Policy
- This policy describes how an agency’s accountable authority [1] can establish effective security governance to protect their agency’s people, information and assets. An effective governance structure ensures employees with the appropriate knowledge and position are empowered and resourced to maintain agency security.
[1] the person or group of persons responsible for, and with control over, the agency’s operations
The accountable authority must establish the right security governance for the agency
- To ensure an agency [2] establishes the right security governance, the accountable authority must:
- be responsible for protective security within the agency, including:
- putting in place protective security arrangements that implement the core and supporting requirements of the South Australian Protective Security Framework (SAPSF)
- determine and manage the agency’s security risks
- appoint an Agency Security Executive (ASE) to be responsible for directing protective security and empower them to make decisions about the agency’s security, including:
- appointing security advisers (ASAs and ITSAs) to advise on, and support delivery of, security outcomes, including sound information and communication technology (ICT) policies and procedures
- develop practices and procedures that deliver the security plan
- detect, respond, investigate and report security incidents
- be aware of and meet all security policy or legislative requirements
- provide and maintain security awareness training for all employees and service providers
- establish, maintain and monitor a central email address for all security matters across all protective security domains, including ICT.
- be responsible for protective security within the agency, including:
[2] This policy applies to all South Australian public sector agencies (as defined in section 3(1) of the Public Sector Act 2009) and to any other person or organisation that is generally subject to the direction of a Minister of the Crown; all of which are referred to in this policy as “Agencies”.
Guidance
- The accountable authority for each agency is responsible to their portfolio Minister and the South Australian Government for their agency’s people, information and assets.
- In establishing the protective security arrangements for an agency, the accountable authority must ensure:
- business continuity during security incidents, disruptions or emergencies
- the safety of employees to carry out the functions of government and those dealing with the agency (including visitors)
- the protection information and resources held within the agency.
- The accountable authority of the agency must:
- implement the SAPSF core and supporting requirements
- appoint an Agency Security Executive (ASE) to be responsible for directing protective security and authorised to make security decisions, including the appointment of ASAs and ITSAs [3]
- ensure they have employees who hold the appropriate level of clearance to access security classified information, including themselves, where there is a need to share highly sensitive, or even security classified information of relevance to security with other agencies or entities
- ensure security awareness training is provided for all employees and service providers (including contractors) outlining their security responsibilities, including how to manage security risks
- embed effective security risk management processes
- approve the agency’s security plan for managing security risks
- ensure the security of the agency’s ICT systems is consistent with the requirements of SAPSF policy Robust ICT and cyber security and the South Australian Cyber Security Framework (PDF, 520.1 KB) (SACSF)
- promote and foster a positive security culture with defined expectations and priorities
- monitor the agency’s security maturity
- assess the agency’s security maturity in the annual security attestation
- approve citizenship and uncheckable background waivers for security clearance applications. [4]
[3] For smaller agencies, the accountable authority may decide to appoint themselves as ASE, and delegate the day-to-day functions of protective security to appointed security advisers
[4] For more information, see SAPSF policy Recruiting employees
- The accountable authority is responsible for putting in place protective security arrangements that implement the core and supporting requirements of the SAPSF, unless relevant circumstances prevent an agency from doing so.
- Relevant circumstances may include:
- circumstances outside of the agency’s control
- where the cost or impact of implementing the requirement would prohibit the agency’s ability to perform its core function
- where alternate arrangements are implemented that achieve the same or greater security outcomes that the core or supporting requirement
- In such circumstances, the accountable authority of the agency must:
- identify and document the circumstances preventing the implementation of the core or supporting requirement(s)
- outline the alternative arrangements being implemented, including any justifications based upon the agency’s security maturity and risk tolerance
- outline actions planned to move toward achieving the requirements of the SAPSF and/or further reducing risk
- include a record of all decision-making in the agency’s annual security attestation.
- Under section 12 of the Public Sector Act 2009, the accountable authority of all agencies must notify their responsible minister(s) of all significant issues affecting the agency. Any significant issues [5] affecting the agency in respect of implementation or application of the SAPSF must be included.
- Deliberately disregarding implementing the SAPSF or its requirements is considered a security incident. For information on managing security incidents see SAPSF policy Annual security attestation.
[5] It is not considered a reportable significant issue if the alternative mitigations put in place provide the same (or exceed the level of) protection as the SAPSF requirement
- From time to time, there may be a need to share highly sensitive, or even security classified information with other agencies or entities. In such cases, the accountable authority is responsible for ensuring they have employees who hold the appropriate level of clearance to access security classified information, including themselves.
- It is strongly recommended that the accountable authority of each agency obtain a security clearance to at least the level of Negative Vetting Level 1 (NV1). Any employees who are also connected in a workflow involving security classified information (including handling of documents, system administration, access privileges etc.) must also obtain a security clearance to the same level as the accountable authority.
- It is also strongly recommended that all agency security personnel (ASE, ASA, ITSA etc.) also obtain security clearances to a level deemed appropriate by the accountable authority.
- Information on obtaining security clearances can be found in SAPSF policy Recruiting employees.
- Some agencies have additional protective security responsibilities under this policy. An agency will be designated a Lead Security Agency (LSA) where it is a:
- provider of government protective security policy or advice
- provider of shared-services arrangements.
- Table 1 lists the LSAs for the South Australian Government
Table 1 - Lead Security Agencies in South Australia
Agency | Protective Security Responsibility |
---|---|
Department of the Premier and Cabinet (DPC) |
|
South Australia Police (SAPOL) |
|
State Records of South Australia |
|
Department of Human Services (DHS) | Screening Unit – provision of worker and volunteer related checks
|
Providing advice and support
- A LSA provides other South Australian Government agencies with advice and/or services relating to government security. Timely and considered security support and advice is critical to ensuring the maintenance of protective security requirements across the public sector.
- LSAs are required to provide advice and support which helps other agencies achieve and maintain an acceptable level of security, appropriate to their risks, in line with government-wide security policies, priorities and plans.
- It is recommended that LSAs:
- implement appropriate oversight arrangements to coordinate security services provided to other agencies
- maintain the capability to provide timely and accurate security advice and services
- maintain regular contact with supported agencies to increase awareness and effectiveness of the LSAs role and capabilities
- schedule periodic review of the service arrangements and make procedural adjustments where necessary.
- The accountable authority of an LSA must establish and agree upon clearly defined accountabilities, responsibilities and procedures for entering into partnerships or service provision arrangements with other agencies.
Supported agencies
- Supported agencies are those that receive direct support or services from a LSA. It is recommended that the accountable authorities of both the LSA and the supported agency establish a formal agreement or arrangement that outlines the provision of services and the proscribed responsibilities of each party.
- It is recommended that supported agencies notify any relevant LSAs of significant changes to protective security arrangements or agency risk profile.
- Supported agencies should seek clarification if arrangements between the LSA and supported agency are unclear regarding agreed responsibilities during a significant or reoccurring security incident or event. This may include:
- who takes control and when
- who has authority under what circumstances
- to whom and when an incident is escalated
- communication lead during a significant or reoccurring incident or event.
- The accountable authority of a supported agency remains responsible for the overall security of their agency. The accountable authority of a supported agency may outsource responsibility for specific security functions under shared-services or a partnership agreement, however, they should seek agreement from the accountable authority of a LSA.
- Overall security risk management responsibility rests with the accountable authority. This means the accountable authority must:
- determine the agency’s tolerance for security risks
- apply a risk-based approach to manage the agency’s security risks
- consider any implications risk management decisions have on the security or operations of other agencies and share information where appropriate.
- Determining agency risks mean identifying, assessing and prioritising risks to people, information and assets and should result in the effective risk-based application of mitigations or protections that minimise, monitor and control the likelihood and consequences of risks.
- Further information about security risk management and security planning can be found in the SAPSF policy Security planning.
- The accountable authority must appoint a South Australian Executive Service (SAES) (or equivalent) ASE to be responsible for directing all areas of security in the agency. The appointed ASE should be at a level appropriate to managing critical, security-related risks, incidents or emergencies within the agency.
- The ASE should have sufficiently experience or training to perform the required security functions. The ASE must have a direct report to the accountable authority.
- The ASE supports the accountable authority by providing strategic oversight of protective security to assist the continuous delivery of business operations, and by fostering a positive security culture through the application of policies and practices that embed security into agency operations.
- The ASE must be empowered and resourced to make security related decisions including:
- appointing security advisers (ASAs and ITSAs) within the agency
- agency protective security planning
- agency protective security practices and procedures
- investigating, responding to, and reporting on security incidents.
Responsibilities of the ASE
- The ASE of the agency must:
- support the accountable authority to ensure the safety of all people (including contractors, visitors and clients), information and assets
- report directly to the accountable authority on security, including security incidents or matters
- appoint sufficient security personnel (including but not limited to ASAs and ITSAs) to perform the security functions of the agency and oversee performance of their security responsibilities (see Appointing security advisers).
- set the strategic direction for protective security planning and risk management (see SAPSF policy Security planning)
- embed security procedures that achieve the security outcomes of the SAPSF, consistent with all legislative and other policy requirements
- manage the agency’s response to security-related incidents or matters in accordance with agency security procedures
- embed security monitoring mechanisms across the agency to support investigating, responding and reporting on security incidents
- foster a positive security culture where employees are aware of and understand their security responsibilities and are empowered to manage security risks
- establish security performance measures to help determine effectiveness of security arrangements, identify new risks, counter risks above the agency’s tolerance and improved security maturity (see SAPSF policy Security monitoring)
- managing and disseminating security related information across the agency, including sharing threat-related information with staff when required
- oversee preparation of the agency’s SAPSF annual security attestation for approval by the accountable authority.
Security governance committee
- It is recommended that the ASE establish and oversee (as chair) a security governance committee comprising relevant security personnel from within the agency. [6]
- A security governance committee provides support to the accountable authority and ASE by:
- providing a cohesive and coordinated approach to risk and security
- fostering a positive security culture
- contributing to longer-term agency security planning
- monitoring existing security plans and identifying and managing risks
- considering and reviewing the outcomes of security incidents and investigations
- facilitating information sharing for security improvements.
[6] The ASE may determine that a security oversight committee is not required in line with the size and function of the agency
- The ASE is responsible for appointing security advisers (ASA and ITSA) for the agency. The ASE must appoint enough security advisers to account for the security requirements of the agency across the four protective security domains: governance, information (including ICT), personnel and physical. There is no maximum number of security advisers that can be appointed.
- In making these decisions, the ASE must:
- consider the scope and responsibilities delegated to each position within the context of the agency’s risk environment and tolerance, size and function
- consider the appropriate arrangements for managing the responsibilities of all security advisers
- consider appointing security advisers at a level that requires only broad direction in terms of delivering objectives or the requirements of the SAPSF
- ensure delegations allow security advisers to undertake specific actions in line with the policies of the agency, or to review previous actions or decisions taken of relevance to security
- consider the appropriate competencies, experience, specialist skills or qualifications required to undertake the protective security requirements of the agency.
Agency Security Advisers
- The ASE must appoint at least one ASA for the agency. An ASE may determine it is appropriate to appoint additional ASAs to functions, depending on the size and function of the agency. It is recommended any additional advisers are designated ‘Deputy ASA’.
- An ASE may determine it is appropriate to delegate security functions to an ASA across multiple security domains, or to appoint multiple ASAs to functions within the same domain.
- If the agency performs a diverse function, or has responsibilities across a diverse range of locations or operational environments, it may be more appropriate for the ASE to appoint security advisers at each location. [7]
- The suggested security functions of ASAs are listed in Table 2 according to the four security domains.
Table 2 - Suggested functions of ASAs
Domain | Suggested security adviser functions |
---|---|
Governance | Assist the ASE by:
|
Information | Assist the ASE by:
|
Personnel | Assist the ASE by:
|
Physical | Assist the ASE by:
d |
Information Technology Security Advisers
- The ASE must appoint at least one ITSA for the agency. An ASE may determine it is appropriate to appoint additional ITSAs to functions, depending on the size and function of the agency. It is recommended any additional advisers are designated ‘Deputy ITSA’.
- If the agency performs a diverse function, or has responsibilities across a diverse range of locations or operational environments, it may be appropriate for the ASE to appoint ITSAs at each location.
- The suggested security functions of ITSAs are listed in Table 3. Guideline 5 of the SACSF provides additional guidance on the roles and responsibilities of ITSAs.
Table 3 - Suggested functions of ITSAs
Domain | Suggested security advisers functions |
---|---|
Information (ICT) | Assist the ASE by:
|
[7] If an agency’s arrangements result in the security adviser not reporting directly to the ASE, the ASE must maintain visibility of performance and outcomes of security responsibilities
[8]Such as the Premier’s Circular PC012 Information Privacy Principles (IPPS) Instructions, on access to, disclosure or use of, personal information collected or received
[9] Such as the SACSF and Premier’s Circular PC012 Information Privacy Principles (IPPS) Instructions (PDF, 643.3 KB)
- All agencies are required to have a security plan which establishes the strategic direction and sets the expectations for efficient and effective security management practices for the agency (for more information see SAPSF policy Security planning).
- The ASE is responsible for establishing the strategic direction, allocating resources in line with the strategy and improving the security maturity of the agency.
- Planning must incorporate developing practices and procedures that identify, manage and mitigate security risks and which enable the agency to continue to deliver effective and efficient government services.
- Effective practices and procedures are those that are embedded into day-to-day operations, are well understood by all employees and demonstrated by senior management. Effective practices and procedures are also those which assist to identify changes to the risk environment, and can be updated accordingly.
- Security practices and procedures must be designed to deliver the agency’s security plan which can in turn be useful in determining the agency’s security maturity and overall implementation of the SAPSF.
- Effective management of security incidents reduces the consequences from threats, behaviours or events while reducing the likelihood that they will re-occur.
- Agencies must implement practices and procedures to detect, respond, investigate and report security incidents. Furthermore, information gathered following a security incident will help to determine the effectiveness of existing agency protective security arrangements, assess agency security maturity and culture, and highlight any vulnerabilities.
- A security incident is defined as:
- an action, whether deliberate, reckless, negligent or accidental that fails to meet protective security requirements or agency practices and procedures that results, or may result, in compromise to official information or resources
- an approach, from anybody seeking unauthorised access to official information or resources
- an observable occurrence or event [11] that can harm South Australian Government people, information or assets.
- A significant security incident is a deliberate, negligent or reckless action that leads, or could lead, to compromise of official information or resources. Table 4 provides some examples of significant security incidents.
Table 4 – Security incidents
Examples of security incidents | Examples of significant security incidents |
---|---|
Criminal actions such as actual or attempted theft, break and enter, vandalism or assault | Espionage or suspected espionage |
Loss of personal information that is likely to result in serious harm | Actual or suspected compromise of material at any level, including tampering with security containers or systems |
Security classified material not properly secured or stored | Loss, compromise, suspected compromise, theft or attempted theft of classified equipment |
Security classified material left in inappropriate waste bins or government assets to be sold or disposed of | Actual or attempted unauthorised access to an alarm system covering a secured area where security classified information is stored |
Deliberate disregard of implementing an SAPSF requirement | Loss of material classified PROTECTED or above, or significant quantities of material of a lower classification |
Access passes or identification documents lost or left unsecured | Recovery or previously unreported missing classified material or equipment |
Incorrect handling of security or classified marked information, such as a failure to provide the required protection during transfers or transmission resulting in a data spill on an electronic information network or system | Unauthorised disclosure of official or classified information, significant loss or compromise of cryptographic keying material, or a significant breach of ICT systems. |
Compromise of keys to security locks, or of combinations settings | Continuous breaches involving the same person or work area where the combination of the events warrants an investigation |
Sharing computer passwords | Loss, theft, attempted theft, recovery or suspicious incidents involving weapons, ammunitions, explosives or hazardous materials including chemical, biological, radioactive or nuclear. |
Actual or suspected hacking into any ICT system |
Detecting security incidents
- Early detection of a security incident and timely response is critical to reducing the consequences from that incident. Establishing mechanisms to enable possible or actual security incidents to be communicated to agency security management in a timely manner is essential to effective security risk management.
- Agencies must ensure that all employees understand when and how to report potential incidents or concerns. It is recommended that security incident reporting be included in agency security awareness training.
- While reporting is a common means of detecting security incidents, it is recommended that ASEs consider other security monitoring measures to assist in identifying potential or actual security incidents.
Responding to security incidents
- All agencies must establish procedures for managing security incidents. Incident management procedures should be consistent, appropriate and fair and be applicable to any security incident that may arise.
- Table 5 provides some recommended elements to consider in developing incident management procedures.
Table 5 – Recommended incident management procedures
Procedure |
---|
|
|
|
Handling procedures once a security incident has been reported, should include:
|
|
|
Investigating security incidents
- ASEs must determine when a security incident is significant enough to warrant an investigation. Security incidents can be actual or suspected, and an investigation may be required to resolve an existing breach or vulnerability and reduce the impact or consequences. Investigations may also provide useful information for future risk assessments or reviews and will help to validate existing protective security arrangements within the agency.
- A security investigation:
- is a formal process examining the cause and extent of the security incident that has, or could have, caused harm to individuals, the or another agency or the state or national interest
- gathers evidence that may be admissible for any subsequent action (criminal, civil penalty, civil, disciplinary or administrative sanctions)
- prevents re-occurrence of the incident by implementing improvements to the agency’s systems or procedures
- protects the interest of the South Australian Government and the rights of the affected individuals.
- The ASE is responsible for ensuring the agency has procedures in place to conduct security investigations, when required. It is recommended that those procedures cover:
- terms of reference and the investigation plan (authorised by the accountable authority or ASE)
- responsibilities of the investigator, approving officer and other relevant parties
- qualifications and/or training required for investigators
- procedural fairness and standards of ethical behaviour to ensure impartiality and the absence of any conflicts-of-interest
- actions for handling complaints or allegations (including anonymous or public interest disclosure reports) [12]
- case management procedures to ensure compliance with the agency’s procedures
- procedures for undertaking operational practices (such as interviews of affected persons)
- points of referral, escalation or approval, including keeping the ASE notified of progress
- points of escalation to law enforcement or the Australian Security Intelligence Organisation (ASIO)
- findings and recommendations
- final report requirements.
- The ASE is responsible for assessing the requirement for a formal security investigation. In assessing the incident, they must consider:
- the seriousness or complexity of the incident
- the possible outcomes of the investigation (administrative, disciplinary, civil or criminal)
- if the incident requires referral to another agency or authority
- the resources required to conduct the investigation
- who will conduct the investigation and what support they need
- the investigation process and timeframes
- the authorisation needed to undertake the investigation
- the decision-makers and subsequent reporting obligations
- It is recommended that, where possible, agencies apply the Australian Government Investigations Standards (AGIS) to maintain a minimum quality standard within investigations.
- When investigating, the principles of procedural fairness should be applied, such that any individuals being investigated or whose interests could be adversely affected, should be informed of the case against them and given the opportunity to be heard by an unbiased decision-maker. Procedural fairness should also be applied to any actions taken as a result of the investigation, as well as when considering the security integrity of current or future investigations by the, or another agency.
Reporting security incidents
- In some instances, a security incident must be reported to another agency or authority, depending on the nature and severity of the incident. Table 6 outlines the obligations to report particular security incidents, and to whom they must be reported. Non-reporting of an incident is considered a security incident.
Table 6 – External reporting obligations
Reportable incident | Agency obligation to report | Reportable to |
---|---|---|
National security incidents | Security incidents or situations that have, or could have, impact on national security [13], including suspected:
Agencies must observe the need-to-know principle in relation to any details of a major security incident, until ASIO advises otherwise | Australian Security Intelligence Organisation E: asa@asio.gov.au Internet: http://www.asio.gov.au/ Phone: 13 ASIO (13 2746) (24hrs) For advice on if the incident needs to be reported, contact: National Security Hotline Phone: 1800 123 400 |
Cyber security incidents | As per the Premier and Cabinet Circular 042 – Cyber Security Incident Management, all agencies must report cyber security incidents to Cyber Security, Office of the Chief Information Officer. Guidance on reporting cyber security incidents is available here. | Cyber Security Department of the Premier and Cabinet E: watchdesk@sa.gov.au P: 1300 244 168 |
Significant security incidents | As defined under Managing security incidents and listed in Table 4, significant security incidents must be reported to the SAPSF team in addition to all relevant authorities, or affected agencies. Agencies are required to include significant security incidents in their annual security attestation (see SAPSF policy Annual security attestation for more detail) | South Australian Protective Security Framework team Email: sapsf@sa.gov.au |
Personal Information Data Breaches | Any inappropriate disclosure of personal information held by an agency, as governed by the Premier’s Circular PC012 Information Privacy Principles (IPPS) Instructions (PDF, 643.3 KB) | Privacy Committee of South Australia Phone: (08) 8204 8786 Email: StateRecords@sa.gov.au |
SA Cabinet material | Any security incidents, suspected or actual, involving SA Cabinet material. The SA Cabinet Handbook contains guidance for handling of SA Cabinet material. | Cabinet Office Contact: E: CabinetOffice@sa.gov.au |
Contact reporting | Under the Australian Government Contact Reporting Scheme, employees are required to report a contact, either official or social, with or when:
| South Australian Security Officer Department of the Premier and Cabinet E: sapsf@sa.gov.au DPC will then forward a Contact Report to ASIO via: cr@asio.gov.au |
Incidents involving security clearance holders | Security incidents involving security clearance holders must be reported to the Australian Government Security Vetting Agency (AGSVA) or the authorised vetting agency, at the appropriate time, of any incident that may affect a person’s suitability to hold a security clearance. The appropriate time will depend on the incident, whether an investigation is ongoing and an assessment of personnel security risks. | South Australian Security Clearances Email: SASecurityClearances@sa.gov.au The South Australian Security Officer will then provide notification to the Australian Government Security Vetting Agency via the Security Officer Dashboard |
Potential criminal/serious incidents | Incidents that may constitute a criminal offence. Depending on the type of offence, agencies may need to report to the Australian Federal Police (AFP) or to SAPOL. See the AFP website for advice on the type of criminal incidents that are reported to Commonwealth or local police. | Local police for state or territory crimes Phone: 13 14 44 Crime Stoppers to anonymously provide information about a crime Phone: 1800 333 000 AFP for Commonwealth crimes Internet: https://www.afp.gov.au Phone: 02 6131 3000 |
Critical incidents involving public safety | Critical incidents requiring immediate response, in particular where lives are at risk, agencies must call emergency services on triple zero (000). Other critical incidents that may affect public safety and require a coordinated response from the South Australian and/or Commonwealth Governments may relate to:
| Emergency services triple zero (000) SAPOL Phone: 13 14 44 Under South Australia’s arrangements, the control agency designated for a critical incident may determine the circumstances warrant activation of the State Emergency Centre (SEC) and State Crisis Centre (SCC) arrangements. |
Correspondence of security concern | Correspondence received by an agency may be of a security concern if it contains:
| SAPOL Phone: 13 14 44 Crime Stoppers to anonymously provide information about a crime Phone: 1800 333 000 National Security Hotline Phone: 1800 123 400 |
Incident affecting another agency | Security incidents or unmitigated security risks that affect another agency’s people, information or assets, particularly where agencies are co-located or are providing services to another agency. | Accountable authority of the agency whose people, information or assets may be affected. |
Security classified equipment and services | Incidents involving Security Construction and Equipment Committee (SCEC) and ASIO approved destruction services | SCEC Email: scec@scec.gov.au Report: SCEC courier incident report |
Unauthorised foreign entity access to security classified information or assets | Inappropriate or unauthorised sharing of security classified information or assets with a foreign national or international entity, without the protection of an agreement or arrangement (see SAPSF policy Security governance for international sharing) | Agency ASEs In line with an internal agency reporting procedures, the incident may need to be externally reported, as per the other categories in this table. |
Compromise of foreign entity information or assets | Failure to safeguard sensitive or security classified information of a foreign government or entity covered by an international agreement or arrangement. (see SAPSF policy Security governance for international sharing). | Agency ASEs The agency must notify the originating foreign entity as soon as practicable. |
10 Removed reference
11 E.g. natural disaster, terrorist attacks etc.
12 See the Public Interest Disclosure Act 2018 for more information.
13 As defined in the Australian Security Intelligence Organisation Act 1979 (Cth)
14 ASIO will assist agencies to conduct an initial assessment of any potential compromise and will either recommend the agency continue with its own investigation and advise of the outcome, or take over the investigation in close consultation with the agency
- The policies of the SAPSF have been developed to ensure consistency with other South Australian security policy and in accordance with relevant state and federal legislation. If the agency identifies any conflict between the requirements of the SAPSF or other relevant security policy or legislation, agencies must notify the SAPSF team.
- Agencies must comply with all relevant security policy or legislative requirements in undertaking the requirements of the SAPSF.
- Agencies are required to be aware of any agency-specific legislation that must be applied in carrying out official duties, and the requirements of the SAPSF do not override any legislative requirements or any other security policy requirements.
- Security awareness training is a critical component of building an agency’s security culture and overall security maturity.
- Agencies must provide security awareness training to all employees upon commencement in the agency, and annually thereafter (via a security awareness refresher training), which outlines their agency-specific obligations and their responsibilities under the SAPSF. ASEs must determine the appropriate delivery method that ensures consistency across their agency for all employees, while ensuring all specific training or awareness requirements are met.
- Employees in high-risk positions, positions of trust, security incident investigators or security clearance holders must be provided with specific security awareness training targeted to the scope and nature of their position.
- Agency security plans should identify the most relevant areas of agency security that need to be addressed in the security awareness training.
- Effective security awareness training is most effective when it:
- informs and regularly reminds employees of their individual and collective security responsibilities and how to raise issues or concerns
- ensures employees with specific security duties receive appropriate and up-to-date training
- briefs security cleared personnel on their access privileges and prohibitions attached to their security clearance level, either before being issued or during the renewal cycle
- fulfils requirements for security clearance holders
Content of security awareness training
- Table 7 provides the recommended content for security awareness training.
Table 7 – Recommended content for security awareness training
Audience | Recommended content |
---|---|
All personnel |
|
Additional content for security cleared personnel |
|
Additional content for specialist, high-risk, or positions of trust | Security awareness training specific to address the risks related to the specific focus or scope of their work. Such positions may include:
|
Security awareness refresher training
- ASEs must determine what form (e.g. in person, online), scope of coverage and content is required for the annual security training to meet the security needs of the agency, and the minimum requirements of the SAPSF.
- The annual refresher training should consider the current threat or risk environment for the agency, the goals and objectives of agency security plans and any inadequacies of previous trainings or recurring security incidents.
- The Security SA Teams site is a platform to share and repurpose resource material in relation to security in SA Government including governance, personnel security, information security, physical security and cyber security.
- The site is jointly managed by Office for Cyber Security and Security, Emergency and Recovery Management in DPC. It is recommended that only ASEs, ASAs, ITSAs or staff with security responsibilities are given access to this site. In order to gain access to the site, approval must be provided from your ASE, ASA or ITSA to officeforcybersecurity@sa.gov.au or SAPSF@sa.gov.au.
Strengthening security awareness
- Agencies may implement other measures to strengthen the security awareness of employees, including:
- security campaigns that address ongoing agency security needs
- security instructions and reminders via electronic bulletins or publications, such as visual displays or posters
- incorporating protective security competencies into employee selection processes or performance management programs
- drills and exercises.
[15] See Public Interest Disclosure Act 2018
[16] It is recommended that any case studies are redacted to maintain appropriate confidentialities.
- To prevent agency security from becoming siloed, a monitored, generic security email address must be established for agency security-related matters, which can be monitored by ASEs, security advisers and other security personnel as required. This enables a greater flow of security related information within the agency while also creating a central contact in the agency for external communications with other agencies.
- It is recommended that the agency’s security email address:
- take the form (or similar):
- [agencyname].security@sa.gov.au, or
- [agencyname].ASE@sa.gov.au
- be monitored by appropriate security personnel in the agency, including the ASE and security advisers
- provided to the SAPSF team and other relevant agencies to facilitate collaboration and communication
- take the form (or similar):
- If an agency is unable to create a generic email address for security-related matters and relies on an individual’s email address, it is recommended that that email address be transferred to or monitored by other staff during extended periods of absence.
- Agencies may establish multiple security-related email addresses if appropriate to control the flow of specific information, however, the main agency security address will be used for all SAPSF-related correspondence.
Approved by: Chief Executive, Department of the Premier and Cabinet | Date of first approval: 20 April 2020 |
Revision number: 2.0 | Date of review: 26 October 2022 |
Next review date: December 2024 | Contact person: sapsf@sa.gov.au |
Change Log
Version | Date | Changes |
---|---|---|
1.0 | 20/04/2020 | First issue of policy |
1.1 | 21/08/2020 | Definition of 'personnel' updated |
2.0 | 26/10/2022 | Definition of ‘Position of Trust’ added Definition of ‘risk-based approach’ added Security clearances for agency security personnel updated (para 11) |