Whole of Government Digital Security Policy

advertisement
Whole of Government
Digital Security Policy
Document Control
The Western Australian Whole of Government Digital Security Policy: version 1 - May
2016
Produced and published by: Office of the Government Chief Information Officer
Acknowledgements The Policy was developed in collaboration with the Western Australian
public sector agencies.
Contact:
Office of the Government Chief Information Officer
2 Havelock Street
WEST PERTH WA 6005
Telephone: (08) 6552 5444
Email: policy@gcio.wa.gov.au
Document version history
Date
Author
Version
Revision Notes
May 2016
OGCIO
1
Release
This document, the Western Australian Whole of Government Digital Security Policy,
Version 1 is licensed under a Creative Commons Attribution 4.0 International Licence.
You are free to re-use the work under that licence, on the condition that you attribute the
Government of Western Australia (Office of the Government Chief Information Officer) as
author, indicate if changes were made, and comply with the other licence terms. The licence
does not apply to any branding or images.
License URL: https://creativecommons.org/licenses/by/4.0/legalcode
Attribution: © Government of Western Australia (Office of the Government Chief Information
Officer) 2016
Notice Identifying Other Material and/or Rights in this Publication:
The Creative Commons licence does not apply to the Government of Western Australia Coat of
Arms. Permission to reuse the Coat of Arms can be obtained from the Department of Premier
and Cabinet.
The cover image by Askold Romanov is reproduced with the permission of istock.
Purpose
The purpose of the Western Australian (WA) whole-of–government Digital Security Policy
(Policy) is to provide direction for the adoption and maintenance of security protection controls
in digital information and digital information systems.
Objectives
The Policy aims to support:
Confidentiality – access to, and disclosure of, information including government, personal
and/or proprietary information subject to appropriate authorisation
Integrity – data is protected against unauthorised alteration or destruction and any challenges
to government information authenticity are prevented, giving citizens confidence in the way WA
Government protects and handles digital information and
Availability – authorised users are provided with timely and reliable access to data and
services.
Policy Requirements
Risk assessment concerning security of data within your agency should be considered by the
business. Agencies are to take a risk based approach and apply risk-appropriate levels of
security controls to protect their critical data, infrastructure and systems from digital threats.
Agencies must develop a risk register with controls for monitoring, prevention, protection,
response and recovery of critical information systems and applications.
The risk register and controls must be reviewed regularly by an independent or trusted third
party to remain contemporary and effective and comply with policy standards.
Government agencies must comply with relevant legislation, regulations, Cabinet Conventions,
policies, and contractual obligations requiring data to be available, safe guarded or lawfully
used.
All relevant Government agency policies, standard operating procedures and work practices
must include the provisions of the standards referenced on the Office of the Government Chief
Information Officer (Office of the GCIO) website, ensuring security requirements are addressed
at the earliest opportunity.
Principles
In establishing a strategy for addressing digital security, an agency or organisation must
consider the aspects of governance, people, process and technology using principles
recommended by Australian and international standards for digital security management.
Agencies must ensure they have:
Secure – protection of government data, communications technologies, and systems, including
the systems of third parties transacting with government online.
Resilient – digital environments that demonstrate risk-appropriate standards and controls for
managing digital security and the ongoing review and improvement of digital security controls
across agencies.
Trusted – Third parties providing digital security services must be compliant with this Policy.
Page 1
Related Guidance
Agencies must ensure this Policy is incorporated into existing business processes for
continuous improvement and consistent with, and operating within any applicable legislative,
policy and strategic frameworks, including but not limited to:

Risk management is essential to the optimal operation of the public sector, as
articulated in Treasurer’s Instruction 825 Risk Management and Security.
Information and guidance on Digital Security is available from the Office of the GCIO website at
www.gcio.wa.gov.au.
Definition of Terms
Digital Security Principles have been defined in accordance with the Principles of the
Australian Government Information Security Manual 2015, Glossary of terms. Further
information
and
definitions
are
available
from:
http://www.asd.gov.au/publications/Information_Security_Manual_2015_Principles.pdf.
Page 2
Download