Cyber Security Governance Principles PDF
Cyber Security Governance Principles PDF
Governance
Principles
October 2022
CYBER SECURITY GOVERNANCE PRINCIPLES
Table of Contents
2
Principle 5: Plan for a significant Appendix C: Industry requirements
cyber security incident 40 and standards52
Preparation 40 Consumer Data Right (CDR) 53
Communications 44 My Health Records Act 2012 53
Case Study 5: Major cyber attack on Australian Energy Sector Cyber
Toll Group 47 Security Framework 53
3
CYBER SECURITY GOVERNANCE PRINCIPLES
Foreword
4
Foreword
5
CYBER SECURITY GOVERNANCE PRINCIPLES
Snapshot of
the Principles
roles and effective cyber resilience 1. Cyber risk and cyber strategy not
featuring periodically on board
responsibilities Comprehensive and clear board agendas
reporting, including engagement with 2. Chair and board not annually
management and updates on emerging reviewing skills to ensure that
trends, is a key mechanism by which directors have a minimum
a board can assess the resilience of understanding of cyber security risk
the organisation
3. Board reporting on cyber risk
External experts can play a role in is hard to digest and features
providing advice and assurance excessive jargon with a reliance on
to directors and identify areas technical solutions
for improvement 4. Limited or no external review or
assurance of cyber risk controls and
strategy
5. No clear lines of management
responsibility for cyber security
6
Snapshot of the Principles
security in approach to risk management 1. Cyber risk not reflected in existing risk
management frameworks
existing risk While cyber risk cannot be reduced to 2. High management confidence that
management zero there are a number of accessible cyber risk controls are effective
and low-cost controls that all
practices organisations can utilise
without regular external validation
3. Over reliance on the cyber security
The board should regularly assess controls of key service providers, such
the effectiveness of cyber controls as cloud software providers
to account for a changing threat 4. Cyber security controls of potential
environment, technology developments vendors are not assessed in the
and the organisation’s capabilities procurement process for key goods
and services
5. Prolonged vacancies in key cyber
management roles
culture of cyber by identifying opportunities for the 1. Board and executives do not
organisation to build cyber resilience undertake cyber security education
resilience nor participate in testing
Regular, engaging and relevant training 2. Cyber security is not reflected in
is a key tool to promote a cyber resilient the role statements and KPIs of
culture, including specific training key leaders
for directors
3. Communication from leaders does
Incentivise and promote strong not reinforce the importance of
cyber security practices, including cyber resilience to staff (cyber is seen
participating in phishing testing and as an issue only for frontline staff
penetration exercises to manage)
4. There is a culture of ‘exceptions’
or workarounds for board and
management with respect to cyber
hygiene and resilience
7
CYBER SECURITY GOVERNANCE PRINCIPLES
Cyber strategy 3. Who has internal responsibility for the management and
protection of our key digital assets and data?
4. Where, and with whom, are our key digital assets and
data located?
Terminology
Cyber Security • An overarching term that captures the steps, measures and processes
used to protect and defend the confidentiality, integrity, availability
of data in an organisation’s systems as well as protecting the
systems themselves
Cyber Risk • The potential loss or harm to an organisation from a cyber incident. The
loss covers technical systems and infrastructure, use of technology or
reputation of an organsation
Cyber Threat • Any attack or event, or potential attack or event, that may harm an
organisation’s information systems and infrastructure
• Cyber threat includes attempts by external parties to breach an
organisation’s cyber defences
Cyber Incident • An unauthorised cyber security event, or a series of such events, that
has the potential to compromise an organisation’s business operations
• Cyber incidents cover the spectrum of events from accidental data
losses, such as an employee misplacing a USB, to criminal attacks, issue
motivated groups and state sponsored actors
Digital • Steps or processes taken by organisations to generate and store data via
internet facing systems
• Data generated via internet facing systems is increasingly seen as one of
the key assets (and risks) for many organisations
9
CYBER SECURITY GOVERNANCE PRINCIPLES
Introduction
10
Introduction
Duty to act Directors have a duty to act with care and diligence to guard
against key business risks. This includes ensuring appropriate
with care and systems are in place to bolster cyber resilience, as well as
prevent and respond to cyber incidents.
diligence
Duty to act Directors must exercise their powers and discharge their duties
in good faith in the best interests of the company, and for a
in good faith proper purpose. In making decisions on cyber security on behalf
of the company, directors must consider the impact of those
and in the best decisions on shareholders/members and stakeholders including
interests of the employees, customers, suppliers and the broader community.
corporation
PRIVACY ACT
ASIC V RI ADVICE GROUP PTY LTD
The Privacy Act 1988 (the Privacy Act)) - with
its focus on how organisations collect, manage In 2021, the Australian Securities and
and dispose of personal information is a key Investments Commission (ASIC) commenced
legislative framework relevant to the governance its first enforcement action against AFSL
of cyber security. holder, RI Advice Group Pty Ltd (RI Advice),
for breaches arising from a failure to have
Two key regimes under the Privacy Act 1988 (the
adequate cyber security policies, systems and
Privacy Act) that directors should be aware of are:
resources.
1. Notifiable Data Breaches (NDB) scheme –
A number of weaknesses were identified in
requiring an organisation to notify affected
the management of cyber risks across the
individuals and the Office of the Australian
RI Advice network, including a) outdated
Information Commissioner (OAIC) as soon as
antivirus software; b) no filtering or
practicable of a material data breach
quarantining of emails; c) no backup systems
Australian Privacy Principle 11 – Security of in place or backups being performed; and
Personal Information (APP 11) – requiring an d) poor password practices (e.g. sharing of
organisation to take active measures to ensure passwords between employees and use of
the security of personal information it holds default passwords).
13
CYBER SECURITY GOVERNANCE PRINCIPLES
Principle 1:
Set clear roles and
responsibilities
14
Principle 1: Set clear roles and responsibilities
At large organisations, the board may assign of director training and upskilling on cyber is
closer oversight of cyber security governance to a discussed at Principle 4. That said, directors
sub-committee of the board, such as the risk should remember that the simplest questions are
committee, audit committee or a technology often the ones that are never asked, and should
committee. However, the evolving nature of cyber not be afraid to raise these with management.
security, and the potential severity and velocity of Equally important is the board seeking assistance
the risk, may warrant cyber security being from third party experts, including external
discussed regularly at full board meetings. For assurance and testing (detailed below).
example, as a standing item on IT infrastructure,
Ultimately, one of the key roles directors can
digital initiatives or a component of risk or
play in fostering a cyber resilient culture within
strategy. Board and committee charters should
the organisation and modelling effective cyber
be reviewed regularly to confirm that roles and
practices (discussed at Principle 4). Every
responsibilities are clear, especially with respect to
director should take responsibility to enhance
evolving risks such as cyber security.
their own skills and knowledge on cyber security.
Key to effective oversight of cyber risk is the board
receiving regular reporting and engagement with OX 1.1 SMEs AND NFPs - ROLES AND
B
management (discussed further below). RESPONSIBILITIES
The delegation of cyber risk management or • Document where possible who has
strategy to board committees, and ultimately responsibility for cyber security
management, should be detailed not only in
the charter or governing documents of the • Appoint a cyber champion to promote
respective committee, but also the organisation’s cyber resilience and respond to questions
overarching cyber strategy or policy. • Consider whether a director, or group of
To support the board’s role in oversight and allow directors, should have a more active role in
constructive challenge of management, directors oversight of cyber security
should be equipped with appropriate skills and • Collect data where possible on the
understanding of cyber risk. The importance effectiveness of cyber risk practices
15
CYBER SECURITY GOVERNANCE PRINCIPLES
Large
organisations SMEs
Board Board
AD-HOC/
FORMALISED
INFORMAL
REPORTING
REPORTING
Board Committee CEO/Managing
(Risk / Audit /
Technology Committee) External experts Director
and assurance
Executive
Key managers,
responsibility
staff
(CIO/CTO/CRO/CISO) Key cyber and
digital service
providers
Whole of
Key staff
organisation
Whole of
organisation
16
Principle 1: Set clear roles and responsibilities
17
CYBER SECURITY GOVERNANCE PRINCIPLES
Trend data,
BOX 1.3 COMMON BOARD
Role of external experts
where
available, REPORTING METRICS Given the board imperative to monitor and stay
is key across evolving cyber risks and key capabilities,
to insightful
board • cyber incident detection, prevention and there can be a key role for independent external
reporting. response, including incident trend analysis experts to provide an outside perspective. In
the event of a cyber incident, external experts
• cyber strategy performance, key initiatives
can be a valuable source of assistance for an
and progress to date
organisation’s immediate response and recovery.
• staff related incidents, such as staff
That said, organisations should be cautious about
accessing or misusing data in breach
being too reliant on external experts given the
of policies
materiality of the risk to many organisations.
• internal audit activities, including outcomes Management capability uplift is critical,
of vulnerability and threat assessments alongside education of directors to support their
• external party assessment, including oversight function.1
penetration testing results and
benchmarking against peers and
international standards
• staff cyber training rates and completion
• phishing exercise results
• assessment of the broader threat
environment, informed by vendor alerts,
ACSC alerts and intelligence shared
by other organisations, and response
to threats
1. Please see the AICD Director Tool: Directors’ right to seek external professional advice (available here), for further
18 information on a director obtaining external advice.
Principle 1: Set clear roles and responsibilities
EXTERNAL AUDIT AND BENCHMARKING: Factors that can be assessed within external
COMPLIANCE DOES NOT EQUAL SECURITY cyber audit and benchmarking include:
Independent experts can provide assessments • Regulatory and standards compliance: Does
of an organisation’s risk management controls, the organisation meet its domestic legal and
and how they measure up across international regulatory requirements? Is data or information
standards frameworks (e.g. National Institute covered under privacy provisions stored
of Standards and Technology, International appropriately? How does the organisation align
Standards Organisation). This information or compare to key standards frameworks?
provides the board with an understanding of the
organisation’s cyber risk maturity, which is an • Data stocktake and access: What is the
important input for developing the organisation’s key data that the organisation collects and
cyber risk strategy and cyber risk controls. It can stores? Who, and what partners, have access
also provide directors with a useful benchmark to this data? Is data or information stored
against the organisation’s industry peers. appropriately, including consistent with
regulatory obligations? Does the organisation
However, while compliance to a particular regularly undertake a thorough data stocktake
industry standard is important, it should not be and question whether all information needs to
misunderstood as placing an organisation in continue being held? Is there an overarching
a sound position to defend attacks or respond data governance strategy that covers from
to a cyber incident. Compliance to an industry creation to destruction?
standard is just one part of a cyber strategy.
• Technical compliance: What software systems
For some organisations it may be appropriate are used and how are they kept up to date? Is
for an assessment of cyber resilience, including there a process for safely disposing of legacy
the performance of the cyber strategy, to be a systems and all data? Are there authentication
component of the periodic audit program. systems in place? What controls ensure third
parties cannot access internal systems without
appropriate security measures? Are there logs
BOX 1.4 GOVERNANCE RED FLAGS for key systems so there is a record of who has
accessed what data?
1. Cyber security not featuring periodically on
board agendas • Continuous improvement: Do core security
measures align with best practice? Are there
2. The board not annually reviewing skills to
systems in place to deal with the contemporary
ensure that directors have an appropriate
threat landscape?
understanding of cyber risk
• Awareness of threats: What alerts or
3. Board reporting on cyber risk is hard to
monitoring is in place to flag threats and
digest and features excessive jargon with a
breaches or respond to critical patching alerts?
reliance on technical solutions
Are staff trained to respond appropriately and
4. Limited or no external review or assurance in a timely way?
of cyber risk controls and strategy
• Governance and strategy: What are the
5. No clear lines of management responsibility systems and processes in place to manage
for cyber security and mitigate risk, or respond to threats or real
events? How do individual responsibilities fall
to each team? What approvals would they
require, and to whom would they report?
• Overall risk assessments: How does the level
of resilience across the organisation compare
against industry peers in the context of
alignment with standards and testing results?
How does this resilience and risk posture align
with the risk appetite and cyber strategy of
the organisation?
19
CYBER SECURITY GOVERNANCE PRINCIPLES
20
Principle 1: Set clear roles and responsibilities
21
CYBER SECURITY GOVERNANCE PRINCIPLES
Principle 2:
Develop, implement
and evolve a
comprehensive
cyber strategy
22
Principle 2: Develop, implement and evolve a comprehensive cyber strategy
23
CYBER SECURITY GOVERNANCE PRINCIPLES
A core component of developing a cyber strategy To minimise the risk of data theft or loss,
is meticulously identifying the organisation’s key organisations should only collect and store
digital assets and data documenting the answers the minimum amount of personal information
to the questions in Box 2.2. that is legally required for its relevant services
or operations. For example, some data may
A board should have visibility over these key
be necessary for a “point in time” only (e.g.
elements and receive regular updates from
onboarding or ‘Know Your Client” verifications)
management as part of ongoing evaluation
and can be deleted after certain activities.
processes (see below). This assessment will assist
directors to understand where cyber vulnerabilities There are specific requirements for some
may exist and will be a key input into risk organisations to keep some identity documents
management processes – discussed in Principle 3. (such as requirements in satisfaction of the
telecommunications metadata obligations)
OX 2.2 QUESTIONS FOR DIRECTORS
B and in this case, directors need to be satisfied
TO ASK that data obtained for a legislative obligation is
both secure (as required by law) but that data
1. Who has internal responsibility for the has also not been stored for ‘other reasons’ in
management and protection of our key the organisation.
digital assets?
Importantly, many organisations fail to
2. Who has access or decision-making rights securely delete or destroy sensitive customer or
to our key digital assets? For example, organisational data once systems are replaced
can all customer-facing staff access and or the data is no longer required. This data (if not
change key databases? securely destroyed and on hardware) can often
3. What access to key digital assets is be readily accessed by third parties. Therefore,
provided to third parties? lifecycle management of all data must be part
of any organisation’s cyber security strategy
4. Where are our key digital assets located? and should include secure destruction of all
Is this still appropriate given identified sensitive data.
cyber risks?
All sensitive data should be stored in an encrypted
5. What is the role of external suppliers in and stored in secure manner, and access to such
hosting and managing key digital assets? data strictly monitored.
6. What is the impact of the loss A regular “spring clean” of all data collected and
or compromise of any of our key stored is an effective risk control as part of a
digital assets? broader data management strategy.
24
Principle 2: Develop, implement and evolve a comprehensive cyber strategy
25
CYBER SECURITY GOVERNANCE PRINCIPLES
1. Utilise the ACSC Cyber Security Assessment Tool to identify the cyber security strengths of the
organisation and understand areas for improvement
2. Assess whether utilising reputable external providers will enhance cyber resilience over
managing in-house
3. Assess whether there is certain data (e.g. employee or customer data) that does not need to
be collected
4. Establish an Access Control System to determine who should have access to what
5. Regularly repeat cyber security training and awareness amongst all employees
6. Promote strong email hygiene (e.g. avoid suspicious email addresses and requests for login or
bank details)
(Source: Drawn from ACSC Small Business Cyber Security Guide)
26
Principle 2: Develop, implement and evolve a comprehensive cyber strategy
27
CYBER SECURITY GOVERNANCE PRINCIPLES
Principle 3:
Embed cyber
security in existing
risk management
practices
Cyber-risk appetite
KEY POINTS Cyber-risk appetite is, in broad terms, the risk
that an organisation is willing to take in its digital
1. Cyber risk, despite its prominence and
activities to achieve its strategic objectives and
velocity, is still an operational risk that fits
business plans. Importantly, an organisation’s
within an organisation’s existing approach
cyber-risk appetite is distinct from its cyber-
to risk management
risk profile, which commonly represents an
2. While cyber risk cannot be reduced to organisation’s ‘point in time’ position with respect
zero there are a number of accessible and to cyber risk once controls have been factored in
low-cost controls that all organisations (discussed below).
can utilise
A clear cyber-risk appetite can be used as an
3. The board should regularly assess the input by directors and management to inform
effectiveness of cyber controls to account current and future business activities, as well
for a changing threat environment, as overall strategic decision making and the
technology developments and the allocation of resources. For example, a cyber-risk
organisation’s capabilities appetite would inform whether an organisation
partners with a third party, particularly if the
arrangement involves the third-party utilising
or handling the key digital assets (i.e. ‘crown
jewels’) of the organisation. Further, it may assist
in investment decision making and where a board
should prioritise additional resources for cyber
security controls.
28
Principle 3: Embed cyber security in existing risk management practices
29
CYBER SECURITY GOVERNANCE PRINCIPLES
In general, management is responsible for For all organisations, the ACSC’s Strategies
developing, implementing and managing risk to Mitigate Cyber Security Incidents provides
controls. In larger organisations, a dedicated risk/ a comprehensive resource for operationally
audit or technology committee allows directors focused cyber-risk controls, including a number of
to more closely oversee management. For practical steps smaller organisations can take in
smaller organisations, this oversight may occur mitigating cyber risks.
in an informal manner, for example through
For larger organisations, traditional risk-control
conversations with key personnel. However, it is
frameworks, such as the three lines of defence,
central to sound risk governance that directors
can be readily utilised for managing cyber risk.
understand what cyber risks exist, what controls
The advantage of utilising already embedded
are in place to reduce or mitigate those risks, and
risk frameworks is they are understood across an
how those controls are performing.
organisation and draw upon the expertise of key
Cyber-risk controls will ultimately depend on risk and compliance staff, reducing the likelihood
an organisation’s size, complexity, information that cyber risk remains the sole responsibility of IT
systems and infrastructure and cyber-risk or digital teams.
appetite. However, there are common stages of
risk control that can be applied in organisations
of all sizes to manage cyber risks.
30
Principle 3: Embed cyber security in existing risk management practices
31
CYBER SECURITY GOVERNANCE PRINCIPLES
32
Principle 3: Embed cyber security in existing risk management practices
33
CYBER SECURITY GOVERNANCE PRINCIPLES
Principle 4:
Promote a culture
of cyber resilience
34
Principle 4: Promote a culture of cyber resilience
35
CYBER SECURITY GOVERNANCE PRINCIPLES
36
Principle 4: Promote a culture of cyber resilience
4. Pick a staff member to be a ‘cyber security Becoming cyber literate can help directors gain
leader’ to promote strong cyber practices confidence in their understanding of the cyber
and respond to questions from other staff threat landscape, the potential impacts that cyber
failings can have on the organisation, strategies
5. Subscribe to ACSC alerts to stay across for improving cyber resilience, as well as response
emerging cyber threats and recovery in the event of cyber incidents.
Directors should also keep across the evolving
cyber security regulatory landscape, including legal
obligations that may apply to their organisation.
Critically, this requires an understanding of
the organisation’s notification requirements to
regulatory and reporting bodies such as the OAIC,
APRA and the ACSC in the event of a cyber incident.
37
CYBER SECURITY GOVERNANCE PRINCIPLES
Collaboration
Directors can also instill an outward and
proactive focus on the cyber threat landscape
by encouraging management to participate
in information sharing and collaboration
with regulators and industry peers, within
legal constraints.
Directors should test whether their organisation
is contributing to formal intelligence exchanges,
such as threat information, and whether
this network is providing timely updates on
emerging threats. Large organisations, for
example, are encouraged to participate in the
ACSC Partnership Program and Joint Cyber
Security Centres.
Management should also be encouraged to
contribute to collaborative industry fora that can
share information on effective risk control and
may be able to assist in cyber incident recovery,
for example through pooling of resources to
support impacted organisations
38
Principle 4: Promote a culture of cyber resilience
39
CYBER SECURITY GOVERNANCE PRINCIPLES
Principle 5:
Plan for a
significant cyber
security incident
Preparation
KEY POINTS A board and organisation that is well prepared for
a significant cyber incident will be in a stronger
1. All organisations are susceptible to a
position to mitigate impacts to its business
significant cyber incident and directors
operations, reputation and stakeholders, as well
should proactively plan for an incident
as recover in a timely manner.
2. Simulation exercises and scenario testing
Directors should appreciate that, following a
are key tools for the board and senior
significant cyber incident, information may be
management to understand and refine
fluid and there may be inaccurate or unverified
respective roles and responsibilities
material being spread via media, chat forums and
3. A clear and transparent approach to elsewhere on the Internet. Such information may
communications with all key stakeholders be disseminated by the actual perpetrator of the
in a significant cyber incident is critical attack or others impersonating them to create
in mitigating reputational damage and confusion or profit opportunistically.
allowing for an effective recovery
For this reason, communications during a ‘live’
cyber incident must be planned beforehand
so there is a consistent approach as to how
the organisation will shape the narrative, who
their external incident responders will be, and
which experts will be critical in shaping the
communications. This way, irrespective of the
media attention and counter narratives that may
circulate during the incident, the organisation
will be able to respond to all stakeholders in a
constructive and measured way.
40
Principle 5: Plan for a significant cyber security incident
41
CYBER SECURITY GOVERNANCE PRINCIPLES
Cyber Strategy
Cyber Incident
Response Plan
Post-incident
Cyber incident
review, lessons
detected
learned
Cyber Incident
Life Cycle
Recovery Triage -
and remediation determine
steps severity
Communicate
Contain and
with key
eradicate
stakeholders
Directors should approve the Response Plan and Maintaining hard copies of cyber incident
have an understanding of the responsibilities of response plan documents – and other documents
the board and/or specific directors in the event – is essential. In the event of an incident, the
of an incident. The Response Plan should be organisation’s systems may be inaccessible.
cascaded through the organisation with key staff
While a Response Plan will need to be tailored
aware of it and their roles and responsibilities.
to each organisation, its personnel and assets,
The Response Plan should be reviewed on a a range of templates are available, such as
regular basis and be updated based on changes the Victorian Government Incident Response
in environmental factors (e.g. emerging threats), Plan Template, and the ACSC Cyber Incident
organisational structure and any changes to Response Plan Guidance and Template.
the key digital assets (or ‘crown jewels’) of
the organisation.
42
Principle 5: Plan for a significant cyber security incident
43
CYBER SECURITY GOVERNANCE PRINCIPLES
44
Principle 5: Plan for a significant cyber security incident
Recovery
OX 5.4 KEY POST-INCIDENT
B
A comprehensive Response Plan should also REVIEW QUESTIONS
address what happens once the immediate crisis
has passed, outlining the process for recovery. 1. What have we learnt about our existing
Operationally, this can include the approach to systems, controls and cyber behaviour,
recovering IT networks, systems and applications including weaknesses?
to ensure business continuity. This may be done in 2. Did everyone know their respective roles
partnership with external IT advisers. and follow them?
For directors, a key role in the recovery phase is to 3. Did the organisation become aware of the
assess where improvements may be required to incident within an appropriate timeframe?
an organisation’s risk management controls and Was the incident reported to us by a third
cyber strategy. For larger organisations, a post- party like a vendor or the media? What
incident review may assist in identifying lessons does this tell us about monitoring and
learned and ultimately promote a cyber resilience reporting controls?
culture. Key questions or issues that would be
covered in a post-incident review are highlighted 4. Were the Plan steps, responsibilities and
in Box 5.4. procedures followed? Did the steps mitigate
the impact of the incident?
As highlighted in the case study below,
an organisation that learns from a cyber 5. Was the board appropriately briefed about
incident is in a far stronger position to prevent the incident and had sufficient oversight
future incidences. and visibility of management actions?
6. What improvements could be made to
communication plans?
45
CYBER SECURITY GOVERNANCE PRINCIPLES
Remediation
Although an organisation that is a victim of an
attack may feel aggrieved that they have had
data stolen or leaked, they should not lose sight of
who has been most compromised by the breach.
The organisation’s response must be crafted with
those most impacted front of mind.
Where a major cyber incident has occurred and
especially where it involves the loss of sensitive
personal data, the organisation should decide
what support and/or compensation should be
offered to those impacted. For some customers,
even the thought of having their personal data
exposed is enough to cause anxiety, stress and an
overwhelming sense of powerlessness. Where the
organisation identifies it has vulnerable customers
(e.g. victims of domestic violence) that have been
impacted it should consider providing additional
targeted support.
Where the organisation identifies it has vulnerable
customers (e.g. victims of domestic violence) that
have been impacted it should consider providing
additional targeted support.
At a minimum, support for all customers
might take the form of advising them of what
recommended steps they should take to mitigate
the impact of the lost data (for example identity
theft risk) and where they can go to access more
expert advice or support (e.g. credit monitoring
services or IDCare).
It is better practice though, in a situation where
people have been significantly exposed by a cyber
breach, for the compromised organisation to offer
to pay compensation (financial or in-kind)
and/or provide reimbursement for any out-of-
pocket expenses incurred in seeking to mitigate
their actual or potential loss.
46
Principle 5: Plan for a significant cyber security incident
47
CYBER SECURITY GOVERNANCE PRINCIPLES
Appendix A:
Cyber extortion
-Ransomware
and data theft
DECISION TREE
Pay Consider
Assess recovery
Ransomware Cyber incident remediation of
Decision by options,
or extortion response plan parties that have
board including data
demand or playbook experienced data
backups
Don’t pay loss or damage
Communications
with staff and Understand Assess legality
Obtain data:
affected parties demands of of making a
assess for
(e.g. customers, criminal, incl ransom
damage or loss
insurers, form of payment payment
regulators)
Data not
provided
Undertake
recovery
Note: The decision tree presents a linear and binary set of events and decisions of one particular form of data theft incident. However,
in practice a data theft event often presents complex decision making challenges for the board and management based on imprecise,
unreliable and fast changing information. It is strongly recommended that appropriate external expertise is obtained to support sound
decision-making.
49
CYBER SECURITY GOVERNANCE PRINCIPLES
Appendix B:
Resources
i. Cyber security for small and ii. Prudential Practice Guide CPG 234
medium businesses Information Security
ii. Cyber security for large organisations iii. Insight article (November 2021):
and infrastructure Improving cyber resilience: the role
boards have to play
iii. Strategies to Mitigate Cyber Security
Incidents, including the Essential e. OAIC, including
Eight Maturity Model Cyber Incident iv. Australian Privacy Principles guidelines:
Response Plan Chapter 11: APP 11 — Security of
iv. ACSC Partnership Program personal information
v. ReportCyber v. Notifiable Data Breaches
vi. Alerts vi. CDR Privacy Guidelines
50
Appendix B: Resources
51
CYBER SECURITY GOVERNANCE PRINCIPLES
Appendix C:
Industry
requirements
and standards
CPS 234 aims to ensure APRA-regulated entities Separately, APRA requires comprehensive risk
takes measures to be resilient against information management practices under CPS 220 that are
security incidents, including cyberattacks, by relevant to how an organisation manages cyber
maintaining an information security capability risk, including a board approved risk appetite
commensurate with information security statement that covers material risks. Lastly,
vulnerabilities and threats. CPS 234 states “the APRA has proposed a new prudential standard,
board of an APRA-regulated entity is ultimately CPS 230, which will expand existing outsourcing
responsible for ensuring that the entity maintains and business continuity requirements.2 CPS 230
its information security”. will require more comprehensive approaches
to managing and overseeing material service
A key objective of CPS 234 is to minimise the
providers, including those providing key IT and
likelihood and impact of information security
digital infrastructure and services.
incidents on the confidentiality, integrity or
availability of information assets, including
information assets managed by related parties or
third parties.
52 2. CPS 230 was released for consultation in July 2022. At that time it was expected to be finalised in early 2023.
Appendix C: Industry requirements and standards
53
CYBER SECURITY GOVERNANCE PRINCIPLES
Appendix D:
SME and NFP
Director Checklist
1. Set clear Document where possible who has responsiblity for cyber security
roles and Appoint a cyber champion to promote cyber resilience and respond
to questions
responsibilities
Consider whether a director, or group of directors, should have a more
active role in overseeing cyber security
2. Develop, Utilise the ACSC Cyber Security Assessment Tool to identify the
cyber security strengths of the organisation and understand areas
implement for improvement
and evolve a Assess whether utilising reputable external providers will enhance cyber
comprehensive resilience over managing in-house
cyber strategy Assess whether there is certain data (e.g. employee or customer data)
that does not need to be collected
54
Appendix D: SME and NFP Director Checklist
cyber security Configure Microsoft Office macro settings (e.g. only macros from trusted
locations enabled)
in existing risk
User application hardening - limit interaction between internet
management applications and business systems
practices Limit or restrict access to social media and external email accounts
4. Promote Mandatory training and phishing testing for all employees and volunteers
where appropriate
a culture
Pick a staff member to be a ‘cyber security leader’ to promote strong
of cyber cyber practices and respond to questions from other staff
resilience Subscribe to ACSC alerts to stay across emerging cyber threats
5. Plan for a Prepare an incident response plan utilsing online templates if appropriate
Maintain offline lists of who may assist in the event of a significant cyber
security incident and which key stakeholders to communicate with
55
CYBER SECURITY GOVERNANCE PRINCIPLES
Appendix E:
Glossary
56
Appendix E: Glossary
Cloud computing A service model that enables network access to a shared pool of computing resources
such as data storage, servers, software applications and services
Cloud service A company that offers some component of cloud computing to other businesses
provider or individuals
Essential Eight The eight essential mitigation strategies that the ACSC recommends organisations
implement as a baseline to make it much harder for adversaries to compromise
their systems
IDCARE Australia and New Zealand non-government identity & cyber support service
Malware Malicious software used to gain unauthorised access to computers, steal information and
disrupt or disable networks. Types of malware include Trojans, viruses and worms
Multi-factor A method of computer access control in which a user is granted access only after
authentication successfully presenting several separate pieces of evidence to an authentication
mechanism – typically at least two of the following categories: knowledge (something they
know), possession (something they have), and inherence (something they are)
NFP Not-for-profit; an organisation that does not operate for private benefit
Penetration testing A method of evaluating the security of an ICT system by seeking to identify and exploit
vulnerabilities to gain access to systems and data. Also called a ‘pen test’.
Phishing Untargeted, mass emails sent to many people asking for sensitive information (such as
bank details), encouraging them to open a malicious attachment, or visit a fake website
that will ask the user to provide sensitive information or download malicious content
Ransomware Malicious software that renders data or systems unusable until the victim makes a payment
White box exercise A form of penetration testing carried out by an ethical hacker who has full access to the
system they are carrying the simulated attack on.
57
CYBER SECURITY GOVERNANCE PRINCIPLES
Disclaimer Copyright
The material in this publication does not Copyright strictly reserved. The text, graphics and
constitute legal, accounting or other professional layout of this guide are protected by Australian
advice. While reasonable care has been taken copyright law and the comparable law of other
in its preparation, the AICD and CSCRC do not countries. The copyright of this material is vested
make any express or implied representations or in the AICD and CSCRC. No part of this material
warranties as to the completeness, reliability or can be reproduced or transmitted in any form, or
accuracy of the material in this publication. This by any means electronic or mechanical, including
publication should not be used or relied upon photocopying, recording or by any information
as a substitute for professional advice or as a storage and retrieval systems without the written
basis for formulating business decisions. To the permission of the AICD and CSCRC.
extent permitted by law, the AICD and CSCRC
excludes all liability for any loss or damage arising
out of the use of the material in the publication.
Any links to third party websites are provided
for convenience only and do not represent
endorsement, sponsorship or approval of those
third parties, any products and services offered by
third parties, or as to the accuracy or currency of
the information included in third party websites.
The opinions of those quoted do not necessarily
represent the view of the AICD and CSCRC. All
details were accurate at the time of printing.
The AICD and CSCRC reserve the right to make
changes without notice where necessary.
59
CYBER SECURITY GOVERNANCE PRINCIPLES
CCT-106-1_22
60
aicd.com.au