectively align with the Essential Eight Maturity Model. AGD has updated the maturity levels and
descriptors to simplify the terminology used and align PSPF and Essential Eight Maturity models.
Figure 1.1 depicts the high-level changes in the PSPF maturity self-assessment model.
Figure 1.1: PSPF Maturity Self-assessment Model Changes

Source: AGD October 2022 Chief Security Office Forum Newsletter, p. 1.


1.9 The ANAO assessed selected entities using the PSPF maturity self-assessment model in place
at the planning of this audit in September 2021, as entities would not be reporting against changes
introduced in October 2022. NCEs are required to use the new maturity levels in the PSPF 2022–23
reporting period.

22 Attorney-General’s Department, Protective Security Policy Framework | Policy 5: Reporting on security, AGD,
2018, available from https://www.protectivesecurity.gov.au/system/files/2021-06/pspf-policy-5-reporting-
on-security.pdf [accessed 8 August 2022], p. 3.

Auditor-General Report No. 9 2022–23


Management of Cyber Security Supply Chain Risks

20
Background

Managing cyber security supply chain risk


1.10 Requirements for NCEs to manage cyber security supply chain risks are outlined in PSPF
Policy 6: Security governance for contracted goods and service providers (Policy 6) and the CPRs.
These are supported by requirements in PSPF Policy 10: Safeguarding data from cyber threats
(Policy 10), which outlines the mandatory PSPF cyber security requirements.

Policy 6: Security governance for contracted goods and service providers


1.11 The core requirement of Policy 6 mandates that each NCE is accountable for the security
risks arising from procuring goods and services and must ensure contracted providers comply with
relevant PSPF requirements. 23 This requirement predates the October 2018 revision of the PSPF.
The previous GOV-12 set out requirements for NCEs to ensure that contracted service providers
comply with PSPF requirements. 24
1.12 In addition to the core requirement, Policy 6 sets out four mandatory supporting
requirements, outlined in Box 1.25

Box 1: Protective Security Policy Framework, Policy 6 supporting requirements

Requirement 1. Assessing and managing security risks of procurement


When procuring goods or services, entities must put in place proportionate protective security
measures by identifying and documenting:
a. specific security risks to its people, information and assets; and
b. mitigations for identified risks.
Requirement 2. Establishing protective security terms and conditions in contracts
Entities must ensure that contracts for goods and services include relevant security terms and
conditions for the provider to:
a. apply appropriate information, physical and personnel security requirements of the
PSPF;
b. manage identified security risks relevant to the procurement; and
c. implement governance arrangements to manage ongoing protective security
requirements, including to notify the entity of any actual or suspected security
incidents and follow reasonable direction from the entity arising from incident
investigations.
Requirement 3. Ongoing management of protective security in contracts

23 The core requirements specify what entities must do to achieve the government’s desired protective security
outcomes. This is the mandatory requirement under PSPF Policy 6.
24 GOV-12 was a PSPF mandatory requirement prior to 30 September 2018 and specified that, ‘Agencies must
ensure the contracted service provider complies with the requirements of this policy and any protective
security protocols.’ The GOV-12 requirement was replaced by the PSPF core requirement Policy 6: Security
Governance for contracted goods and service providers on 1 October 2018.
25 Supporting requirements specify the standard approach for achieving the core requirements.

Auditor-General Report No. 9 2022–23


Management of Cyber Security Supply Chain Risks

21
When managing contracts, entities must put in place the following measures over the life of a
contract:
a. ensure that security controls included in the contract are implemented, operated and
maintained by the contracted provider and associated subcontractor; and
b. manage any changes to the provision of goods or services, and reassess security risks.
Requirement 4. Completion or termination of a contract
Entities must implement appropriate security arrangements at completion or termination of a
contract.
Source: PSPF Policy 6: Security governance for contracted goods and service providers.
1.13 Policy 6 provides details to support the CPRs that govern how entities procure goods and
services.26 The CPRs provide guidance on general procurement risk, but limited guidance regarding
considerations of cyber security risks. In December 2020, Department of Finance updated CPR rule
8.3, to align with existing PSPF policies, specifying that relevant entities should be considering and
managing procurement security risks including in relation to cyber security risks. It requires that
NCEs and prescribed corporate Commonwealth entities listed in section 30 of the Public
Governance, Performance and Accountability Rule 2014 specifically consider the cyber security risk
associated with each procurement, which is outlined in Box 2.

Box 2: Commonwealth Procurement Rules rule 8.3

Relevant entities should consider and manage their procurement security risk, including in
relation to cyber security risk, in accordance with the Australian Government’s Protective
Security Policy Framework.a
Note a: The mandatory supporting Requirement 1 of Policy 6 requires the assessment and management of security
risks of procurements.
Source: Commonwealth Procurement Rules.
1.14 The Australian Government is a large procurer of information communications technology
(ICT) related goods and services, with 19,270 contracts worth approximately $14.8 billion
committed in 2021–22.27 This commitment introduces dependencies on significant supply chains.
In November 2019, the ACSC published Cyber Supply Chain Risk Management that suggested all
organisations should consider supply chain risks, specifically in relation to cyber security risks, as
cyber security risks are generally transferred through the entities within the supply chain.28

26 Attorney-General’s Department, Protective Security Policy Framework | Policy 6: Security governance for
contracted goods and service providers [Internet], AGD, 2018, available from
https://www.protectivesecurity.gov.au/system/files/2021-10/policy-6_security-governance-for-contracted-
goods-and-service-providers.pdf [accessed 24 August 2022].
27 These goods and services include 'Information Technology and Telecommunications'; and 'Engineering and
Research and Technology Based Services'.
28 Australian Cyber Security Centre, Cyber Supply Chain Risk Management [Internet].

Auditor-General Report No. 9 2022–23


Management of Cyber Security Supply Chain Risks

22
Background

Policy 10: Safeguarding data from cyber threats


1.15 Since April 2013, the Australian Government has mandated NCEs implement four of the
ACSC’s Essential Eight Maturity Model, known as the Top Four.29 This mandate was initially under
InfoSec 4: Safeguarding information from cyber threats and, following updates in October 2018, is
now mandated by PSPF Policy 10: Safeguarding data from cyber threats (Policy 10). The mandatory
requirements under Policy 10 are outlined in Box 3. Appendix 3 describes the key changes in Policy
10 and the Essential Eight Maturity Model and the applicable Policy 10 requirements for this audit.

Box 3: Mandatory requirements of Protective Security Framework Policy 10 (April 2013 to 30


June 2022)

Each entity must mitigate common and emerging cyber threats by:
a. implementing the following mitigation strategies from the Strategies to Mitigate Cyber
Security Incidents:
i. application control
ii. patching applications
iii. restricting administrative privileges
iv. patching operating systems
b. considering which of the remaining mitigation strategies from the Strategies to Mitigate
Cyber Security Incidents you need to implement to protect your entity.
Source: Adapted from PSPF Policy 10: Safeguarding information from cyber threats.
1.16 Since the introduction of the Essential Eight Maturity Model in June 2017, Policy 10 has
provided NCEs guidance on implementing the ‘Maturity Level Three’ requirements — as set out in
the Essential Eight Maturity Model — to achieve a PSPF maturity rating of ‘Managing’.30 ACSC
reviews the cyber threat landscape on a regular basis and updates the Essential Eight according to
the threats at the time. The ANAO assessed selected entities using the Maturity Model in place at
the planning of this audit in September 2021, as entities would not be reporting against changes

29 The Top Four are: application control; patching applications; restricting administrative privilege; and patching
operating systems.
Australian Cyber Security Centre, Essential Eight Maturity Model [Internet], ASD, 2017, available from
https://www.cyber.gov.au/acsc/view-all-content/publications/essential-eight-maturity-model [accessed 18
September 2022].
30 Attorney-General’s Department, Protective Security Policy Framework | Policy 10: Safeguarding data from
cyber threats, [Internet].

Auditor-General Report No. 9 2022–23


Management of Cyber Security Supply Chain Risks

23
introduced in October 2021.31 As at September 2021, there were three maturity levels in the
Essential Eight Maturity Model, as defined in Table 1.3.32
Table 1.3: Maturity levels of the Essential Eight Maturity Model (June 2017 to
September 2021)
Maturity level Description
Maturity Level One Partially aligned with the intent of the mitigation strategy.
Maturity Level Two Mostly aligned with the intent of the mitigation strategy.
Maturity Level Three Fully aligned with the intent of the mitigation strategy.
Source: Adapted from the ACSC’s Essential Eight Maturity Model.
1.17 AGD consulted with ACSC to improve the interaction between the PSPF and the Essential
Eight Maturity Model. This consultation has resulted in updates to Policy 10 to ensure appropriate
alignment between the ACSC’s Essential Eight Maturity Model and the PSPF maturity model. In
March 2022, AGD updated Policy 10 to mandate the Essential Eight strategies to mitigate cyber
security incidents from 1 July 2022, and advised entities that to achieve a PSPF maturity rating of
‘Managing’, NCEs must implement Essential Eight Maturity Level Two for each mitigation strategy.33

Rationale for undertaking the audit


1.18 The ANAO has conducted a series of audits on cyber security and identified ongoing low
levels of cyber resilience in NCEs and high rates of non‐compliance with the Top Four mitigation
strategies. The high-rates of non-compliance continues to be an issue as AGD’s PSPF Assessment
Report 2020–21 indicated 72 per cent of NCEs reported not fully implementing Policy 10
requirements. 34 The Top Four mitigation strategies were mandated by the PSPF in 2013. Auditor‐
General Report No. 32 2020–21 Cyber Security Strategies of Non‐Corporate Commonwealth Entities
noted that:
The 2018‐19 PSPF assessment report identified that one of the key challenges faced by the entities
who had not achieved the ‘Managing’ maturity level of Policy 10 was reliance on outsourced
service providers for information communications technology (ICT) and cyber security services,
whereby entities had limited influence or control over the implementation of the mitigation
strategies.35

31 ANAO assessed against the September 2021 version of the model to allow entities sufficient time to respond
to any changes that may have subsequently applied.
In October 2021, ACSC updated the Essential Eight to include four maturity levels rather than three and
updated requirements throughout the other maturity levels to address current cyber threats. Originally,
Maturity Level One was the lowest maturity level, but this did not differentiate those organisations that did
not meet Maturity Level One requirements. NCEs that did not meet Maturity Level One maturity
requirements were those that did not implement any Essential Eight mitigation strategies. This has resulted in
the inclusion of Maturity Level Zero to acknowledge weaknesses in an organisation’s overall cyber security
posture.
32 See Appendix 3 for a description of the key changes in Policy 10 and the Essential Eight Maturity Model and
the applicable Policy 10 requirements for this audit.
33 Appendix 3 describes the applicable periods for the various versions of Policy 10.
34 Attorney-General’s Department, Protective Security Policy Framework | Assessment Report 2020–21, p.10.
35 Auditor‐General Report No.32 2020–21 Cyber Security Strategies of Non‐Corporate Commonwealth Entities, p.
70.

Auditor-General Report No. 9 2022–23


Management of Cyber Security Supply Chain Risks

24
Background

1.19 The limited influence and control over outsourced service providers of ICT and cyber
security services increases the cyber security risks arising from an entity’s supply chain. The
management of cyber security risks within procurements continues to be challenging for NCEs with
51 per cent being reported in AGD’s PSPF Assessment Report 2020–21 as not fully implementing
Policy 6.
1.20 Auditor‐General Report No. 4 2021–22 Defence’s Contract Administration — Defence
Industry Security Program and Auditor‐General Report No. 6 2021–22 Management of the Civil
Maritime Surveillance Services Contract have further indicated poor administration of government
procurements, including monitoring and treatment of non‐compliance with contractual
requirements.36
1.21 The Australian Government has committed $14.8 billion in information communications
technology (ICT) related goods and services contracts in 2021–22.37 These commitments indicate
the Australian Government’s reliance on contracted providers for its ICT capabilities. This
dependency on contractors for ICT capabilities and the increase in malicious cyber activities against
contractors who hold government information increases the risks associated with government
supply chains.38
1.22 This audit was identified as a Joint Committee of Public Accounts and Audit (JCPAA) priority
for 2021-22.
1.23 This audit will examine the effectiveness of the implementation of Policy 6 by selected NCEs
and the effectiveness of selected contracted providers’ compliance with the relevant PSPF
requirements relating to procurement cyber security risks. It will provide Parliament transparency
and insights on the management of procurement cyber security risks.39

Audit approach
1.24 The following three NCEs were selected for this audit:
• Australian Federal Police (AFP);
• Australian Taxation Office (ATO); and
• Department of Foreign Affairs and Trade (DFAT).
1.25 The 2020–21 Policy 6 and Policy 10 maturity ratings, as self-assessed by the selected entities,
are outlined in Table 1.4.

36 Auditor‐General Report No.4 2021–22 Defence’s Contract Administration — Defence Industry Security
Program, p. 8; and Auditor‐General Report No.6 2021–22 Management of the Civil Maritime Surveillance
Services Contract, pp. 8-9.
37 These goods and services include 'Information Technology and Telecommunications'; and 'Engineering and
Research and Technology Based Services'.
38 Australian Cyber Security Centre, ACSC Annual Cyber Threat Report | 1 July 2020 to 30 June 2021 [Internet].
39 The recommendations from the Auditor‐General Report No.32 2020–21 Cyber Security Strategies of Non‐
Corporate Commonwealth Entities and JCPAA Report 485: Cyber Resilience will be assessed as part of the 2022
Auditor-General Implementation of parliamentary committee and Auditor-General recommendations —
Attorney-General’s portfolio performance audit.

Auditor-General Report No. 9 2022–23


Management of Cyber Security Supply Chain Risks

25
Table 1.4: Selected entities and their 2020-21 Policy 6 and 10 self-assessed maturity
ratings
Entity Policy 6 maturity rating Policy 10 maturity rating
Australian Federal Police ● ◕
Australian Taxation Office ● ◕
Department of Foreign Affairs
and Trade ● ◕
Key:
Ad hoc
◑ Partial or basic implementation and management of PSPF mandatory and supporting
requirements.
Developing
◕ Substantial, but not fully effective implementation and management of PSPF mandatory and
supporting requirements.
Managing
● Complete and effective implementation and management of PSPF mandatory and supporting
requirements.
Embedded Comprehensive and effective implementation and proactive management of PSPF
mandatory and supporting requirements and excelling at implementation of better-practice
guidance.
Source: Reported 2020–21 Policy 6 and 10 maturity ratings for selected entities.
1.26 Contracts were selected for each entity to support the assessment against Policy 6
requirements. The contracts selected were based on contract value, and the type of goods and
services being provided, with a focus on goods and services relating to handling of sensitive
information, security functions and management of privileged user access. These functions were
suggested as higher priority by the ACSC.40
1.27 The contracts selected were with DXC Technology (DXC), Hitachi Vantara (Hitachi), and
Telstra Australia (Telstra). A summary of contract details has been provided in Table 1.5.
Table 1.5: Summary of contract details
Entity Contracted Provider Value ($) Contract Scope of Services
milliona Initiation
Australian Hitachi Vantara Australia 24 September Provision of ICT facilities
Federal Pty Limited trading as 2017 and ongoing system
Police Hitachi Data Systems Pty management services.
Ltd These are to be provided in
(Hitachi) AFP’s ICT environment.

Australia DXC Enterprise Australia 2,161 December Provision of ICT


Taxation Pty Ltd 2010 infrastructure services,
Office (DXC) facilities, solutions,
system/environment
management. These are to
be provided in ATO’s ICT
environment.

40 Australian Cyber Security Centre, , Cyber Supply Chain Risk Management [Internet].

Auditor-General Report No. 9 2022–23


Management of Cyber Security Supply Chain Risks

26
Background

Entity Contracted Provider Value ($) Contract Scope of Services


milliona Initiation
Department Telstra Corporation 281 June Provision of communication
of Foreign Limited 2016 services and facilities.
Affairs and (Telstra) These are to be provided
Trade outside of DFAT’s ICT
environment.
Note a: As at October 2022.
Source: ANAO analysis of AusTender data.
1.28 Hitachi provides infrastructure management services for two data centres that support
AFP’s ICT environment. Hitachi manages services which consolidates and virtualises physical
compute, network and storage resources capabilities for AFP. Support and maintenance services
provided include change and incident management services. AFP manages Hitachi staff as part of
its AFP work force and requires Hitachi staff to comply to with all AFP policies and procedures.
1.29 DXC provides centralised computing solutions to ATO. The centralised computing supports
ATO’s ICT infrastructure and various systems and applications. DXC’s service encompasses virtual
and non-virtual server management, midrange, data warehouse and storage services. DXC teams
perform their function within ATO’s ICT infrastructure and are integrated into ATO’s teams. DXC
teams are required to adhere to ATO policies and procedures.
1.30 DFAT’s ICT network relies on international telecommunication network services provided by
Telstra that connect sites in Australia and overseas posts. Telstra provides satellite, VPN and
internet services to facilitate site-to-site network connectivity. Under DFAT’s instruction, Telstra
supplies and maintains equipment and facilities required for network connectivity.
1.31 The ANAO assessed the selected contracted providers’ implementation of cyber security
requirements within the respective contracts. As discussed in paragraph 1.11, Policy 6 requires
contract providers to comply with relevant PSPF requirements. This includes requiring contracted
providers to protect Australian Government information resources in the same manner as the
procuring entity. Where the contracts do not detail the relevant PSPF requirements then the
mandatory PSPF cyber security requirements and Essential Eight Maturity Model as of September
2021, Top Four, will form the basis for the assessment.41 The scope of cyber security related services
provided under each contract is specified in Table 1.6.
Table 1.6: Summary of applicable cyber security related services
Contracted Application Patching Patching Restricting
Provider Control Applications Operating administrative
Systems privileges
Hitachi  
DXC  
Telstra  
Source: ANAO analysis of contracts and entity business processes

41 NCEs were required to report in 2020–21 against PSPF Policy 10 and the Essential Eight Maturity Model
requirements prior to changes in the Essential Eight Maturity Model in September 2021.

Auditor-General Report No. 9 2022–23


Management of Cyber Security Supply Chain Risks

27
1.32 The ANAO examined the implementation and performance of the respective cyber security
related services specific to each contract and on the applications and systems relevant to the
contracts. The ANAO tested the operating effectiveness of controls between 1 January 2021 and 1
June 2022.

Audit objective, criteria and scope


1.33 The objective of this audit was to examine the effectiveness of selected NCEs’ arrangements
for managing cyber security risks, within their procurements and specific contracted providers,
under the PSPF.
1.34 To form a conclusion against the audit objective, the ANAO adopted the following two high-
level criteria:
• Have entities established effective arrangements to assess and manage procurement risks
related to cyber security in accordance with the PSPF requirements?
• Have the contracted providers complied with the relevant PSPF requirements?
1.35 The audit examined the effectiveness of the implementation of:
• Policy 6: Security governance for contracted goods and services providers by selected
NCEs; and
• Policy 10: Safeguarding data from cyber threats by the selected contracted providers.

Audit methodology
1.36 The audit methodology included:
• examination of NCEs’ documentation for managing procurements related to the selected
contracted providers against Policies 6 and 10;
• system testing and technical assessment of the cyber security controls implemented by
the contracted providers against the requirements in Policy 10;
• examination of the contracted providers’ cyber security reporting and documentation;
and
• meetings with the NCEs’ and contracted providers’ staff.
1.37 The audit was conducted in accordance with ANAO Auditing Standards at a cost to the ANAO
of approximately $609,561.
1.38 The team members for this audit were Edwin Apoderado, Benjamin Siddans, Zhiying Wen,
Ji-Young Kim, Jason Ralston, David Willis, Stevan Serafimov, Olivia Robbins, Jo Rattray-Wood,
Sherry Wang, Xiaoyan Lu, and Lesa Craswell.

Auditor-General Report No. 9 2022–23


Management of Cyber Security Supply Chain Risks

28
2. Managing cyber security risks in
procurements
Areas examined
This chapter examines whether the selected entities have established effective arrangements for
assessing and managing procurement risks related to cyber security in accordance with the
Protective Security Policy Framework (PSPF) requirements.
Conclusion
Australian Taxation Office (ATO) has largely effective arrangements for assessing and managing
procurement cyber security risks in accordance with the PSPF. Australian Federal Police (AFP) and
Department of Foreign Affairs and Trade (DFAT) have partially effective arrangements for
assessing and managing procurement risks related to cyber security in accordance with the PSPF.
Areas for improvement
The ANAO made the following recommendations aimed at:
• all three entities improving processes and guidance for assessing and managing cyber security
risks within procurements, including documenting the consideration of mandatory PSPF
cyber security requirements and identifying when procurement teams should consult cyber
security specialists; and
• all three entities implementing processes for verifying the reliability of performance
information and managing non-compliance with relevant mandatory PSPF security
requirements, including establishing relevant performance measures.

2.1 The Public Governance Performance and Accountability Act 2013 (PGPA Act) requires
entities to demonstrate how public resources have been applied to achieve their purposes. The
Attorney-General’s Directive on the Security of Government Business establishes the Protective
Security Policy Framework (PSPF) as an Australian Government policy.42 The PSPF Policy 6: Security
governance for contracted goods and service providers (Policy 6) requires entities to manage cyber
security risks arising from procuring goods and services and ensure that contracted providers
comply with relevant PSPF cyber security requirements.
2.2 This chapter examines whether audited entities have established sound risk management
and contracting frameworks for managing procurement cyber security risks. Policy 6 requires (see
Box 1) these frameworks to include processes for identifying and documenting risks, establishing
contract terms and conditions, and oversight of contracted provider performance.

Have entities established an appropriate risk management framework


for assessing and managing procurement cyber security risks?
All three entities have defined roles and responsibilities for managing procurement cyber
security risks. The procurement teams are responsible for identifying, assessing, and managing

42 The Attorney-General issued the Directive on the Security of Government Business in October 2018 as part of
updates to the Protective Security Policy Framework.

Auditor-General Report No. 9 2022–23


Management of Cyber Security Supply Chain Risks

29
cyber security risks within procurements. The entities have cyber security specialists who can
provide advice on cyber security risks associated with a procurement.
None of the three entities’ processes required procurement teams to consult with cyber
security specialists when assessing procurement cyber security risks or when considering
mandatory PSPF cyber security requirements. Of the three entities, ATO has processes for
assisting procurement teams with assessing and managing procurement cyber security risks
and consideration of mandatory PSPF cyber security requirements. AFP and DFAT has not
implemented processes for assessing and managing procurement cyber security risks, including
documenting any assessments performed relating to mandatory PSPF cyber security
requirements.

2.3 When the provision of digital services is outsourced to external providers, accountability for
the good or service and associated delivery outcomes (including managing security risks) remains
with the entity. Policy 6 provides guidance on assessing and managing the cyber security risks in
procurements. It outlines the mandatory requirements (see Box 1) for identifying, documenting and
mitigating cyber security risks.
2.4 Establishing an appropriate risk management framework helps entities understand cyber
security risks associated with a procurement and assists with identifying suitable security
treatments.
2.5 The ANAO reviewed entities’ processes and procedures to assess whether the Policy 6
requirements had been clearly defined and addressed. Policy 6 requires risk management processes
to:
• define the roles and responsibilities for assessing and managing procurement cyber
security risks; and
• identify and document mitigations for procurement cyber security risks, including
consultation with IT security experts and specifying mandatory security requirements.
2.6 The results of the review for each audited entity are summarised in Table 2.1.

Auditor-General Report No. 9 2022–23


Management of Cyber Security Supply Chain Risks

30
Managing cyber security risks in procurements

Table 2.1: Entities’ risk management framework implementation levelsa


Process Component Entity self-assessment ANAO analysis
AFP ATO DFAT AFP ATO DFAT
Roles and responsibilities ● ● ● ● ● ●
Identification, assessment
and mitigation of
procurement cyber security ● ● ● ◑ ◕ ◑
risks
Key:
Partial or basic implementation and management of PSPF mandatory and supporting
Ad hoc ◑ requirements.
Substantial, but not fully effective implementation and management of PSPF mandatory and
Developing ◕ supporting requirements.

Managing ● Complete and effective implementation and management of PSPF mandatory and supporting
requirements.
Comprehensive and effective implementation and proactive management of PSPF mandatory
Embedded
and supporting requirements and excelling at implementation of better-practice guidance.
Note a: The ‘Entity Self-Assessment’ rating is the entity reported PSPF maturity level for the entities’ overall
environment. The ‘ANAO analysis’ assessment maturity level rating only relates to processes for managing
cyber security risk.
Source: ANAO analysis.

Roles and responsibilities defined


2.7 All three entities had defined roles and responsibilities for managing procurement cyber
security risks. The team responsible for the procurement is responsible for identifying, assessing
and mitigating cyber security risks associated with the procurement. The procurement team is also
responsible for engaging the entities’ cyber security specialists.
2.8 Each entity has cyber security specialists that are responsible for the assessment,
implementation, and delivery of cyber security outcomes across the enterprise. The cyber security
specialists are required to provide support when engaged by procurement teams on procurement
cyber security risks.
2.9 All entities have a centralised procurement function that is responsible for managing
procurement policies, procedures and guidance. The centralised procurement function is also
responsible for reporting on the progress of procurements and ensuring procurement teams adhere
to procurement processes.

Identification, assessment and mitigation of procurement cyber security risks


2.10 AFP and DFAT’s guidelines and processes do not provide details for identifying, assessing,
and managing procurement cyber security risks, including documenting any risk assessments
performed in relation to mandatory PSPF cyber security requirements. ATO has guidelines and
processes for assessing cyber security risks and mandatory PSPF cyber security requirements within
its procurements.
2.11 AFP’s Third Party Risk Management Guideline requires that procurement teams complete a
risk assessment at the planning stage of any new procurement. The guideline was developed to

Auditor-General Report No. 9 2022–23


Management of Cyber Security Supply Chain Risks

31
provide guidance on identifying and managing procurement risks, with specific focus on
understanding risks in information communications technology (ICT) procurements. The guideline
does not provide details on how cyber security risks and mandatory PSPF cyber security
requirements are considered as part of risk assessments. AFP has advised the ANAO that cyber
security risks are assessed as part of considerations of AFP’s general security environment. The
guideline was approved in October 2021 and AFP adopted a staged approach to its implementation.
As of June 2022, the guideline had not been implemented and AFP did not have a documented
implementation plan.
2.12 ATO has procurement and contract management frameworks that set out the principles for
managing vendors, roles and responsibilities, the relationship management approach, and
assurance and reporting requirements. ATO uses questionnaires to assist procurement teams to
assess the procurement security risks. These questionnaires address all PSPF requirements,
including those relating to cyber security. The questionnaires are completed by the procurement
team and provided to ATO’s cyber security specialists if further advice is required. ATO’s cyber
security specialists provide advice on cyber security risks and considerations relating to the
procurement. Procurement teams are not required to consult with ATO’s cyber security specialists
on all procurements, including ICT-related procurements. No questionnaire was completed in
relation to the DXC contract.
2.13 DFAT’s 2021 Security Risk Management Policy consists of tools and templates for assessing
the operational impact of security risks. Those tools and templates do not include details on how
cyber security risks and mandatory PSPF cyber security requirements are considered within
procurements. The policy does not specify processes for identifying, assessing, and managing
procurement cyber security risks.
2.14 DFAT developed the Cyber Security Supply Chain Policy (Supply Chain Policy) in June 2021
to support the 2021 Security Risk Management Policy. The Supply Chain Policy provides details for
identifying, assessing, and managing procurement cyber security risks. The Supply Chain Policy
requires DFAT’s cyber security specialists to perform a preliminary cyber security assessment to
understand the supply chain risks from a contracted provider. These assessments and the decisions
for not performing assessments are not required to be documented under the Supply Chain Policy.
DFAT has recently developed a Procurement Policy in June 2022 that specifies the roles and
responsibilities for documenting these assessments. This policy only applies to new procurements
and not contract variations nor extensions and has not been applied to the Telstra contract.

Auditor-General Report No. 9 2022–23


Management of Cyber Security Supply Chain Risks

32
Managing cyber security risks in procurements

Recommendation no. 1
2.15 To improve the quality of risk assessments:
(a) Australian Federal Police and Department of Foreign Affairs and Trade improve
processes and guidance for assessing and managing cyber security risks within
procurements, including documenting the consideration of mandatory PSPF cyber
security requirements; and
(b) Australian Federal Police, Australian Taxation Office and Department of Foreign Affairs
and Trade implement processes to assist with identifying when procurement teams are
required to consult with cyber security specialists on cyber security risks and mandatory
PSPF cyber security requirements.
Australian Federal Police response: Agreed, agreed in part.
2.16 The AFP agrees to improve the quality of risk assessments in support of complex
procurements including determining when procurement teams should escalate risks for further
consideration.
Australian Taxation Office response: Agreed.
2.17 The ATO will ensure guidance material includes directions for engaging cyber security
specialists, to improve the quality of risk assessments. This will help inform cyber security risks and
mandatory PSPF cyber security requirements in procurements.
Department of Foreign Affairs and Trade response: Agreed.
2.18 The department agrees to the recommendation and has already taken steps in line with
this recommendation to improve processes. This includes the implementation of the new
enterprise Procurement Policy in early 2022 which embeds the consideration of cyber security risks
during procurements, in accordance with PSPF policies 6 and 10, as well as the introduction of the
revised Cyber Security Supply Chain Policy in 2021. Additional policy and process improvements
will be implemented to further address this recommendation.

Have entities established fit-for-purpose contracting arrangements


that support the management of procurement cyber security risks?
All three entities have contract clauses requiring contracted providers to comply with the
Protective Security Policy Framework (PSPF), ACSC’s Information Security Manual (ISM) and the
respective entities’ policies. ATO performs ongoing assessments of its security terms and
conditions to ensure protective security requirements address identified cyber security risks.
DFAT and AFP use contract management plans to specify roles and responsibilities for each
contract. ATO has a generic contract management plan that covers ICT contracts and is
developing detailed plans for each contracted provider. ATO’s generic contract management
plan does not detail roles and responsibilities for each ICT contract.
All three entities have incident management processes within contracting arrangements.

Auditor-General Report No. 9 2022–23


Management of Cyber Security Supply Chain Risks

33
ATO is the only entity that has arrangements for monitoring performance against mandatory
PSPF cyber security requirements. However, the ATO has not detailed how non-compliance
with mandatory PSPF cyber security requirements is to be managed.

2.19 A contract is a legally enforceable document between two or more parties. The contract
specifies each party’s rights and obligations in performance of that contract. It is important that
contracts are effectively managed to achieve security outcomes. Ineffective contracting
arrangements can lead to increased risks to people, information, and assets. The specification of
relevant security terms and conditions supports the effective management of security outcomes
and ensures that security requirements are legally enforceable.
2.20 The ANAO reviewed entities’ processes and procedures to assess whether the Policy 6
requirements had been clearly defined and addressed. Policy 6 requires contracted providers to
protect Australian Government information resources in the same manner as the procuring entity.
This can be achieved by implementing contracting arrangements that:
• include cyber security terms and conditions as part of procurement and contract
management documents;
• have defined the roles and responsibilities for managing cyber security requirements
within contracts;
• have appropriate procedures to assess and manage cyber security incidents arising from
the selected contracted providers; and
• have appropriate procedures for managing performance against the contract
requirements relating to PSPF requirements.
2.21 The results of the review for each audited entity are summarised in Table 2.2.

Auditor-General Report No. 9 2022–23


Management of Cyber Security Supply Chain Risks

34
Managing cyber security risks in procurements

Table 2.2: Entities’ contract management implementation levelsa


Process Component Entity Self-Assessment ANAO Analysis
AFP ATO DFAT AFP ATO DFAT
Cyber Security Terms and Conditions ● ● ● ◑ ◕ ◑
Roles and Responsibilities ● ● ● ● ◕ ●
Incident Management ● ● ● ● ● ●
Performance Management ● ● ● ◑ ◕ ◑
Key:
Ad hoc
◑ Partial or basic implementation and management of PSPF mandatory and supporting
requirements.
Developing
◕ Substantial, but not fully effective implementation and management of PSPF mandatory and
supporting requirements.
Managing
● Complete and effective implementation and management of PSPF mandatory and supporting
requirements.
Embedded Comprehensive and effective implementation and proactive management of PSPF
mandatory and supporting requirements and excelling at implementation of better-practice
guidance.
Note a: The ‘Entity Self-Assessment’ rating is the entity reported PSPF maturity level for the entities’ overall
environment. The ‘ANAO analysis’ assessment maturity level rating only relates to processes for managing
cyber security risk.
Source: ANAO analysis.

Cyber security terms and conditions


2.22 All three entities have procurement and contract management guidance to assist with
developing contract terms and conditions. The guidance has contract templates with suggested
broad contract terms and conditions specifying goods and services to be provided in accordance
with the PSPF, Australian Signals Directorate’s Information Security Manual (ISM) and entity
internal policy requirements. Of the three entities, ATO had detailed the assessment of cyber
security risks and consideration of mandatory PSPF cyber security requirements in its guidance to
assist with establishing cyber security terms and conditions.
2.23 The ANAO reviewed selected contracts from each entity and noted that all entities had
included broad contract terms and conditions requiring compliance with the PSPF, ISM and entity
internal policy requirements. The entities’ security policies and procedures formed part of the
contract suite of documents and included requirements relating to mandatory PSPF cyber security
requirements (see Box 3).
2.24 Of the three entities, ATO had specified contract terms and conditions for some of the
mandatory PSPF cyber security requirements within detailed schedules and service level
agreements. These contract terms and conditions aligned to services outlined in Table 1.6. The ATO
contract suite included the following terms and conditions related to protections against cyber
security threats:
• timeframes for implementing patches and updates;
• reporting on status of patches;

Auditor-General Report No. 9 2022–23


Management of Cyber Security Supply Chain Risks

35
• management and monitoring against malicious software (malware) and viruses43;
• system security accreditation requirements; and
• compliance reporting against ATO’s security requirements.
2.25 In addition to including cyber security terms and conditions within procurement and
contract management guidance, Policy 6 requires entities to perform ongoing assessments of
contract conditions to ensure protective security requirements address identified cyber security
risks. These assessments include monitoring and reviewing risks when changes are required to the
provision of goods and services.
2.26 All three entities require risks to be documented within a risk management plan prior to
agreement of the contract, including when a risk review is required before issuing any contract
variation. The ANAO reviewed the selected contracts and associated variations relating to cyber
security. None of the entities had risk management plans, nor evidence of their risk assessments
and considerations of mandatory PSPF cyber security requirements prior to issuing of contract
variations.
2.27 AFP and DFAT have not reviewed nor updated their selected contracts in relation to changes
in the mandatory PSPF cyber security requirements. Contract variations that occurred between
2018 and 2022 did not consider the mandatory PSPF cyber security requirements.44 ATO made
several variations against its selected contract which related to changes in the mandatory PSPF
cyber security requirements.
2.28 DXC maintains a risk register, which it is required to report to the ATO, to support regular
monitoring of risks and associated controls. The risk register specifies the risks and controls that
need to be managed by the contracted provider as part of the contract. Although the selected
contract required the contracted provider to comply with all PSPF and ISM controls, the risk
registers only specified some mandatory PSPF cyber security requirements. ATO did not document
its consideration of all mandatory PSPF cyber security requirements during the risk assessment
process.

Roles and responsibilities


2.29 Appropriate management structures assist entities to manage security risks, especially to
ensure security decisions are made in accordance with required security practices. All three entities
have established governance structures to manage the service operations for their IT systems and
environment, including managing ICT procurements, contracts and service providers. The audited
entities had separate teams that were responsible for managing ICT contracts and cyber security
issues. ICT contract management teams were responsible for developing contract management
plans and procedures for the management of all IT contracts. The plans and procedures specify the
process and tools for contract administration. ICT contract management teams were responsible
for seeking advice from the entities’ cyber security specialists. The cyber security specialists provide
advice when required by ICT contract management teams.

43 Malware is software that cybercriminals use to harm your computer system or network.
44 The CPRs were updated in 2018 to include the requirement for security risks to be considered as part of
procurements.

Auditor-General Report No. 9 2022–23


Management of Cyber Security Supply Chain Risks

36
Managing cyber security risks in procurements

2.30 None of the entities’ procurement and contract management processes required
procurement and contract management teams to consult with cyber security specialists during
procurement and contract development processes. Further, where the cyber security specialists
were not engaged, the decision and reasons for not engaging the cyber security specialists were not
recorded.
2.31 The ANAO reviewed the contract management processes supporting the selected contracts.
AFP and DFAT have contract management plans specific to the selected contracts, which outlined
roles and responsibilities for both the entity and contracted provider. ATO applies a generic contract
management plan to all ICT contracts and contracted providers.
2.32 ATO’s generic contract management plan describes contract management processes and
requirements that are applicable across multiple service providers. Given the generic nature of the
plan, it only specified the critical contract management roles for managing a contract and did not
specify who in the ATO or contracted provider is responsible for managing risks relating to a specific
contract.
2.33 A February 2021 ATO internal audit report on vendor management identified similar
concerns with contract management plans not specifying details on how contracts will be managed
over the contract period. ATO advised the ANAO that a specific DXC contract management plan is
still being drafted as of June 2022.

Incident management
2.34 Oversight of incidents through timely and thorough reporting allows entities to adjust
security practices and contract conditions to mitigate cyber security risks. It is important that
entities include such contract terms and conditions to ensure that service providers notify entities
of actual or suspected cyber security incidents, especially if the incident affects the delivery of goods
or services stated in the contracts.
2.35 All three entities have a process for managing a range of security incidents, which is
supported by procedures for handling most common cyber security risks and issues. Contracted
providers are required to report incidents using entity specific security incident management
processes, including contacting the relevant security teams for assistance with assessing suspected
or actual incidents.
2.36 All three entities hold monthly contracted provider discussions. Contracted providers are
required to report on security incidents as part of monthly reporting requirements. This reporting
includes details of the incidents, such as the priority and impact, affected systems and users, and
whether service level agreements were met.
2.37 A review of the selected contracts identified terms and conditions for reporting security
incidents, including roles and responsibilities, timeframes, reporting requirements, and the
provision of data, such as security event logs. The ANAO noted that the monthly reporting was
focussed on operational and service delivery risks, rather than security risks.

Performance management
2.38 Contract arrangements that include ongoing assessments of compliance with contract
security conditions will help ensure that vendors are adhering to essential security requirements

Auditor-General Report No. 9 2022–23


Management of Cyber Security Supply Chain Risks

37
within contracts. This ongoing oversight and management is important given the constantly
changing security risks and environment.
2.39 All three entities have regular contracted provider meetings that discuss performance
against contract terms and conditions, including key performance indicators and measures. AFP
and DFAT selected contracts specified requirements for contracted providers to comply with PSPF
and entity internal policy requirements. AFP and DFAT do not monitor performance against the
PSPF and entity internal policy requirements, including mandatory PSPF cyber security
requirements. Consequently, Hitachi and Telstra do not report on their implementation and
performance against PSPF, entity internal policy requirements and mandatory PSPF cyber security
requirements.
2.40 ATO specified contract terms and conditions relating to the mandatory PSPF cyber security
requirements, and monitored performance through the following mechanisms:
• monthly contracted provider meetings, included a review of cyber security risks and some
of the controls relating to mandatory PSPF cyber security requirements;
• an annual independent Infosec Registered Assessors Program (IRAP) assessment for the
systems it supports within the contract45; and
• ATO Cyber Governance and Operations (CGO) quarterly assurance audits assess and
require input from contracted providers on implementation and performance against the
Essential Eight mitigation strategies.
2.41 Although the ATO has mechanisms in place, it has not detailed how non-compliance with
mandatory PSPF cyber security requirements is to be managed.

Have entities established fit-for-purpose arrangements for the


management of contracted providers’ compliance with relevant
Protective Security Policy Framework requirements?
All selected contracts required contracted providers to adhere to the PSPF, ISM and entity
internal policy requirements. None of the entities had processes, performance measures and
service level agreements related to managing non-compliance with PSPF, ISM and entity
internal policy requirements. Further, none of the entities had processes for verifying the
reliability of cyber security related performance information provided by contracted providers.
AFP and DFAT do not monitor compliance against PSPF, ISM and entity internal policy
requirements for the selected contracts. ATO has established a Cyber Threat Assurance
Program and risk management processes for assessing compliance against mandatory PSPF
cyber security requirements. The assurance program included a quarterly audit of contracted
provider implementation of the Top Four mitigation strategies. The risk management processes
included the use of risk registers to monitor the implementation of some mandatory PSPF cyber
security controls and ATO policy requirements.

45 An IRAP assessment is an independent assessment performed by Australian Signals Directorate endorsed


security professionals, specifically assessing cyber security posture, identifying security risks and suggesting
mitigation measures.

Auditor-General Report No. 9 2022–23


Management of Cyber Security Supply Chain Risks

38
Managing cyber security risks in procurements

2.42 Security environments and risks constantly change, and sound contract management
arrangements can help ensure adherence to security requirements within contracts. Contract
management arrangements that include continuous evaluation of compliance against contract
requirements can provide a flexible approach to managing contracts. It allows protective measures
to be adjusted based on changes in the environment and risks. Policy 6 requires accountable
authorities to continuously evaluate compliance against contract conditions and terminate
contracts if the contracted provider fails to comply with contract provisions.
2.43 The ANAO reviewed entity procedures and processes to assess whether the Policy 6
requirements had been clearly defined and addressed. Policy 6 requires contracting arrangements
to:
• establish performance measures and service level agreements to assess contractor
performance; and
• have appropriate procedures for managing compliance against the contract requirements.
2.44 The results of the review for each audited entity are summarised in Table 2.3.
Table 2.3: Entities’ management of contracted provider compliance with relevant PSPF
requirementsa
Process Entity Self-Assessment ANAO Analysis
Component
AFP ATO DFAT AFP ATO DFAT
Service Level
Agreements ● ● ● ◑ ◑ ◑

● ● ● ◑ ◕ ◑
Compliance and
Assurance
Activities
Key:
Ad hoc
◑ Partial or basic implementation and management of PSPF mandatory and supporting
requirements.
Developing
◕ Substantial, but not fully effective implementation and management of PSPF mandatory and
supporting requirements.
Managing
● Complete and effective implementation and management of PSPF mandatory and
supporting requirements.
Embedded Comprehensive and effective implementation and proactive management of PSPF
mandatory and supporting requirements and excelling at implementation of better-practice
guidance.
Note a: The ‘Entity Self-Assessment’ rating is the entity reported PSPF maturity level for the entities’ overall
environment. The ‘ANAO analysis’ assessment maturity level rating only relates to processes for managing
cyber security risk.
Source: ANAO analysis.

Auditor-General Report No. 9 2022–23


Management of Cyber Security Supply Chain Risks

39
Service level agreements
2.45 The specification of important security considerations should be documented in the
contract and service level agreements. This ensures that the security considerations are verifiable
and enforceable.46
2.46 As described in paragraph 2.23, all three entities specify security requirements as broad
contract obligations, such as requiring contracted providers to adhere to the PSPF, ISM and entities’
internal policies. None of the selected contracts had service level agreements (SLAs) and key
performance indicators (KPIs) relating to measuring adherence to the mandatory PSPF cyber
security requirements. The SLAs and KPIs were focussed on the management of services, such as
maintenance activities and availability of systems. There was limited performance information on
adherence to PSPF, ISM and entities’ internal policy requirements.

Compliance and assurance activities


2.47 While entities had general processes for monitoring contracted provider compliance with
contract requirements, neither AFP nor DFAT monitor contracted provider compliance against the
PSPF, ISM and entity internal policies, and could not verify contracted provider adherence with
mandatory PSPF cyber security requirements. ATO’s contracted provider risk registers included
details on cyber security risks, including PSPF, ISM and ATO’s security controls. Not all mandatory
PSPF cyber security requirements were included in the risk registers.47
2.48 In addition to contracted provider risk registers, ATO monitors contracted provider
compliance with PSPF requirements through its Cyber Threat Assurance Program (CTAP). The CTAP
was initiated in 2016 and aims to provide assurance over controls relating to the Australian Signals
Directorate’s Australian Cyber Security Centre’s (ACSC’s) Top Four mitigation strategies, including
monitoring remediation actions to be performed by contracted providers.
2.49 In October 2021, ATO undertook an internal audit of the assurance arrangements for
assessing, managing, and reporting on maturity and compliance levels of Essential Eight controls.
The internal audit reviewed the CTAP and recommended improvements to the CTAP methodology,
specifically considering alignment with ACSC’s Essential Eight Maturity Model and changes in ATO’s
environment and confirming the completeness and accuracy of contracted provider data. ATO had
agreed to implement improvements to the CTAP methodology by 30 June 2022 but had not
completed its implementation.
2.50 None of the selected contracts detail how performance is measured against contract terms
and conditions in relation to adhering to PSPF, ISM and entities’ internal security requirements. AFP
and DFAT do not have processes for confirming contracted provider compliance with mandatory
PSPF cyber security requirements. Although ATO has the CTAP and risk registers for assessing
compliance with mandatory PSPF cyber security requirements, the arrangements do not provide
detailed instructions on how contracted provider non-compliance is managed.

46 Australian Cyber Security Centre, Protecting Against Cyber Threats to Managed Service Providers and their
Customers [Internet], ASD, 2022, available from https://www.cyber.gov.au/acsc/view-all-
content/advisories/protecting-against-cyber-threats-managed-service-providers-and-their-customers
[accessed 3 August 2022].
47 As per paragraph 2.27, ATO did not document the consideration of all mandatory PSPF cyber security
requirements.

Auditor-General Report No. 9 2022–23


Management of Cyber Security Supply Chain Risks

40
Managing cyber security risks in procurements

2.51 None of the audited entities have processes for verifying the completeness and accuracy of
performance information provided by contracted providers. All three entities rely on discussions
with contracted providers to confirm their understanding and robustness of performance
information. Entities do not have set processes to ensure information is complete and accurate,
such as verification against independent information sources or application of contracted providers’
quality assurance processes.
2.52 AFP and DFAT have not assessed contracted provider compliance with relevant PSPF
requirements since the initiation of those contracts. Without appropriate contract terms and
conditions, and processes for verifying performance information, compliance with mandatory PSPF
cyber security requirements cannot be accurately assessed and enforced.

Recommendation no. 2
2.53 Australian Federal Police, Australian Taxation Office and Department of Foreign Affairs
and Trade should implement processes for verifying the reliability of performance information
and managing non-compliance by contracted providers against the PSPF, ISM and entity internal
policy requirements, including establishing performance measures focussed on compliance
against PSPF, ISM and entity internal policy requirements.
Australian Federal Police response: Agreed.
2.54 The AFP agrees to improve internal information security policy pertaining to the oversight
of vendors.
2.55 The AFP agrees to improve monitoring of security controls via the inclusion of relevant
performance measures surrounding vendor security obligations and that relevant reporting
mechanisms are specified.
Australian Taxation Office response: Agreed.
2.56 The ATO will ensure reliability of performance information is verified and performance
measures focus on compliance against PSPF, ISM and entity internal policy requirements.
Department of Foreign Affairs and Trade response: Agreed.
2.57 DFAT agrees to the recommendation and will establish a framework that supports the
review and management of contracted ICT provider performance and non-compliance.

Auditor-General Report No. 9 2022–23


Management of Cyber Security Supply Chain Risks

41
3. Compliance with Protective Security Policy
Framework requirements
Areas examined
This chapter examines whether the selected entities have established effective arrangements to
manage compliance of their contracted providers with the Protective Security Policy Framework
(PSPF) requirements for cyber security.
Conclusion
Australian Federal Police (AFP) and Department of Foreign Affairs and Trade (DFAT) do not
manage compliance of contracted providers with the PSPF requirements for cyber security.
Australian Taxation Office (ATO) had largely established arrangements to manage compliance of
their contracted providers with limited assurance over reporting and methods of enforcement of
the PSPF requirements for cyber security.
Areas for improvement
The ANAO made the following recommendations aimed at:
• Australian Federal Police and Department of Foreign Affairs and Trade specifying
requirements for the implementation and monitoring of the mandatory Protective Security
Policy Framework cyber security requirements in contractual arrangements;
• Australian Federal Police and Department of Foreign Affairs and Trade establishing periodic
assessments of security terms and conditions of their contracts to address associated cyber
security risks;
• Australian Federal Police and Department of Foreign Affairs and Trade specifying
requirements relating to reporting performance against relevant cyber security and entity
policy requirements in contractual arrangements; and
• all three entities improving processes for verifying cyber security related performance
information provided by contracted providers.

3.1 The PSPF Policy 6: Security governance for contracted goods and service providers (Policy 6)
requires entities to establish measures for ongoing management of protective security within
contracts (see Box 1). These measures must ensure contracted providers implement, operate and
maintain security controls in accordance with contract terms and conditions, including complying
with relevant PSPF cyber security requirements. Ongoing monitoring supported by appropriate
performance measures and reliable performance information helps ensure that goods and services
are delivered in accordance with contract terms and conditions.
3.2 The PSPF Policy 10: Safeguarding data from cyber threats (Policy 10) sets the mandatory
cyber security requirements for non-corporate Commonwealth Entities (see Box 3). As discussed in
paragraph 1.31, Policy 6 requires contracted providers who provide goods and services related to
managing Australian Government information to implement, operate and maintain security
controls relevant to mandatory PSPF cyber security requirements.
3.3 This chapter examines if the goods and services delivered by the contracted providers of the
three audited entities were compliant with the requirements detailed in the Policy 10 of the PSPF.

Auditor-General Report No. 9 2022–23


Management of Cyber Security Supply Chain Risks

42
Compliance with Protective Security Policy Framework requirements

This examination includes the assessment of the implementation of relevant cyber security controls
by contracted providers and the entities’ arrangements for managing and verifying contracted
provider compliance with mandatory PSPF cyber security requirements.

Have cyber security controls been implemented for relevant Protective


Security Policy Framework requirements?
ATO had processes for ensuring DXC had implemented the required security controls in
accordance with the PSPF requirements. DXC had implemented mitigation strategies relating
to patching operating systems and application control.
AFP and DFAT had processes for ensuring selected contracted providers had implemented the
required cyber security controls in accordance with some of the relevant PSPF requirements.
Hitachi had implemented patch management processes for operating systems and applications.
AFP had not implemented patch management processes for applications on Hitachi managed
servers. Telstra had implemented security measures for restricting administrative privileges to
specific network devices. However, Telstra had not implemented patches to operating systems
on network devices in accordance with PSPF requirements.

3.4 Where services have been outsourced to a contracted provider, entities are accountable for
ensuring that the services delivered are aligned with those that were procured. Entities are also
accountable for ensuring that the goods and services delivered by the contracted provider are
compliant with relevant policies, including the Protective Security Policy Framework (PSPF).
3.5 To achieve full implementation for each of the Top Four mitigation strategies under Policy
10, entities were required to implement the ‘Maturity Level Three’ requirements set by the
Australian Signals Directorate’s Australian Cyber Security Centre (ACSC).48 As outlined in Table 1.3,
the ACSC defines ‘Maturity Level Three’ as ‘fully aligned with the intent of the mitigation strategy’.
To reach ‘Maturity Level Three’ for each of the Top Four, entities are required to49:
• implement application control on all workstations and servers to restrict execution of
unapproved or malicious programs and implement Microsoft’s latest recommended block
rules to prevent application control bypasses50;
• patch security vulnerabilities assessed as extreme risks in applications and operating
systems within 48 hours from vendor release, including using an automated mechanism
to confirm and record that patches have been installed, and update or replace
unsupported applications and operating systems51; and

48 Refer to Appendix 3 Policy 10 and Essential Eight Maturity Model Timeline.


49 The Top Four mitigation strategies based on the October 2020 version of the Essential Eight Maturity Model
Methodology.
50 Application control is a security approach in which only approved applications are allowed to execute on
systems. When successfully implemented it can prevent the execution and spread of malicious code.
51 Patches are issued by vendors when they become aware of security vulnerabilities. Applying patches or
updates in a timely manner is critical to prevent adversaries running malicious code on known vulnerabilities.

Auditor-General Report No. 9 2022–23


Management of Cyber Security Supply Chain Risks

43
• restrict administrative access to the level required for personnel to undertake their duties,
including regularly validating the requirement for such access and preventing privileged
users from accessing email and the Internet.52
3.6 The ANAO reviewed the implementation of relevant PSPF requirements against the cyber
security related services and systems within the selected contracts. The relevant services provided
by the selected contracted providers has been described in Table 1.6. The contracted providers’
implementation of the Top Four mitigation strategies, as assessed by the ANAO, is presented in
Table 3.1 below.
Table 3.1: Top Four mitigation strategy implementationa
Top Four Entity Self-Assessmentb ANAO Analysis
AFP ATO DFAT AFP ATO DFAT
Application
control
N/A ◕ N/A N/A ● N/A

Patching
applications ◕ N/A N/A ◑ N/A N/A

◕ ◕ ◕ ● ● ◑
Patching
operating
systems

◕ ●
Restricting
administrative N/A N/A N/A N/A
privileges
Key:
Ad hoc
◑ Partial or basic implementation and management of PSPF mandatory and supporting
requirements.
Developing
◕ Substantial, but not fully effective implementation and management of PSPF mandatory and
supporting requirements.
Managing
● Complete and effective implementation and management of PSPF mandatory and supporting
requirements.
Embedded Comprehensive and effective implementation and proactive management of PSPF
mandatory and supporting requirements and excelling at implementation of better-practice
guidance.
Note a: The ‘Not Applicable’ (N/A) specifies the mitigation strategies that are not relevant to the nature of the contract.
The assessment was limited to mitigation strategies that were relevant to the nature of the contracts.
Note b: The ‘Entity Self-Assessment’ rating is the entity reported PSPF maturity level for the entities’ overall
environment. The ‘ANAO analysis’ assessment maturity level rating only relates to the selected contract.
Source: ANAO assessment contracted providers’ Top Four mitigation strategy implementation.

Application controls
3.7 Of the three entities, application controls are applicable to ATO’s contract with DXC. ATO’s
application control strategy requires the approval of application control policies prior to their
implementation by DXC in accordance with ATO’s change management policies and procedures. The

52 Privileged users are a subset of users that can change or bypass a system’s security controls. Restricting
administrative privileges and monitoring privileged users can prevent or limit an adversary from accessing
systems following a cyber intrusion.

Auditor-General Report No. 9 2022–23


Management of Cyber Security Supply Chain Risks

44
Compliance with Protective Security Policy Framework requirements

ANAO assessed that DXC had implemented ATO’s policy and procedural requirements for application
control.
3.8 AFP manages the implementation of application control policies and monitoring of
associated security events directly, while application controls are not relevant to the services Telstra
provides to DFAT.53

Patching applications
3.9 Application patching requirements and relevance varied by entity. As specified in Table 1.6,
application controls are not relevant to the services provided by Telstra to DFAT and, as a result,
the ANAO did not assess Telstra’s compliance with application patching requirements.
3.10 The ANAO assessed all applications installed on a sample of servers managed by Hitachi and
identified that required patching timeframes and Policy 10 requirements were not always met.
Issues identified included:
• delays in patching vendor-supported applications of up to 11 months, which exceeds
required timeframes; and
• the presence of applications that were no longer vendor-supported and required to be
removed by Policy 10, and correspondingly had not been updated in several years.
3.11 The above issues related to applications managed by AFP on servers managed by Hitachi.
3.12 Although Hitachi had met requirements for patching applications, the ANAO assessed that
AFP had not established processes for ensuring that requirements for patching applications on
Hitachi managed servers were met. AFP did not obtain performance reporting relating to patching
applications on Hitachi managed servers and was not aware of the issues on the sampled servers.
3.13 ATO has a patch management process for applications with patching timeframes aligned
with ISM requirements. Contracted providers are responsible for deploying ATO-approved patches
in accordance with ATO’s patching and change management processes.

Patching operating systems


3.14 All entities had relevant operating system patching requirements for their contracted
provider. The ANAO assessed that Hitachi and DXC had implemented the requirements for patching
operating systems established by AFP and ATO respectively.
3.15 Telstra is responsible for managing and maintaining operating systems for Telstra devices
supporting the DFAT contract, including monitoring, assessing, and implementing updates to
operating systems within required timeframes. Telstra is required to perform a risk assessment of
reported operating system vulnerabilities and to propose mitigations to DFAT on identified risks.
DFAT authorises implementation of proposed mitigations through its change management
procedure.
3.16 The ANAO assessed the operating systems of a sample of Telstra devices. The ANAO
identified that Telstra does not always meet the required timeframes in DFAT’s patch management
standards and the PSPF. In some instances, operating system updates were not applied for several

53 The infrastructure used by Telstra to provide communications services to DFAT does not support the
execution of a variety of applications as a general-purpose computer might.

Auditor-General Report No. 9 2022–23


Management of Cyber Security Supply Chain Risks

45
years. Telstra did not perform a risk assessment and did not receive authorisation from DFAT to
cease the installation of the operating system updates. DFAT do not receive performance reporting
related to patch management for Telstra devices and has not established processes for monitoring
Telstra’s performance against its patch management standards and the PSPF.
3.17 The ANAO assessed that DFAT and Telstra had not implemented the requirements for
patching operating systems.

Restricting administrative privileges


3.18 AFP and ATO manage privileged access directly, in which the contracted provider is only
involved to provide information to support the authorisation and validation of access. Privileged
access is managed by DFAT’s contracted provider.
3.19 Telstra has processes for managing privileged access to its devices, and the ANAO examined
a sample of Telstra devices to verify implementation. The ANAO assessed Telstra’s privileged access
management processes as meeting the PSPF cyber security requirements.

Is the performance of security controls for relevant Protective Security


Policy Framework requirements appropriately monitored?
ATO has arrangements for monitoring cyber security issues related to the selected contracted
provider and specifies contract terms and conditions for monitoring performance for relevant
PSPF cyber security and entity policy requirements. None of the entities have specified terms
and conditions for managing non-compliance against PSPF and entity internal policy
requirements.
AFP and DFAT do not have contracting arrangements focussed on monitoring cyber security
issues and performance against relevant PSPF cyber security and entity policy requirements.
Of the audited entities, ATO was the only entity that had processes for assessing contracted
provider compliance against mandatory PSPF cyber security requirements. ATO had also
reassessed cyber security terms and conditions for the selected contract.

3.20 The Australian Signals Directorate’s Australian Cyber Security Centre (ACSC) highlights the
importance of government agencies managing cyber supply chains and has reported a significant
increase in malicious cyber activities against contractors holding government information.54 The
ACSC recommends that all Australian organisations prioritise the implementation of the Essential
Eight Maturity Model, including assessing their own network and evaluating risks associated with
cyber supply chains.
3.21 The Protective Security Policy Framework (PSPF) Policy 6: Security governance for
contracted goods and service providers (Policy 6) recommends entities establish robust governance
and assurance process so contracted providers implement applicable protective security
requirements. The PSPF recommends that non-corporate Commonwealth entities (NCEs) include
contract requirements that require contracted providers to perform periodic reviews of security

54 Australian Cyber Security Centre, Cyber Security for Contractors [Internet], ASD, 2021, available from
https://www.cyber.gov.au/sites/default/files/2021-10/PROTECT%20-
%20Cyber%20Security%20for%20Contractors%20%28October%202021%29.pdf [accessed 21 September
2022].

Auditor-General Report No. 9 2022–23


Management of Cyber Security Supply Chain Risks

46
Compliance with Protective Security Policy Framework requirements

arrangements under the contract to ensure the arrangements are current and address risks and
security environments.
3.22 The ANAO reviewed entity procedures and processes to assess whether the Policy 6
requirements had been clearly defined and addressed. Policy 6 requires procedures and processes
for monitoring performance of security controls to:
• specify contract terms and conditions requiring the monitoring of relevant PSPF
requirements by contracted providers;
• have guidance and support mechanisms to assist contracted provider monitoring and
reporting;
• have mechanisms for contracted providers to raise concerns with monitoring the
performance of security controls for relevant PSPF requirements; and,
• establish effective arrangements for contracted providers to report on the performance
of relevant provisions of PSPF and Information Security Manual (ISM).
Table 3.2: Arrangements for monitoring security controls for relevant PSPF
requirementsa
Process Component Entity Self-Assessment ANAO Analysis
AFP ATO DFAT AFP ATO DFAT

● ● ● ◑ ◕ ◑
Contract terms and
conditions for monitoring
security controls
Guidance and Support ● ● ● ◕ ● ◑
Issue Management ● ● ● ◑ ● ◑
Performance Reporting ● ● ● ◑ ● ◑
Key:
Ad hoc
◑ Partial or basic implementation and management of PSPF mandatory and supporting
requirements.
Developing
◕ Substantial, but not fully effective implementation and management of PSPF mandatory and
supporting requirements.
Managing
● Complete and effective implementation and management of PSPF mandatory and supporting
requirements.
Embedded Comprehensive and effective implementation and proactive management of PSPF
mandatory and supporting requirements and excelling at implementation of better-practice
guidance.
Note a: The ‘Entity Self-Assessment’ rating is the entity reported PSPF maturity level for the entities’ overall
environment. The ‘ANAO analysis’ assessment maturity level rating only relates to the selected contract.
Source: ANAO analysis.

Contract terms and conditions for monitoring security controls


3.23 Of the audited entities, ATO had specified requirements relating to the implementation and
monitoring of the mandatory PSPF cyber security requirements. The ATO’s contract with DXC
contains a broad clause that requires DXC to provide goods and services in accordance with the
PSPF cyber security requirements and ATO policies. ATO did not include contract terms and

Auditor-General Report No. 9 2022–23


Management of Cyber Security Supply Chain Risks

47
conditions for specific PSPF cyber security requirements and advised the ANAO that it took this
approach to ensure a flexible approach to the contract and its management. ATO established
agreed upon procedures with DXC that specify the timeframes for patching, and monitoring and
reporting requirements. ATO has not specified terms and conditions for managing non-compliance
against the broad contract clauses and the agreed upon procedures.
3.24 AFP and DFAT also have broad clauses requiring contracted providers to provide goods and
services in accordance with PSPF and entity internal policies. AFP and DFAT do not monitor
contracted provider performance against the PSPF and entity internal policies.
3.25 Policy 6 requires entities to periodically assess the effectiveness of its security terms and
conditions included in the contract to ensure cyber security risks are being addressed. As described
in paragraph 2.27, of the audited entities, ATO has assessed the effectiveness of their contracts in
addressing associated cyber security risks.

Recommendation no. 3
3.26 To improve monitoring of security controls:
(a) Australian Federal Police and Department of Foreign Affairs and Trade specify
requirements relating to the implementation and monitoring of the mandatory
Protective Security Policy Framework cyber security requirements in contractual
arrangements; and
(b) Australian Federal Police and Department of Foreign Affairs and Trade establish periodic
assessments of security terms and conditions of their contracts to address associated
cyber security risks.
Australian Federal Police response: Agreed, agreed in part.
3.27 The AFP agrees to improve monitoring of security controls via the inclusion of relevant
performance measures surrounding vendor security obligations and that relevant reporting
mechanisms are specified.
3.28 The AFP agrees to improve internal information security policy pertaining to the oversight
of vendors.
Department of Foreign Affairs and Trade response: Agreed.
3.29 DFAT agrees to the recommendation. The department will implement a program of
routine reviews to ensure model security contract clauses used for ICT procurements remain
compliant and address cyber risks appropriately.

Guidance and support


3.30 AFP and ATO policies and procedures provide guidance to contracted providers on
managing patches to operating systems and applications, which is in accordance with the
mandatory PSPF cyber security requirements and ACSC’s Essential Eight Maturity Model. As
described in paragraph 2.40, ATO provided guidance on how contracted providers should report
their compliance with mandatory PSPF cyber security requirements and entities’ security policy
requirements. AFP did not provide guidance on how contracted providers should report their
compliance with mandatory PSPF cyber security and the entities’ security policy requirements.
Auditor-General Report No. 9 2022–23
Management of Cyber Security Supply Chain Risks

48
Compliance with Protective Security Policy Framework requirements

3.31 No guidance was provided by DFAT to Telstra regarding monitoring of cyber security
controls.

Issue management
3.32 AFP and DFAT have arrangements by which contracted providers could raise issues relating
to security controls. As described in paragraphs 3.12 and 3.16, the ANAO did not observe that any
issues were raised by the contracted providers. AFP and DFAT do not monitor contracted provider
performance against mandatory PSPF cyber security requirements.
3.33 ATO and DXC have an effective process by which issues can be raised and managed. DXC
perform annual assessments of ATO’s environment to assess compliance with relevant ISM
requirements, the results of which are provided to ATO, and remediation activities are monitored
at monthly performance meetings. DXC notifies ATO of issues relating to patching operating
systems, including proposed remediations that could disrupt business operations, with DXC
performing remediation activities after ATO has provided written approval to proceed.

Performance reporting
3.34 ATO receives reporting directly relevant to mandatory PSPF cyber security and ATO’s policy
requirements. DXC provides information on cyber security related activities, such as uplift projects,
incidents, assessments, risks and controls. Monthly, quarterly and yearly performance reports
provide information on cyber security requirements relating to patch management, user access
management and malware protection.
3.35 AFP receives monthly reports from Hitachi however these do not report the implementation
of patch management, nor provide reporting on performance against the PSPF requirements or
AFP’s policies related to cyber security.
3.36 Reports provided by Telstra to DFAT specify the overall performance against terms and
conditions specified in the contract, but do not provide information about compliance with PSPF
cyber security requirements and DFAT policies. Telstra does not provide reporting on the
implementation of patch management on relevant devices.

Auditor-General Report No. 9 2022–23


Management of Cyber Security Supply Chain Risks

49
Recommendation no. 4
3.37 Australian Federal Police and Department of Foreign Affairs and Trade specify
requirements relating to reporting performance against relevant cyber security and entity policy
requirements in contractual arrangements.
Australian Federal Police response: Agreed in part.
3.38 The AFP agrees to improve procurement arrangements to ensure that contracts more
clearly articulate vendor PSPF obligations.
3.39 The AFP agrees to improve internal information security policy pertaining to the oversight
of vendors.
Department of Foreign Affairs and Trade response: Agreed.
3.40 DFAT agrees to develop model clauses and/or requirements to be specified in contractual
agreements with providers of ICT goods and/or services to ensure the department receives
performance reporting against cyber security and entity policy requirements.
3.41 The department will uplift model clauses and/requirements in new procurement activities,
taking into consideration limitations that may be introduced by Whole of Government (WofG)
Head Agreements that the department is required to utilise.

Is performance of security controls for relevant Protective Security


Policy Framework requirements accurately reported?
ATO had some processes for ensuring the accuracy of some performance reporting against
relevant PSPF requirements. These processes included verification against other information
sources, however, the verification activities were not documented. AFP and DFAT did not have
processes for validating the accuracy of performance reporting against relevant PSPF
requirements. None of the contracted providers had established assurance mechanisms for
verifying the information they provide to entities.
All three entities have mechanisms within contracts to address deviations in expected
performance, including financial penalties, performance, and service credits, but these
mechanisms did not cover cyber security risks or controls. AFP has patch management
timeframes that deviate from PSPF requirements and does not apply PSPF timeframes to
contracted providers.

3.42 The Protective Security Policy Framework (PSPF) requires non-corporate Commonwealth
entities (NCEs) to put in place measures for ensuring security controls included in the contract are
implemented, operated and maintained by the contracted provider. The Australian Signals
Directorate’s Australian Cyber Security Centre (ACSC) advises that it is important for entities to gain
independent assurances of the security posture of contracted providers.55 The accuracy of the
information used to support such assurances is important to allow entities to allocate resources to
areas of impact and priority.

55 Australian Cyber Security Centre, Cyber Supply Chain Risk Management [Internet].

Auditor-General Report No. 9 2022–23


Management of Cyber Security Supply Chain Risks

50
Compliance with Protective Security Policy Framework requirements

3.43 The ANAO has conducted a series of audits of cyber security and identified ongoing low
levels of cyber resilience of NCEs, inaccurate assessments and high rates of non-compliance with
the Top Four mitigation strategies mandated by Policy 10.
3.44 The ANAO reviewed entity procedures and processes to assess whether the Policy 6
requirements had been clearly defined and addressed including, whether entities have established
compliance and assurance mechanisms to ensure the accuracy of performance information to
support the management of performance.
Table 3.3: Arrangements for accurate performance reportinga
Process Entity Self-Assessmentb ANAO Analysis
Component
AFP ATO DFAT AFP ATO DFAT
Compliance
and assurance ● ● ● ◑ ◕ ◑
Performance
management ● ● ● ◑ ◕ ◑
Key:
Ad hoc
◑ Partial or basic implementation and management of PSPF mandatory and supporting
requirements.
Developing
◕ Substantial, but not fully effective implementation and management of PSPF mandatory and
supporting requirements.
Managing
● Complete and effective implementation and management of PSPF mandatory and supporting
requirements.
Embedded Comprehensive and effective implementation and proactive management of PSPF
mandatory and supporting requirements and excelling at implementation of better-practice
guidance.
Note a: The assessment was limited to mitigation strategies that were relevant to the nature of the contracts.
Note b: The ‘Entity Self-Assessment’ rating is the entity reported PSPF maturity level for the entities’ overall
environment. The ‘ANAO analysis’ assessment maturity level rating only relates to the selected contract.
Source: ANAO analysis.

Compliance and assurance


3.45 AFP and DFAT do not receive performance information related to cyber security. As
described in paragraph 2.40, ATO receives performance information relating to cyber security
through its Cyber Threat Assurance Program and contracted provider risk registers. ATO performs
limited verification of performance information against reporting from other sources, and security
and change management assurance activities. ATO does not document all verification activities
performed. None of the contracted providers have established assurance mechanisms for verifying
the information they provide to entities.

Auditor-General Report No. 9 2022–23


Management of Cyber Security Supply Chain Risks

51
Recommendation no. 5
3.46 To improve quality of performance reporting:
(a) Australian Federal Police and Department of Foreign Affairs and Trade establish a
performance framework supporting Recommendation 4, including validating the
accuracy of performance reporting provided by contracted providers in relation to cyber
security; and
(b) Australian Taxation Office improve processes for verifying performance information
provided by contracted providers, including documenting verification activities.
Australian Federal Police response: Agreed in part.
3.47 The AFP agrees to improve internal information security policy pertaining to the oversight
of vendors.
3.48 The AFP agrees to improve monitoring of security controls via the inclusion of relevant
performance measures surrounding vendor security obligations and that relevant reporting
mechanisms are specified.
3.49 The AFP agrees to improve procurement arrangements to ensure that contracts more
clearly articulate vendor PSPF obligations.
Australian Taxation Office response: Agreed.
3.50 The ATO will improve the quality of performance reporting for verifying performance
information provided by contracted providers, and documenting verification activities.
Department of Foreign Affairs and Trade response: Agreed.
3.51 DFAT agrees to include contractual performance parameters in relation to cyber security
within all new ICT procurement activities, taking into consideration potential limitations in WofG
procurement arrangements and head agreements.
3.52 To support Recommendations 2 and 4, DFAT will ensure contract management plans for
new procurements will include routine engagement of internal cyber security specialists to
validate performance reporting against these requirements.

3.53 AFP and DFAT advised the ANAO that their Cyber Security Operations Centres (CSOC)
manage cyber security risks and monitor security events, including those relating to contracted
providers. Both CSOCs monitor activity performed by contracted providers and scan for
vulnerabilities within entity systems. Neither CSOC identified the issues discussed in paragraphs
3.10 and 3.16.

Performance management
3.54 As discussed in paragraph 2.47, all three entities have established mechanisms within
contracts to address deviations in expected performance, including financial penalties,
performance, and service credits, but these mechanisms did not cover cyber security risks or

Auditor-General Report No. 9 2022–23


Management of Cyber Security Supply Chain Risks

52
Compliance with Protective Security Policy Framework requirements

controls.56 AFP has not applied penalties or credits since the award of the Hitachi contract. In 2019
ATO received service credits from DXC due to risk management requirements not being met and
DFAT received service credits from Telstra due to distributed denial of service requirements not
being met.
3.55 As described in paragraphs 3.10 and 3.16, the ANAO assessed the patch management
processes of AFP and DFAT as not meeting PSPF and entity policy requirements. Neither entity
monitors patch management processes of their contracted provider, nor has patch management
been identified as a contractual performance issue.
3.56 AFP advised the ANAO that its patch management standards are predominantly focussed
on systems managed by AFP and not by contracted providers, and that as the standards do not
consider external factors that may exist for contracted providers, AFP has made a business decision
not to apply those standards to its contracted providers. AFP did not document the risk assessment
associated with the business decision. AFP further advised ANAO that it uses longer patching
timeframes than those specified in the PSPF and ACSC Essential Eight to ensure the published
patches are operating effectively, and because it would prefer to wait to apply a single security
patch than a series of patches that may not resolve the security risk.
3.57 No security reports, or reports of security incidents, have been provided to DFAT since the
start of the Telstra contract. DFAT stated in one instance it needed to contact Telstra to obtain
information on a known security vulnerability, which was not initially reported by Telstra.

Grant Hehir Canberra ACT


Auditor-General 14 December 2022

56 For example, penalties related to availability or service quality requirements, but did not include non-
compliance against relevant mandatory PSPF cyber security and department security policy requirements.

Auditor-General Report No. 9 2022–23


Management of Cyber Security Supply Chain Risks

53
Appendices

Auditor-General Report No. 9 2022–23


Management of Cyber Security Supply Chain Risks

55
Appendix 1 Entity responses

Auditor-General Report No. 9 2022–23


Management of Cyber Security Supply Chain Risks

56
Appendix 1

Auditor-General Report No. 9 2022–23


Management of Cyber Security Supply Chain Risks

57
ANAO comment on Australian Federal Police response
(a) Paragraph 1.11 outlines non-corporate Commonwealth Entities’ responsibilities for
security risks from procuring goods and services, including ensuring contracted providers
comply with relevant Protective Security Policy Framework (PSPF) requirements.
(b) As discussed in paragraph 2.39, 2.46, 2.47, 3.12 and 3.24, AFP requires contracted vendors
to comply with PSPF and internal policy requirements but does not monitor performance
against those requirements. These requirements include mandatory PSPF cyber security
requirements. As discussed, in paragraph 3.31. AFP did not provide guidance to contracted
providers on how to report compliance against PSPF and entity security policy
requirements.
(c) Paragraph 2.11 outlines AFP’s approach to identifying and managing ICT procurement
risks. AFP does not provide sufficient guidance to assist with the consideration of cyber
security risks and mandatory PSPF cyber security requirements within risk assessments.
As discussed in paragraphs 2.50 to 2.52 and 3.45, AFP does not verify the reliability of
performance information nor does it receive information relating to cyber security. AFP
does not assess or monitor contracted provider compliance against relevant PSPF
requirements and AFP's internal policies. AFP's response does not address these
deficiencies.

Auditor-General Report No. 9 2022–23


Management of Cyber Security Supply Chain Risks

58
Appendix 1

Auditor-General Report No. 9 2022–23


Management of Cyber Security Supply Chain Risks

59
Auditor-General Report No. 9 2022–23
Management of Cyber Security Supply Chain Risks

60
Appendix 1

Auditor-General Report No. 9 2022–23


Management of Cyber Security Supply Chain Risks

61
Appendix 2 Improvements observed by the ANAO
1. The existence of independent external audit, and the accompanying potential for scrutiny
improves performance. Improvements in administrative and management practices usually
occur: in anticipation of ANAO audit activity; during an audit engagement; as interim findings are
made; and/or after the audit has been completed and formal findings are communicated.
2. The Joint Committee of Public Accounts and Audit (JCPAA) has encouraged the ANAO to
consider ways in which the ANAO could capture and describe some of these impacts. The ANAO’s
2021–22 Corporate Plan states that the ANAO’ s annual performance statements will provide a
narrative that will consider, amongst other matters, analysis of key improvements made by
entities during a performance audit process based on information included in tabled performance
audit reports.
3. Performance audits involve close engagement between the ANAO and the audited entity
as well as other stakeholders involved in the program or activity being audited. Throughout the
audit engagement, the ANAO outlines to the entity the preliminary audit findings, conclusions
and potential audit recommendations. This ensures that final recommendations are appropriately
targeted and encourages entities to take early remedial action on any identified matters during
the course of an audit. Remedial actions entities may take during the audit include:
• strengthening governance arrangements;
• introducing or revising policies, strategies, guidelines or administrative processes; and
• initiating reviews or investigations.
4. In this context, the below actions were observed by the ANAO during the course of the
audit. It is not clear whether these actions and/or the timing of these actions were planned in
response to proposed or actual audit activity. The ANAO has not sought to obtain assurance over
the source of these actions or whether they have been appropriately implemented.

Australian Federal Police


• AFP endorsed the Cyber Security Strategy 2021—2024 in June 2022.

Australian Taxation Office


• ATO developed performance measures for Critical Security Patching, Harmful Code
Detection and Containment, and Timely Updates to Security Documentation, and have
included these as part of standard clauses in new contracts.
• ATO documented an IT Security Procurement guide which specifies the requirement for
the Statement of Requirements requiring review from the Cyber Governance and
Operations team. It includes guidance on the validity and expiry of risk assessments,
reassessments and governance arrangements.
• ATO drafted a Procurement Engagement Standard Operating Procedure which outlines
when and how the Cyber Governance and Operations team engage with procurements
teams on information security risks and requirements.

Auditor-General Report No. 9 2022–23


Management of Cyber Security Supply Chain Risks

62
Appendix 2

Department of Foreign Affairs and Trade


• DFAT documented a DFAT Procurement Policy in June 2022, which describes processes for
ensuring relevant Protective Security Policy Framework cyber security requirements are
considered during the procurement process within the DFAT Procurement Policy.
• DFAT documented new policies and procedures as a result of DFAT’s Security Uplift
Program. These policies and procedures have been accepted by Assistant Secretary Cyber
Security and Networks Branch. The policies and procedures have been disseminated to
business areas for implementation, pending formal sign-off by 9 September 2022.
• DFAT reported in the 2022 Australian Signals Directorate Cyber Security Survey that it had
achieved Maturity Level 2 compliance with the Australian Cyber Security Centre’s Essential
Eight Maturity Model.

Auditor-General Report No. 9 2022–23


Management of Cyber Security Supply Chain Risks

63
Appendix 3 Policy 10 and Essential Eight Maturity Model Timeline
1. The diagram describes the history of the Protective Security Policy Framework (PSPF)
Policy 10 (Policy 10) and Essential Eight Maturity Model. The applicable mandatory PSPF cyber
security requirements for this audit is the November 2019 version of the Policy 10 requirements
(see Box 3). The November 2019 Policy 10 requirements were applicable to non-corporate
Commonwealth Entities (NCEs) during the planning of this audit in September 2021. The July 2021
Essential Eight Maturity Model changes were not mandated in Policy 10 until March 2022 and not
required to be implemented by NCEs until July 2022.

Auditor-General Report No. 9 2022–23


Management of Cyber Security Supply Chain Risks

64
Figure A.1 Key changes in Protective Security Policy Framework Policy 10 and Essential Eight Maturity Model
July 2021
June 2017
Essential Eight Maturity Model includes
Essential Eight Maturity Model November 2019
April 2013 Maturity Level Zero
developed Policy 10 requirement to consider
Policy 10 mandated Top Four and baselines Maturity Level Two
Mitigation Strategies all of the mitigation strategies

Policy 10 Policy 10 Policy 10


April 2013 period November 2019 period July 2022 period

2014 2015 2016 2017 2018 2019 2020 2021 2022 2023

Audit Period

October 2018 July 2022


Revision of overall PSPF policies October 2020 Policy 10 mandated all Essential
including Policy 6 Essential Eight Maturity Model includes Eight mitigation strategies
Maturity Level One, Two and Three and
Essential Eight Maturity Level Two
Baseline

Source: ANAO analysis of PSPF Policy 10 and the Essential Eight Maturity Model.

You might also like