Telecommunications Sector Security Guidelines Draft Guidelines

advertisement
Contents
Purpose of this guide ............................................................................................................................................. 3
Contact information ........................................................................................................................................... 4
List of acronyms ................................................................................................................................................. 4
Overview of the Security Framework .................................................................................................................... 5
Key steps to protect your networks ....................................................................................................................... 6
Part 1: General information ................................................................................................................................... 7
Implementation of the framework by Government and industry in good faith ............................................... 7
Key security principles ........................................................................................................................................ 7
What are the national security risks to telecommunications networks? .......................................................... 8
Which parts of networks are particularly vulnerable to unauthorised access and interference? .................. 10
Who has obligations under this security framework? ..................................................................................... 12
Part 2: What do you need to do to meet your security obligation?.................................................................... 15
Overview of the security obligation to protect networks and facilities .......................................................... 15
How do you meet your security obligation? .................................................................................................... 15
What are competent supervision and effective control? ............................................................................ 16
What is unauthorised access or unauthorised interference? ...................................................................... 18
What does it mean to ensure the availability and integrity of telecommunications networks and
facilities? ....................................................................................................................................................... 20
What does it mean to ensure the confidentiality of communications and information? ........................... 20
Resources to help you meet your national security obligation ................................................................... 22
Does this security obligation apply to existing systems? ............................................................................. 23
Part 3: What do you need to do to meet your notification obligation? .............................................................. 25
Who needs to notify Government of changes to systems?............................................................................. 25
Are exemptions available? ............................................................................................................................... 25
What types of changes should be notified?..................................................................................................... 26
When should changes be notified? .................................................................................................................. 29
How can you notify the Government of changes? .......................................................................................... 31
Can you submit a security capability plan instead of multiple individual notifications? ................................ 31
What happens after you notify Government of proposed changes or submit a security capability plan? .... 33
Part 4: When should you engage with security agencies? .................................................................................. 34
General threat advice ....................................................................................................................................... 34
Specific threat advice ....................................................................................................................................... 34
Operational assistance ..................................................................................................................................... 35
Part 5: How will the Security Framework be administered? A step by step guide ............................................. 37
Glossary ................................................................................................................................................................ 38
Attachment A: Overview of the notification process .......................................................................................... 39
Telecommunications Sector Security Guidelines 2
Purpose of this guide
The Australian Government has prepared this guide to assist industry participants to understand the
obligations arising from the Telecommunications and Other Legislation Amendment Act 20xx. This is a live
document and subject to periodic review in order to capture changes to related legislation and security
advice. Please visit the Attorney-General’s Department website at www.ag.gov.au/telcosecurity to ensure
that you have the latest version.
The purpose of this document is to provide guidance to carriers, carriage service providers and intermediaries
(C/CSPs) on their obligations in the Telecommunications Act 1997 (the Telecommunications Act) to: (a)
protect networks and facilities from national security risks of unauthorised interference and unauthorised
access; and (b) where applicable, notify government of changes to their telecommunications systems and
services.
This document is intended to be read by senior management and executives, as well as employees in security
and regulatory roles and technical officers responsible for network design and maintenance. The guidance
provided is outcomes focussed and not prescriptive.
These guidelines apply to all C/CSPs. However, the measures which are appropriate for C/CSPs to implement
will vary across the sector, depending on for example, the size and scope of a particular C/CSP’s operations.
For this reason, C/CSPs are encouraged to adopt a risk based approach to compliance with the legislative
obligations. These Guidelines provide general guidance to assist C/CSPs that may not already have mature
security management practices in place, and provide targeted security advice to manage the specific national
security risks of unauthorised access and unauthorised interference to networks and facilities.
It is the responsibility of each C/CSP to determine whether or not it is acting in accordance with the legislative
obligations.
The guidance contained within this document should not be read as enforceable rules. Compliance with the
Guidelines is not mandatory in order for C/CSPs to demonstrate compliance with their legislative obligations.
Due to the sensitive and fluid nature of national security threats, it is not possible to comprehensively outline
the threat sources and threat vectors and appropriate controls and mitigations in this document. A key
element of the regulatory framework is the enhanced partnership between Government and C/CSPs and
engagement processes to support increased information sharing (including classified information) and
increase industry awareness of national security vulnerabilities and risks.
Security agencies will supplement the advice provided in this document with tailored and general threat
information.
Disclaimer
This document is intended as a guide and users should seek legal, technical and risk advice as to their own
specific needs. The information in this document should not be relied upon as legal advice. The provision of
this information does not override the need to observe laws or policies, in particular requirements to protect
personal information under Australian privacy law.
Telecommunications Sector Security Guidelines 3
Contact information
Further information about the Telecommunications and Other Legislation Amendment Act 20xx is available on
the Attorney-General’s Department website at www.ag.gov.au/telcosecurity
Any questions about the security framework established by this Act (including about these guidelines) should
be directed to the Attorney-General’s Department at telco.security@ag.gov.au or on [hotline to be created].
List of acronyms
AGD
Attorney-General’s Department
ASIO
Australian Security Intelligence Organisation
CAC
Communications Access Coordinator
C/CSP
Carrier, carriage service provider and carriage service intermediary
C/NCSP
Carrier and nominated carriage service provider
CSP
Carriage service provider
Telecommunications Sector Security Guidelines 4
Overview of the Security Framework
Legislative obligations in the Telecommunications Act
Security obligation (all carriers, carriage service providers and carriage service intermediaries (C/CSPs))
Sections 313(1A) and (2A) require C/CSPs to do their best to protect telecommunications networks and facilities from
unauthorised access and unauthorised interference, including by maintaining competent supervision and effective
control over their networks and facilities.
Notification obligation (carriers and nominated carriage service provider (C/NCSPs))
Section 314A requires C/NCSPs to notify the Commonwealth Access Co-ordinator (CAC) of proposed changes to their
systems and services that could have a material adverse effect on the ability of the C/NCSP to comply with its security
obligation. The CAC may exempt a C/NCSP from this requirement (314A(4)) and a C/NCSP may satisfy this requirement
by submitting a security capability plan.
Industry-government collaboration
General guidance and engagement (for all C/CSPs)
Administrative Guidance - including these guidelines and other fact sheets as required including:
•
Information/advice service (Attorney-General's Department website and hotline)
•
Unclassified and classified industry threat assessments (as appropriate)
NB: C/CSPs should also continue to utilise existing fora and mechanisms to engage with Government on threat information and
mitigation advice, such as CERT Australia, the Australian Cyber Security Centre (ACSC), the Trusted Information Sharing Netwo rk
(TISN) etc.
Targeted advice and engagement (for higher priority C/CSPs)
•
Tailored classified threat assessments and risk mitigation advice
•
Regular bilateral meetings between the C/CSP and security agencies
•
Enhanced information sharing between government and industry using mechanisms such as the
Telecommunications Expert Group
(See page 13 for a description of the factors which will contribute to whether a CSP is considered a higher priority).
Compliance and enforcement
Regulatory powers in the Telecommunication Act
1. Information gathering power
The Secretary of the Attorney-General's Department (AGD), (or the Director-General of Security, Australian Security
Intelligence Organisation (ASIO) if authorised), can request information or documents for the purpose of assessing
compliance with the security obligation.
2. Power to issue directions to C/CSPs
The Attorney-General can direct a C/CSP to do, or refrain from doing, a specified thing, e.g undertake certain risk
mitigations, to ensure risks of unauthorised access or interference are managed. A direction can only be issued if ASIO
has provided an adverse security assessment and following all reasonable efforts to negotiate an outcome
cooperatively. A C/CSP will be notified of the intent to issue a direction and invited to make representations.
Civil Penalty regime in the Telecommunications Act
The Attorney-General can initiate proceedings in the Federal Court to seek civil remedies for non-compliance with the
security obligation, a direction and/or request for information – these include penalties, enforceable undertakings and
injunctions.
Telecommunications Sector Security Guidelines 5
Key steps to protect your networks
C/CSP’s (with the exception of high priority C/NCPs – see page 13) will generally be considered to be meeting
their obligation to ‘do their best’ to protect networks and facilities from unauthorised access and interference
by following these three steps.
1. Be aware of national security threats to telecommunications
environments
Security agencies will issue threat assessments to help inform the telecommunications community about
current and emerging threats. Other helpful resources on cyber security are listed on page 22.
2. Address the risk of unauthorised interference and unauthorised access
Identify valuable information that may be targeted and sensitive parts of your network and facilities that
might be vulnerable to unauthorised access and interference. Assess whether you can demonstrate
competent supervision and effective control and have measures in place to manage any vulnerabilities and
risks.
3. Engage early with government agencies on proposed changes to
networks to factor in any security risks and controls
Engage with the relevant government agencies about how to manage risks from planned changes to your
network, management and operational support or service delivery. Early engagement will enable you to get
advice from Government on whether the types of changes you are considering making are likely to expose
interference and access vulnerabilities and be of concern to national security agencies. Early engagement will
minimise costs for mitigating or remediating risks.
Telecommunications Sector Security Guidelines 6
Part 1: General information
Implementation of the framework by Government and
industry in good faith
C/CSPs will be expected to implement the obligations and engage with Government co-operatively and in
good faith. For example, C/CSPs required to notify of changes to networks under section 314A of the
Telecommunications Act will be expected to provide sufficient information about proposed changes in any
notification to allow security agencies to accurately assess any potential national security risks.
Government will also work with C/CSPs co-operatively and collaboratively to identify and mitigate risks to
Australia’s national security arising from the design, build or operation of telecommunications networks. The
Government recognises that mitigation measures to address some security risks to networks may have a cost
impact on companies. For this reason, the Government will work closely with C/CSPs through an on-going
dialogue based on good faith and cooperation to ensure that the security framework operates in a pragmatic,
practicable and cost-effective way for the telecommunications industry. For example, directions powers will
only be used as a last resort after a period of discussion and negotiation between Government and the
relevant organisation.
Key security principles
This security framework is based on the following four principles:
1. Protection of telecommunications networks is a shared responsibility
between government and industry
Owners and operators of telecommunications networks are primarily responsible for ensuring the security of
their assets – this is a matter of good corporate governance and business continuity. Owners and operators
are best placed to manage risks to their operations and determine the most appropriate strategies to boost
resilience.
However, even the most informed company is unlikely to have access to the most up to date threat
information that is available to security agencies. The Australian Government is the primary source of security
threat assessments. It is also a source of research, scientific and technical advice relevant to the protection
and resilience of critical infrastructure.
2. Responsibility for security should start at the top of an organisation
Security should be a key consideration and responsibility at the most senior management levels of any
organisation. It is important that it is considered in all business decision making and that cultural change is
driven from the top down – not relegated as the responsibility of the IT Department.
It is important that organisations promote a risk management approach to security throughout their
organisation. Promotion of a positive culture towards risk is a key measure to help ensure all parts of the
organisation are considering security in their business decision making. It is also important that organisations
Telecommunications Sector Security Guidelines 7
are not ‘siloed’ – effective communication between areas is important to ensure security is considered early
in business decision making.
Importantly, cyber risks should be considered as part of general corporate risk management. Good
governance is key to management of any risks, including cyber risks.
3. Protection of telecommunications networks should be based on a risk
management approach
These Guidelines do not specify how telecommunications companies must protect their networks. Instead
they encourage a risk-based approach to allow companies to choose the best technical and business
solutions. There is no single solution to securing networks and facilities – good security is multi-layered and
tailored to the risk. It is not just about particular software or hardware. Good security risk management is a
holistic approach that considers people, information and assets. It recognises that cyber security is not just
about technology – it is also about good governance and management of people.
Good risk management is an ongoing process. It involves establishing a context, determining threats,
vulnerabilities and criticality of systems and information, then analysing likelihood and consequence before
evaluating and treating significant risks. Key to any risk assessment is an appreciation of how a threat or
vulnerability will affect the confidentiality, integrity or availability of networks and information carried over
and held on those networks.
4. Security should be built into all processes and systems – not bolted on
later
Well considered security measures integrated into business systems and processes from the start are
ultimately more effective and less costly than security systems added on later. Good security is embedded as
part of an organisation’s culture, practices and plans – not implemented as an afterthought. If security is only
considered at the end of product design, it can leave systems or business arrangements exposed and add an
extra layer of cost and complexity. For this reason, C/CSPs are encouraged to engage with the AttorneyGeneral’s Department (or for high priority C/CSPs engage with ASIO) early in the process of planning
significant changes to systems and services which affect sensitive parts of a network and may have national
security implications. C/CSPs are also encouraged to engage at any stage if they are uncertain about what
parts of a network or system may be vulnerable to unauthorised access and unauthorised interference.
What are the national security risks to telecommunications
networks?
The object of the security framework is to better manage the risk of unauthorised interference and
unauthorised access to telecommunications networks and facilities to better protect Australian
telecommunications infrastructure, communications and data from national security threats such as
espionage, sabotage and foreign interference. Australian telecommunications networks and facilities are
attractive targets for malicious actors because of the criticality of telecommunications services to Australia's
economic prosperity and social well-being, and the rich source of information carried and stored on these
services.
Telecommunications Sector Security Guidelines 8
In some cases, national security risks will overlap with common security risks related to the running of a
business. The difference lies in how that risk may be exploited by specific threat actors, and the impact it may
have on Australia's critical infrastructure. In summary, national security risks relate to possible:




compromise or degradation of telecommunications networks
compromise of valuable data or information of a sensitive nature, such as aggregate stores of personal
data or commercial or other sensitive data
impairment of the availability or integrity of telecommunications networks, or
the potential impact on other critical infrastructure or Government services (such as banking/finance,
health or transport services).
A key source of vulnerability is the ICT supply chain because Australian C/CSPs are heavily reliant on global
suppliers of equipment and managed services which are located in, and operate from, a range of foreign
countries. This can create challenges for implementing controls to mitigate personnel, physical and ICT
security risks and therefore make networks and facilities more vulnerable to espionage, sabotage, and foreign
interference through unauthorised access and unauthorised interference. Some suppliers and business
delivery and operational models may present greater risks than others, due to these and other factors.
The objective of the framework is to ensure that risks arising through the supply chain are appropriately
identified and adequately managed by C/CSPs. The framework is designed to ensure adequate risk
management, not prescribe particular business models or ban particular suppliers or service delivery
solutions.
Telecommunications Sector Security Guidelines 9
Under the framework C/CSPs will need to consider and manage risks associated with various business
delivery and operational models (i.e. outsourcing and offshoring) and implement measures and controls to
mitigate the risk of unauthorised access and interference. For this reason compliance with the national
security obligation is based on the concepts of C/CSPs being able to demonstrate competent supervision and
effective control over their networks, facilities and services. These concepts are described in more detail
below and have specific reference to the controls and measures in place to manage the risk of interference
and unauthorised access that might arise through outsourcing and offshoring arrangements.
Which parts of networks are particularly vulnerable to
unauthorised access and interference?
Some parts of networks and facilities are generally considered to be more sensitive and at a greater risk of
intrusion and interference than other parts because they either store or carry sensitive personal, government
or commercial communications and information (e.g. billing systems and lawful interception systems), or
because they affect the availability and integrity of the network (e.g. operations support systems).
The more sensitive parts of C/CSP’s networks and facilities, which are of greater security interest include, but
are not limited to:



network operation centres, including infrastructure used to facilitate support of the network
lawful interception equipment or operations
any part of a telecommunications network that manages or stores:
o
o
o


aggregate information about customers
aggregate authentication credentials of a significant number of customers
administrative (privileged user) authentication credentials for the network or related systems
any place in a telecommunications network where traffic belonging to a customer or end user
aggregates in large volumes, being either in transit or stored data.
additional areas assessed by security agencies to be more sensitive in response to changes in threat,
technology and business practices.
Further details about each of these areas are included below. As noted above, certain business and
operational delivery models pose greater risk of unauthorised access and interference than others, for
example outsourcing and offshoring. These risks may be amplified when combined with equipping, managing
or providing support to sensitive parts of systems.
1. Network Operations Centres
A Network Operations Centre (NOC) contains the function or functions through which network operations are
controlled, either as a function distributed among business units, or as a discrete business unit itself. This
includes equipment, services, locations and processes used to support the network should this occur outside
a NOC.
This includes Security Operations Centres (SOCs) if distinct from the NOC (since they also perform key
functions of network governance and oversight). Proposals that affect the operation of the NOC or SOC, their
oversight, control, and effective supervision, as well as core equipment used must be notified.
Telecommunications Sector Security Guidelines 10
2. Lawful interception equipment or operations
Any equipment, parts of equipment, or software designed to facilitate the lawful interception of
communications on a network, which is permanently installed on the network, or able to be installed on
request. For the purposes of this guidance, this also includes hardware or software which supports or
facilitates this function.
3. Parts of networks that manage or store an aggregate of information
These are the places where information of a sensitive nature is likely to be stored, making the systems
hardware and its support/operation of specific security interest. This includes:

Aggregate information about a significant number of customers or the network itself. This refers to:
o
o
o

Aggregate authentication credentials of a significant number of customers. This refers to:
o
o

Databases which store data in bulk, such as call records or network traffic data.
Operations Support Systems (OSS), or Business Support Systems (BSS) and other forms of
business customer databases.
Proposals affecting the equipment or systems which interact directly and modify the network.
Areas of the network which store authentication credentials & encryption keys.
The Evolved Packet Core (EPC) and the Home Location Register (HLR/HSS) in mobile networks.
Administrative (privileged user) authentication credentials. This refers to:
o
Places where privileged user credentials regarding the network and support systems
themselves are stored and audit and oversight controls are retained.
4. Places where traffic belonging to customers or end users is aggregated
in large volumes, either in transit or at rest.
Areas where data aggregates may include:


Points of interconnection or intersection with other networks, and other areas over which a significant
proportion of the traffic on the network travels, in each case where the volume of traffic is, in absolute
terms, 15% or greater of the total traffic travelling over the network.
Large databases which reside in the core of the network and customer Voice Mail Systems (VMS), large
email or message systems.
Box 2: Case study – Consequences from the compromise of a ‘sensitive part’ of the network
Hackers in Greece infiltrated core components of the largest carrier in Greece’s network to intercept mobile
phone conversations. Rogue software was illegally implanted in four of the company’s switches (the
computer-controlled component of a phone network that connects two telephone lines to complete a
telephone call). This created two parallel streams – one stream went to the correct recipient and the other to
other stream to the hacker’s network. This allowed hackers to listen in on conversations, potentially record
conversations, and track the locations of key dignitaries as well as members of other political and nonpolitical groups. As switches are at the heart of a telecommunications network, the hackers only needed to
take over a few switches to carry out the attack.
Telecommunications Sector Security Guidelines 11
What were the consequences?
It is not known who the hackers were (including whether trusted insiders were involved or whether it was an
external attack) or what conversations were intercepted and the purpose of the interception. However, the
list of targets was discovered. It included the phones of the Greek Prime Minister and other high-ranking
ministers, government and military officials involved in sensitive political and business discussions.
How is this case study relevant to this framework?
This case study highlights why the framework is focussed on the sensitive parts of networks – the
consequences of a compromise of these parts can be particularly serious.
In addition, this particular carrier had inadequate monitoring processes and controls to detect the
unauthorised access to its lawful interception system. Under the Telecommunications Sector Security
Framework, C/CSPs will need to identify vulnerabilities in their networks and implement appropriate
measures and controls to manage those risks. The relationship between C/CSPs and security agencies will be
strengthened to minimise the occurrence of these types of security compromises.
Who has obligations under this security framework?
Amendments to the Telecommunications Act have placed obligations on all C/CSPs to protect networks and
facilities from unauthorised interference and unauthorised access (see Part 2).
While all C/CSPs will be obliged to protect networks and facilities from unauthorised access and interference,
only C/NCSPs are required to notify of changes to systems and services (classified as ‘Category A’ C/NCSPs –
see below for further information).
‘Category A’ C/NCSPs will be required to notify Government of key changes to telecommunications systems
and services. Security agencies may also work more closely with particularly high risk C/CSPs to assist them to
manage potential vulnerabilities to their networks and facilities. This will include developing risk assessments
and mitigation strategies for planned changes to networks that pose a high vulnerability to unauthorised
access and interference. For those carriage service providers (CSPs) identified as posing a lower risk and
classified as ‘Category B’, compliance with the framework will largely be satisfied by implementing some of
the key measures outlined below and by following general security threat advice.
‘Category A’ C/NCSPs
C/CSPs in this category will be treated as higher priority by government because they own and operate
telecommunications infrastructure and are required to provide interception capability. C/CSPs in this
category may already have a long established relationship with security and law enforcement agencies
because, for example, they are required to submit annual interception plans.
Your organisation is a Category A C/NCSP if:

You are a carrier or nominated carriage service provider (NCSP) under the Telecommunications
(Interception and Access) Act 1979 (TIA Act).
Telecommunications Sector Security Guidelines 12
What this means:


You will need to 'do your best' to protect networks and facilities from unauthorised access and
interference (see Part 2).
You will be required to notify of key changes to your telecommunications systems and services unless
exempted (see Part 3).
Additional engagement for high priority Category A C/NCSPs
Within Category A there is a further subset of C/NCSPs that are assessed by security agencies to be an even
higher priority. These C/NCSPs will be expected to engage more closely with security agencies to manage
national security risks across their networks and facilities. This group is a high priority from a security
perspective as they are likely to be more actively targeted and exploited by state-based actors and organised
criminals and therefore have an increased risk of espionage, sabotage or foreign interference. The risk
assessment will be based on:



percentage of market share - the larger the number of customers, the greater the aggregate data base
sensitivity of customer base - some customers will have more information of a more sensitive nature
being communicated and held on networks and facilities than others - such as government and critical
service providers, science and research organisations, large or significant commercial organisations, and
large healthcare provider organisations (or their suppliers and business partners), and
criticality of the network - for example, where the telecommunications network or service supports the
delivery of other critical services, e.g., health, power, water and/or where it provides niche services,
e.g. is the only service provider for a mine.
Carriers and NCSPs will be contacted and advised if they fall within this higher priority group.
What this means:


You may have a higher level of engagement with security agencies (you will be advised if this is the case
- see part 4). Note the purpose of closer engagement is to foster collaborative and proactive responses
to managing national security risks. It is not a compliance monitoring mechanism.
You may receive specific threat advice, security briefings and risk mitigation advice from security
agencies, which will not be generally available (this will be provided by security agencies on an as needs
basis - see part 4).
‘Category B’ CSPs
Your organisation is a Category B CSP if:

You are not a carrier or nominated carriage service provider under the TIA Act.
What this means:



You will need to 'do your best' to protect networks and facilities from unauthorised access and
interference.
You will not be required to notify of changes to your telecommunications systems and services (see
section 3)
You will not be expected to engage directly with security agencies (see part 4).
Telecommunications Sector Security Guidelines 13
These guidelines and additional information made available on the Attorney-General's Department website
at www.ag.gov.au/telcosecurity will contain information to help you to fulfil your obligations under the
Telecommunications Act (see Part 4).
Can a CSP change categories?
Security agencies may determine that closer engagement or less engagement is required if your business
circumstances change – for example, your organisation experiences a significant change in market share or
customer base.
CSPs will be advised if they are to be nominated under the TIA Act 1979 and will therefore move from
Category B to Category A. C/NCSPs already in Category A will also be advised if additional (or less)
engagement is required.
Telecommunications Sector Security Guidelines 14
Part 2: What do you need to do to meet your
security obligation?
Security obligation - C/CSPs are required to do their best to protect telecommunications networks and
facilities from unauthorised interference and unauthorised access (sections 313(1A) and (2A) of the
Telecommunications Act) for the purposes of security.
The legislative framework imposes a universal obligation on all C/CSPs to protect their networks and facilities
from national security risks of unauthorised access and interference. A universal obligation is important to
ensure all owners and operators of telecommunications networks, facilities and services are taking
reasonable steps to protect against national security risks.
Overview of the security obligation to protect networks
and facilities
The national security obligation has two elements - C/CSPs must do their best to protect their networks and
facilities from unauthorised access and unauthorised interference to ensure:


the confidentiality of communications carried on, and information contained on, telecommunications
networks and facilities, and
the availability and integrity of telecommunications networks and facilities.
The obligation is not absolute and is underpinned by a 'reasonableness' test. The term 'do your best' broadly
means taking all reasonable steps to protect your networks and facilities from unauthorised access and
interference. What constitutes reasonable steps in a particular circumstance to secure a network or facility
will differ depending on the risk factors of that network or facility (see pages 8 – 11).
How do you meet your security obligation?
As noted in Box 1 Vulnerabilities posed by outsourcing and offshoring arrangements, not all security risks and
vulnerabilities will give rise to a national security risk and, as noted on pages 8 – 11, not all parts of networks
and systems will pose national security vulnerabilities (although they may give rise to privacy or other risks).
Likewise, some C/CSPs are a greater target for malicious actors. Accordingly, C/CSPs are expected to adopt a
risk-managed approach to managing risks of espionage, sabotage and foreign interference to their networks
and facilities.
Risk management is the culture, processes and structures that underpin the effective management of
potential opportunities and adverse effects. It is a structured approach to identifying, assessing and
controlling risks that emerges during a program or project life cycle. The key standard for risk management is
AS/NZS ISO 31000:2009 Risk management – Principles and guidelines.
Telecommunications Sector Security Guidelines 15
This risk-management approach should particularly focus on risks posed by arrangements with suppliers (in
particular managed service providers) and particular service delivery models (i.e. outsourcing/offshoring) will
also expose the C/CSP to difference levels of risk that may need to be managed. For this reason, a key focus
of the obligation is on ensuring that regardless of any outsourcing and offshoring solution, a C/CSP is able to
demonstrate that it has competent supervision and effective control of its network. In other words
demonstrate that is has processes, controls and arrangements in place to manage ‘who’ can access systems,
networks and communications.
Some parts of networks, facilities and services are more vulnerable than other parts to unauthorised access
and unauthorised interference – these parts directly relate to maintaining the availability and integrity of the
network and protection of information of a valuable or sensitive nature (i.e. personal, government and
commercial). In meeting the national security obligation efforts should be directed towards protecting those
more sensitive parts of networks from intrusion – see pages 8 – 11 for examples of sensitive parts of
networks.
What are competent supervision and effective control?
Competent supervision refers to the ability of a C/CSP to maintain proficient oversight of its networks, data
and facilities. Competent supervision may be achieved either in-house or by using an independent third party.
Competent supervision could include arrangements to maintain:




visibility of network and facility operations
visibility of data flow and locations
awareness of parties with access to network infrastructure, and
the ability to detect security breaches or compromises.
Telecommunications Sector Security Guidelines 16
External assessments may provide a mechanism for organisations to have their security independently
reviewed.
The IRAP1 is governed and administered by the Australian Government Australian Signals Directorate. Any
Australian organisation (not just Government agencies) can engage an IRAP Assessor to conduct independent
ICT assessments against Australian Government policies and guidelines. IRAP Assessors assist organisations to
secure their ICT networks by assessing their security compliance and highlighting the information security
risks facing their organisation.
Penetration or vulnerability testing is another option to assess the vulnerability of a service to unauthorised
access or interference. It is important that any penetration test considers both technology and human
interaction. You may want to consider using a Council of Registered Ethical Security Testers (CREST) Australia2
approved company when hiring a penetration tester. The companies that CREST certified individuals work for
have subjected themselves to audit and scrutiny by CREST Australia, and have signed up to the CREST code of
conduct.
Effective control refers to a C/CSP's ability to maintain direct authority to ensure that its network and
facilities, infrastructure and information stored or transmitted, is protected from unauthorised interference
and access. This would include authority over all parties with access to network infrastructure and as noted
above the ability to control who has access to network systems, facilities, information and access restrictions.
Effective control might include the ability to:






direct actions to ensure the integrity of network operations and the security of information carried on
them
terminate contracts without penalty where there has been a security breach or data breach reasonably
attributable to the contracted services or equipment
address issues of data sovereignty
direct contractors to carry out mitigation or remedial actions
oblige contractors to monitor and report breaches to the C/CSP, and
re-establish the integrity of data or systems where unauthorised interference or unauthorised access
has occurred (for example to confirm accuracy of information or data holdings).
Third party assurance may also mean implementing controls which can be tested, and, when fully effective,
provide evidence that primary information security requirements have been, or are able to be, satisfied. The
Protective Security Policy Framework (PSPF) administered by the Attorney-General’s Department (AGD)
provides best practice guidance, in particular INFOSEC-4 and INFOSEC-5.
1
2
Further information is available at www.asd.gov.au/infosec/irap/index.htm
Further information is available at http://crestaustralia.org/
Telecommunications Sector Security Guidelines 17
What is unauthorised access or unauthorised interference?
For the purposes of this security framework, the obligation to protect networks and facilities from
unauthorised access and unauthorised interference only relates to threats to Australia’s national security
from espionage, sabotage or foreign interference.
By way of example, a C/CSP would need to take reasonable steps to prevent intrusions or breaches within
networks or facilities or to minimise the effect of malicious activity, demonstrable by the security controls in
place. This will be particularly relevant where activity, if left unchecked, could provide opportunity to
compromise the confidentiality, availability or integrity of telecommunications infrastructure or information
carried by, or across it.
Telecommunications Sector Security Guidelines 18
Risks to be mitigated include physical, personnel and systems. It is not reasonable or appropriate to give all
personnel or contractors unfettered access to all parts of a network or facilities or information carried on it.
Physical and logical controls need to be implemented along with clear access policies and the ability to track
unauthorised access.
The term ‘unauthorised access’ should also be understood in line with its meaning within the Privacy Act
1988 (Privacy Act), to the extent that this obligation relates to the confidentiality of communications and
information. Although not defined within the Privacy Act itself, the Office of the Australian Information
Commissioner has defined unauthorised access to be when personal information is accessed by someone
who is not permitted to do so. This includes unauthorised access by an employee of the entity or
independent contractor, as well as unauthorised access by an external third party (such as by hacking).
Telecommunications Sector Security Guidelines 19
What does it mean to ensure the availability and integrity of
telecommunications networks and facilities?
Availability is about ensuring that authorised users have access to information, communications and
telecommunications networks and facilities when required. An example where networks and facilities are not
available would be a denial-of-service attack which prevents the ordinary functioning of the service, which
could have serious economic, social or other consequences (particularly in an emergency).
Integrity relates to the accuracy and completeness of information and communications, as well as the
protection of telecommunications networks and facilities from compromise or unauthorised modification. An
example of a breach of integrity would be where a C/CSP’s systems are accessed by a third party and
modified to allow remote access by that party.
What does it mean to ensure the confidentiality of communications and
information?
Many C/CSPs are already required to comply with the obligations contained in the Australian Privacy
Principles (APPs) in the Privacy Act, which regulate the handling of personal information; in particular, APP 11
that requires C/CSP’s to take reasonable steps to protect the personal information it holds from misuse,
interference and loss, and from unauthorised access, modification or disclosure. Additionally, C/CSPs that are
covered by the data retention scheme must comply with the Privacy Act in relation to data collected and
Telecommunications Sector Security Guidelines 20
retained under that scheme, even where the C/CSP would otherwise be exempt from the Privacy Act. Section
313(1A), on the other hand, creates a new security obligation, which has as its objective the protection of all
information carried and stored on networks, including information about the network itself, not just personal
information.
The new security obligation aims to ensure the confidentiality of other categories of information that are
sensitive and vulnerable to unauthorised access and exploitation, including government and business
information. This includes intellectual property, information that could provide a competitive advantage, and
information of a sensitive nature about a C/CSP’s network, service delivery models and customers. A C/CSP
that provides services to large businesses or research organisations (such as universities) may be at a greater
risk of espionage, sabotage or foreign interference because of the commercial value of the information held
by their clients (such as scientific research).
There are a number of controls available to assist C/CSPs maintain confidentiality, including implementing
robust access controls to limit who has access to confidential communications and information. For example,
access should be restricted to those who are expressly authorised to have access and who require access to
do their job (i.e. provide access on a ‘need to know’ basis). Access controls are particularly important for
more sensitive parts of networks (see pages 8 – 11), including to mitigate the threat of unauthorised access
or interference from an insider (a trusted insider is a person such as an employee, contractor or business
partner who uses insider knowledge or access to commit a malicious act to cause harm 3).
The requirement to protect the confidentiality of communications and information relates to both
information in transit and information being stored on telecommunications networks and facilities. Some
storage solutions may present increased risk of unauthorised access and interference.
Encryption is important in many circumstances to ensure that information is stored and transmitted in a form
that cannot be easily accessed by unauthorised individuals or entities. Encryption methods should be
reviewed regularly to ensure they continue to be relevant and effective and are used where necessary. This
includes ensuring that the scope of encryption is wide enough so that attackers cannot access another
unencrypted copy of your encrypted information.
C/CSPs should refer to their existing obligations under the Privacy Act (particularly APP 11 – security of
personal information) and the Telecommunications (Interception and Access) Act 1979. C/CSPs must have
regard to those obligations in conjunction with, or in addition to, their obligations under this framework.
While there may be overlap between the steps that a C/CSP might take under section 313(1A) and APP 11,
the steps taken to comply with one obligation will not necessarily mean that the C/CSP has complied with the
other obligation. Importantly, the steps a C/CSP will be required to take under s 313 (1A) focuses on
protecting the information ‘for the purposes of security’, whereas APP 11 is focussed only on personal
information but requires C/CSPs to consider broader sources of risks to that information.
Existing policies and procedures to meet confidentiality and privacy obligations will also support compliance
with the new security obligation in this framework. For example, the following guidance issued by the OAIC
may assist you to identify practical measures you can implement to secure all categories of information:

Australian Privacy Principles Guidelines4
3
Further information is available in Managing the insider threat to your business: A personnel security handbook, which is available from
www.protectivesecurity.gov.au
4 www.oaic.gov.au/privacy/applying-privacy-law/app-guidelines/
Telecommunications Sector Security Guidelines 21





Guide to securing personal information5
Data breach notification — A guide to handling personal information security breaches 6
Privacy business resource 8: Sending personal information overseas 7
Privacy business resource 9: Ten tips to protect your customers’ personal information8
Privacy business resource 11: Telecommunications service providers’ obligations arising under the
Privacy Act 1988 as a result of Part 5-1A of the Telecommunications (Interception and Access) Act 1979 9
The Australian Communications Media Authority has also published privacy guidance. These are the Better
practice privacy tips for service providers10.
Box 6: Case study – Implementation of related legislative obligations by a hypothetical company Security
First Telco
An Australian carrier Security First Telco enters into a commercial outsourcing arrangement where another
company will provide the network management functions, including supporting critical network elements of
the telecommunications company’s infrastructure where all network traffic is routed.
Additionally, the company has recently put measures in place to meet data retention obligations, including
controls to protect access to stored customer information and traffic data. However, controls are not in place
to protect the outsourced company having access to key network transit points where traffic logs can be
generated and exported.
The proposed obligation to protect the confidentiality of communications and information carried across
networks under this framework would also require the carrier to protect communications and information in
transit and in use.
Resources to help you meet your national security obligation
The following Australian Government and international standards and guidelines, if implemented, would in
most circumstances be considered as demonstrating reasonable steps to protect networks and information,
and competent supervision and effective control of networks and facilities.



AS/NZS ISO 31000:2009 Risk Management – Principles and Guidelines11 deals with risk generally.
ISO 27001:2013 Information security management 12 helps organisations keep information assets
secure.
The International Telecommunications Union Recommendation X.1051 Information technology –
Security techniques – Information security management guidelines for telecommunications
5
www.oaic.gov.au/privacy/privacy-resources/privacy-guides/guide-to-securing-personal-information
www.oaic.gov.au/privacy/privacy-resources/privacy-guides/data-breach-notification-a-guide-to-handling-personal-information-securitybreaches
7 www.oaic.gov.au/privacy/privacy-resources/privacy-business-resources/privacy-business-resource-8
8 www.oaic.gov.au/privacy/privacy-resources/privacy-business-resources/privacy-business-resource-9
6
9
www.oaic.gov.au/agencies-and-organisations/business-resources/privacy-business-resource-11
10
11
12
www.acma.gov.au/theACMA/better-practice-privacy-tips-for-service-providers
This standard can be purchased from Standards Australia.
This standard can be purchased from Standards Australia.
Telecommunications Sector Security Guidelines 22









organizations based on ISO/IEC 2700213 provides guidance on information security management in
telecommunications organisations.
The Australian Signals Directorate:
o Information Security Manual14 is the standard for the security of government ICT systems
o Cloud Computing Security15 can help businesses perform a risk assessment and use cloud services
securely
o Strategies to Mitigate Targeted Cyber Intrusions16 provides information about how organisations
can select the best mitigation strategies for their requirements.
The Trusted Information Sharing Network (TISN) is Australia’s primary national engagement mechanism
for business-government information sharing and resilience building on critical infrastructure resilience.
The TISN website includes resources for businesses on protection of critical infrastructure. Information
can be found at www.tisn.gov.au
The Protective Security Policy Framework (particularly INFOSEC-4 and INFOSEC-5) outlines a range of
information to effectively managing protective security risk, including controls. Information can be
found at www.protectivesecurity.gov.au.
CERT Australia is the primary point of contact within the Australian Cyber Security Centre for cybersecurity incidents affecting major Australian business; it collaborates with over 500 entities to provide
them with advice and support. Information about CERT Australia can be found at www.cert.gov.au
The Australian Cyber Security Centre is the hub for private and public sector collaboration and
information sharing to combat cyber security threats. Information can be found at www.acsc.gov.au
The Australian Communications and Media Authority publishes information about legal obligations on
C/CSPs. This information can be accessed at www.acma.gov.au under ‘law enforcement’.
The United Kingdom Cyber Essentials Scheme: Requirements for basic technical protection from cyber
attacks17 is an accessible guide for organisations of all sizes to mitigating the most common internet
based threats to cyber security.
The United States National Institute of Standards and Technology Framework for Improving Critical
Infrastructure Cybersecurity18 includes standards, guidelines, and practices to help owners and
operators of critical infrastructure to manage cybersecurity-related risk. It can help organisations
determine their current cybersecurity capabilities, set goals for a target level of cyber resilience and
establish a plan to improve and maintain cybersecurity.
ISACA19 is an independent, non-profit, global association that engages in the development, adoption
and use of knowledge and practices for information systems. ISACA provides practical guidance,
benchmarks and other tools for all enterprises that use information systems.
Does this security obligation apply to existing systems?
While the security obligation will have immediate effect from the expiry date of the implementation period,
existing systems, networks and facilities in place at the time the security obligation comes into effect that are
non-compliant will not be penalised. C/CSPs are not expected to retrofit all systems on commencement of
13
Available at www.itu.int/rec/T-REC-X.1051
Available at www.asd.gov.au/infosec/ism/
15 Available at http://www.asd.gov.au/infosec/cloudsecurity.htm
16 Available at www.asd.gov.au/infosec/mitigationstrategies.htm
17 Further information is available at
www.gov.uk/government/uploads/system/uploads/attachment_data/file/317481/Cyber_Essentials_Requirements.pdf
18 Further information is available at www.nist.gov/cyberframework/
19 Further information is available at www.isaca.org
14
Telecommunications Sector Security Guidelines 23
this security obligation, except in very rare cases where a significant security vulnerability is found in an
existing network that could facilitate acts of espionage, sabotage and foreign interference. In such cases,
government agencies will seek to work with the provider to develop cost effective solutions to better manage
the risks posed by the existing vulnerability. Subject to how serious the security risk is and how willing the
company is to collaborate with security agencies to manage the risk, a direction could be issued by the
Attorney-General requiring mitigation measures to be implemented to better manage the risk.
Telecommunications Sector Security Guidelines 24
Part 3: What do you need to do to meet your
notification obligation?
Notification requirement - Carriers and nominated carriage service providers (NCSPs) are required to notify
Government of key changes to telecommunications systems and services that could have a material
adverse effect on their ability to meet their national security obligation to protect networks and facilities
(unless exempted from this requirement).
The notification requirement in section 314A of the Telecommunications Act provides a trigger for C/NCSPs to
engage with Government early in the design phase of any planned changes to telecommunications systems
and services. This is to ensure that consideration is given to whether the change will create new, or
exacerbate existing, risks or provide opportunities to address existing vulnerabilities. In this way the
notification requirement seeks to facilitate a culture where national security considerations are embedded
into business decision making and operations.
Consideration by security agencies of notifications does not constitute an endorsement of proposals in any
broader security sense (beyond risks to national security). It must not be considered as a substitute for
standard business risk assessments, standard due diligence, enterprise security reviews or any other form of
assessment that a network operator would usually perform when initiating a new project or change.
An overview of the notification obligation is included at Attachment A.
Who needs to notify Government of changes to systems?
Only C/NCSPs are required to notify Government of changes to systems and services.
The notification requirement is limited to C/NCSPs. However, for all CSP’s a key trigger in managing the risk
of unauthorised access and interference will be at the point of designing and planning changes to networks
and service. At this point, all C/CSPs should assess whether the proposed change to their networks or
facilities may adversely impact on their ability to continue to meet their security obligation. Only C/CSPs will
be required to engage with Government before making these changes through the notification process.
Are exemptions available?
The CAC within the Attorney-General's Department may exempt a C/NCSP from any notification
requirements or for some types of changes. For example, a large carrier which offers a number of different
types of services may be exempted from providing any notifications in relation to a part of their business (for
example, a subscription television service), but would still be required to notify of changes to other parts of
their business. The details of a partial exemption would be specified in a notice provided to the C/NCSP.
There is no application process for C/NCSPs - instead the CAC will decide if and when to grant any exemption
and write to the affected C/NCSP advising of the decision to grant the exemption. A decision to grant a full or
partial exemption will be based on advice from ASIO having regard to the risk profile of individual companies
otherwise required under section 314A of the Telecommunications Act to comply with the notification
requirement. The risk assessment will consider factors such as the likelihood of a C/NCSP or class of C/NCSP's
Telecommunications Sector Security Guidelines 25
networks, services or systems being vulnerable to unauthorised access and unauthorised interference and
the consequences for national security if those risks are realised. As noted above such assessments will likely
have regard to the following risk factors:



percentage of market share - the larger the number of customers, the greater the aggregate data base
sensitivity of customer base - some customers will have more information of a more sensitive nature
being communicated and held on networks and facilities than others - such as government and critical
service providers, science and research organisations, large or significant commercial organisations, and
large healthcare provider organisations (or their suppliers and business partners), and
criticality of the network - for example, where the telecommunications network or service supports the
delivery of other critical services, e.g., health, power, water and/or where it provides niche services,
e.g. is the only service provider for a mine.
The CAC may also vary or revoke an exemption based on advice from ASIO, having regard to any changes to
security risks and services offered by the C/NCSP and the national security threat environment.
Further information on the exemptions process is available in Factsheet [X being developed].
What types of changes should be notified?
It is important to keep in mind that not all proposals require notification. This section explains the kinds of
changes that do and do not need to be notified. This summary is illustrative and not exhaustive. It will likely
require updating from time-to-time to reflect changes in the threat environment, technology and
telecommunications infrastructure and methods for delivering telecommunications services.
The threshold for triggering the notification requirement is outlined in section 314A of the
Telecommunications Act and is intended to capture changes that can increase risk, such as outsourcing
arrangements, offshoring equipment and services, changes to services, procuring new equipment and
changes to the management of services. The risks to these types of business decisions or methods of delivery
may be particularly amplified when they relate to ‘sensitive parts of networks’ (see pages 8 – 11 for further
information on sensitive parts of networks that are areas of greater security interest).
The legislation limits the scope of the notification requirement to adverse material changes, which
incorporates a value judgement about whether the change would have a negative impact of some substance
on a C/NCSP’s ability to meet its security obligation.
Telecommunications Sector Security Guidelines 26
If in doubt as to what might constitute an adverse material change, C/NCSPs should contact the general
hotline [TBA] in the Attorney-General’s Department or submit an online inquiry form to
telco.security@ag.gov.au
A proposed change includes standard builds which might cover a particular change replicated at many points
of a network, and also ‘bulk changes’ – a series of changes that can be treated as one overarching ‘bulk
change’.
C/NCSPs can submit a single (rather than repeated) notification for a standard build or a bulk change.
Standard builds
A standard build may comprise consistently procured equipment build or a network addition, which is
replicated throughout the network. Notification of the standard build is only required in the first instance,
provided the build does not change to a type of equipment that has not been previously submitted to the
CAC by that network operator. In instances where a standard build is used, notification should also include
details of the geographic locations in which it is intended to be deployed.
An example of a standard build would be a build which is replicated across the country. In such a case, a
notification of proposal which specifies which equipment will be used, the oversight and control mechanisms
and the geographic locations that the build will be deployed in would be sufficient notification for all
deployments of the same build (provided no network security risks are identified).
Should the standard build change from that notified, a new notification would need to be submitted outlining
the changes in the new build.
Bulk changes
In addition, one notification may be submitted for a standard set of equipment to be used in a network
proposal, i.e. a bulk change. This could include all versions of a certain type of networking equipment, and the
software/firmware builds that are likely to be deployed on it.
Notification could also be supplied for a specific product range which may change incremental versions over
time. Once the CAC has considered the proposal covering the product range, the equipment would be able to
be deployed on the network without the need to submit a new notification.
For example, where security agencies have been previously engaged on a similar change to a network or have
previously approved a proposed procurement process, architecture or equipment it may not be necessary to
submit a notification for the same type of change.
Telecommunications Sector Security Guidelines 27
However, there are some practical limitations to notifications of bulk changes. A notification with an
excessive number of equipment types or for an entire vendor’s product range does not amount to
notification of a bulk change.
Notifiable equipment
Box 7: Case Study – Which proposed changes to their systems should the hypothetical company Security
First Telco notify to Government?
Security First Telco is reviewing proposed changes to their telecommunications systems to decide which
changes need to be notified to Government.
Examples of changes that should be notified
After a risk assessment (based on the guidance in this document), they have decided the following changes
are likely to have a material adverse effect on their ability to protect their networks from unauthorised access
and interference (i.e. espionage, sabotage and interference) for the following reasons:
1. Engagement of a new billing provider
This proposal would likely involve the new billing supplier and a third party, being used by the billing supplier,
having access to sensitive customer information during the projects and possibly after the project as part of
support arrangements. After discussing the project with Government, possible mitigations activities could
include controlling the access any third party company located outside of Australia may have to the personal
information and billing data for all of Security First Telco’s Australian customers.
2. A mobile network operator to deploy Long Term Evolution (LTE) technology
A mobile network operator plan to deploy LTE would likely mean new or upgraded equipment and involve an
equipment supplier or managed service provider to have access to sensitive parts of Security First Telco’s
networks, including access to communications. In this instance, possible mitigation activities could include
ensuring adequate control and monitoring over levels of access the equipment supplier may have, including
remote access arrangements. This would also apply if the network operator were planning to trial new
equipment before considering any tender related activity
3. Engagement of an existing supplier to upgrade core routing equipment
This plan would likely require a supplier to access or install software on equipment where a significant
proportion of the network traffic travels including telecommunications intercepted traffic. In this scenario
mitigations actions could address concerns related to unauthorised access to the network real time traffic or
interception data.
4. Renewal of a contract not previously notified to Government
Security First Telco entered into a contract with a company to manage their data storage solution (which
includes all customer details) before they were obliged to notify Government of changes to systems under
this framework. Although the new contract would reaffirm the status quo, Security First Telco should notify
Government that they are planning to renew the contract with this supplier as this arrangement could affect
the ability of Security First Telco to maintain effective control and competent supervision of its networks and
services. In most cases, if security agencies have not already identified the current arrangement as potentially
Telecommunications Sector Security Guidelines 28
exposing the network to security vulnerability it will likely be assessed and confirmed as not giving rise to
security risks. However there may be incidents where security agencies can provide guidance and advice to
enhance control and supervision of data stored by the vendor. As noted on page 24, C/CSPs are not expected
to retrofit all systems on commencement of this security obligation. However, opportunities such as renewal
of a contract may provide an opportunity to better mitigate any existing security vulnerabilities (for example,
specification of mandatory security requirements in the contract itself).
Examples of changes not required to be notified
Through their risk assessment, Security First Telco has assessed that the following changes are not likely to
have a material adverse effect on their ability to protect their network and therefore do not need to be
notified:
1. Renewal of a contract previously notified to the Government
Security First Telco advised the Communications Access Coordinator (CAC) when they first engaged this
supplier to provide their data storage solution. However, given the CAC previously advised there were no
security concerns with this supplier (because Security First Telco had built in security requirements and
protections into the original contract) there would generally be no need to notify again as there would be no
change to existing arrangements (i.e. there are no changes to the location of the data storage or contractual
requirements). However, if the threat environment has changed (for example if Security First Telco has been
advised by security agencies of new security threats) then Security First Telco may need to notify of the
renewal of a contract.
2. Construction of new mobile towers by Security First Telco
Security First Telco has assessed that proposed construction of further mobile towers is unlikely to have a
material adverse effect on their ability to protect their networks from unauthorised access and interference
because they are using a standard build, which has been previously notified to the CAC and assessed as not
giving rise to security concerns (see page 27 for further information about standard builds).
3. Upgrades to the operations centre
Security First Telco is expanding and renovating their operations centre in Australia, including new access
restrictions. As there will be no substantial change to existing arrangements (in fact the new access
restrictions are likely to tighten physical and logical access and therefore will enhance the company’s ability
to protect their network from security risks) there is no need to notify of the changes.
4. Business-as-usual maintenance
Security First Telco does not need to notify of ongoing maintenance of legacy systems and infrastructure
which do not amount to substantial modifications in network design, operations and service delivery.
When should changes be notified?
Although the legislation does not specify when a C/NCSP should notify Government of changes, it is in the
C/CSP's best interests to notify as early as possible, such as early in the stages of considering a C/NCSP
finalising any business plans, contracts or negotiations and before entering into any binding undertakings.
Telecommunications Sector Security Guidelines 29
For example, if a C/NCSP is looking at a procurement or acquisition, it is in the best interests of the C/NCSP to
notify the CAC before taking any steps as part of the decision-making approach (i.e. before they have
approached the market whether by request for quote, tender or otherwise). This will allow security
considerations to be built into the proposal from the start - not added later, which is generally more costly
and less effective.
Early notification is in the best interest of C/NCSPs– allowing security considerations to be factored into the
proposal design as early as possible in a cost effective manner. Even the most informed C/NCSP is unlikely to
have access to the most up to date threat information. Notification early in the procurement process will
avoid unnecessary delay in the progress of procurements and minimise costs associated if procurement plans
need to be modified to address security concerns.
It is important to ensure that relevant parts of your business are aware when they need to notify Government
of changes to systems and services. This could include having the following as parts of your procurement
processes:



education program within your organisation about your organisation's obligations under this
legislation, including security thresholds for reporting
providing relevant staff with information about relevant material on the AGD website, including these
Guidelines, and
thorough understanding of how your company's infrastructure operates, including the security
arrangements of any outsourced processes.
Box 8: Case study – Consequences of late notification of offshoring plans
In an effort to increase their competitiveness and reduce operating costs, an Australian carrier outsourced
the operation and maintenance of its network to a new company located overseas. The location of the new
company does not pose a security concern but soon after taking control began to migrate the carrier’s
network management facilities to a country of security concern.
Company personnel located in that country have direct access to all elements of the active network, and
there is a significant risk that unauthorised use of this access could be exploited for foreign intelligence
purposes, or to disrupt the normal operation of the network.
Offshoring raises security concerns because it enables access and control to critical parts of major Australian
telecommunications networks outside of Australia, this can facilitate foreign intelligence collection
(espionage) and disrupt the network itself (sabotage). Risks arise where control and supervision
arrangements have the potential to allow unauthorised actions by third parties, such as theft of customer
data or sabotage of the network.
When were security agencies engaged?
In this case, ASIO was not aware of the offshoring plans until it they were almost complete, which prevented
the proactive deployment of relevant mitigation measures (such as building in security and oversight
requirements into the contract with the third party). Implementing control measures once offshoring has
been implemented can be significantly more costly, time consuming and challenging. A failure to implement
control measure can expose significant national security vulnerabilities. If left unmanaged, this could provide
foreign intelligence agencies and organised crime groups access to sensitive law enforcement information
Telecommunications Sector Security Guidelines 30
stored on networks and reveal the location and movements of protected persons and other important
people, such as the Prime Minister.
How is this case study relevant to this framework?
This case occurred before security obligation or reporting requirements came into effect and highlights that
were early notification does not occur telecommunications companies can inadvertently expose their
networks to an increased risk of espionage, sabotage and foreign interference activities – which ultimately
impacts on customers and potentially damages the reputation of the telecommunication company.
How can you notify the Government of changes?
A notification should be made using the notification template available at www.ag.gov.au/telcosecurity to the
CAC within the Attorney-General’s Department at CAC@ag.gov.au
Can you submit a security capability plan instead of
multiple individual notifications?
A security capability plan may be submitted each year to notify about all proposed changes that are likely to
have a material adverse effect on their ability to meet their security obligations to protect networks, instead
of notifying the CAC of each individual change to systems and services – see section 314C of the
Telecommunications Act. Note that this is entirely optional (for example if it is more efficient for a company
and aligns with internal business and reporting processes).
What proposed changes should be included in a security capability plans?
The types of proposed changes that should be included in a security capability plan are the same as those
that need to be notified to the CAC under section 202B of the TIA Act. In other words, security capability
plans should only include changes that are likely to have a material adverse effect on the capacity of the
C/NCSP to comply with their obligation to protect their networks and facilities from unauthorised access or
interference under subsections 313(1A) and (2A).
How far in advance should security capability plans forecast?
While the legislation does not prescribe how far in advance the plan should capture proposed changes, the
number and types of changes included will to some extent be shaped by practical considerations. For
example, noting that the CAC has a maximum of 60 days to consider notifications covered in the Plan it may
not be feasible to include changes that have tight deadlines for implementation and which require CAC
consideration in a shorter timeframe to avoid delaying a project. For such proposed changes, a C/CSP may
wish to notify under section 314A of the Telecommunications Act as the CAC must consider the notification
within 30 days (unless further information is required).
To maximise the benefit of submitting a security capability plan, it should, at a minimum, forecast proposed
changes to systems and services for the upcoming 12 months. There is no maximum timeframe for
forecasting changes, for example a C/NCSP may be able to forecast planned changes for the next 5 years and
these may be included in the security capability plan. C/NCSPs are encouraged to notify proposed major
changes such as development of a new service or network as soon as possible, but should include sufficient
Telecommunications Sector Security Guidelines 31
detail about each proposal to enable the CAC and security agencies to adequately assess whether the
proposed change is likely to give rise to national security risks.
What other information can be included in a security capability plan?
C/NCSPs may like to include information about their practices, policies or strategies in place to secure their
networks from unauthorised access and unauthorised interference. For example, this might include:



a description of the risk assessment processes used to identify and manage security risks on networks,
systems and services;
arrangements and mechanisms in place for overseeing contracted managed service provider
compliance with security requirements etc. (for example standard contract terms concerning
personnel, logical and physical security requirements and access restriction and how compliance with
these terms is monitored and enforced)
assurance processes for vetting security practices of a vendor.
C/NCSPs may also like to detail any current or proposed mitigation measures or controls to reduce the risk of
unauthorised access or interference. For example, this may include access controls in systems or oversight
arrangements that are proposed to be built into contracts with third parties. These additional details will
help expedite the assessment of the security plan by security agencies by reducing the likelihood that the CAC
will need to request additional information from a C/CSP about a proposed change.
When can security capability plans be submitted?
Security capability plans may be submitted to the CAC at any time of the year. For example, C/NCSPs may
choose to submit their security capability plan when they submit an interception capability plan. However, if
the two plans are submitted simultaneously they need to remain as separate documents as they are likely to
be reviewed by different areas of AGD and ASIO.
How can you submit a security capability plan?
A security capability plan should be submitted using the template available at www.ag.gov.au/telcosecurity
to the CAC within the Attorney-General's Department at CAC@ag.gov.au
Can you update a security capability plan if you modify a previously
proposed change?
No. A C/NCSP may only submit one security capability plan in a 12 month period.
If a minor modification is made to a change already notified to the CAC (for example, a change in the
intended implementation of the change) then no further notification is required. However, if the modification
would be likely to have a material adverse effect on compliance with the security obligations then it must be
submitted as a new notification under section 314A. For example, if a notification was previously made to
locate a core control system in one country and the proposal changed to locate the system in a different
country then the proposal would need to be notified again under section 314A.
Can you update a security capability plan if you propose a new change?
No. A C/NCSP may only submit one security capability plan in a 12 month period.
Telecommunications Sector Security Guidelines 32
The C/NCSP must use the notification mechanism in section 314A of the Telecommunications Act for any
additional changes not included in the security capability plan.
What happens after you notify Government of proposed
changes or submit a security capability plan?
Further information on the administrative processes that follow individual notifications is included in the
administrative factsheet [X being developed]. Factsheet [X being developed] contains further information on the
administrative processes following submission of a security capability plan.
Telecommunications Sector Security Guidelines 33
Part 4: When should you engage with
security agencies?
General threat advice
AGD will publish and circulate general threat advice, as required. This may include, for example, updates on
latest methodologies to access and interfere with networks or updated mitigation advice. The ASIO Business
Liaison Unit (BLU)20, ACSC (www.acsc.gov.au) and CERT Australia (www.cert.gov.au) are other sources of
information about threat advice and information.
ASIO's BLU provides a public interface between the Australian Intelligence Community and Australian
business. The BLU administers a secure website on a free subscription basis. The website contains
intelligence-derived unclassified ASIO reporting on the domestic and international security environment as
well as physical, personnel and information security advice. The website also contains reports from other
Australian Government agencies and international partners.
The Australian Cyber Security Centre Threat Report 21 also includes information tailored for Australian
organisations about the threats their networks face from cyber espionage, cyber-attacks and cybercrime. The
report also contains mitigation and remediation information to assist organisations to prevent, and respond
to, the threat.
C/CSPs will also be encouraged to share examples of good practice (such as Telstra’s ‘five knows of cyber
security’ described on page 16).
Specific threat advice
C/NCSPs identified as high priority (a subset of Category A C/NCSPs) will be expected to engage more
regularly with security agencies. A natural trigger for this engagement will occur at the time of notifying of
proposed changes to networks and facilities. Alternatively, security agencies may initiate contact because, for
example, they become aware of a particular risk to a network or facility. Security agencies will also seek to
develop more collaborative partnerships with this category of C/NCSPs to encourage open dialogue about
emerging threats and a partnership to manage these threats. As noted above, the objective of closer
engagement with this group is to foster greater collaboration.
Security agencies may seek to establish regular ongoing meetings with this group of C/NCSPs to provide
general and specific threat advice, discuss proposed changes to systems and services and collaborate to
develop mitigations or controls to address security risks. Existing forums such as the Telecommunications
experts Group22, co-chaired by the Attorney General’s Department and Department of Communications and
the Arts, and TISN23 may also be utilised to discuss threat advice and appropriate control measures.
20
http://www.asio.gov.au/ASIO-and-National-Security/Units/BLU.html
https://www.acsc.gov.au/publications/ACSC_Threat_Report_2015.pdf
22 Further information (including membership and terms of reference) will be available at www.ag.gov.au/telcosecurity
23 Further information is available at www.tisn.gov.au
21
Telecommunications Sector Security Guidelines 34
Security agencies may request to have specified personnel within a C/CSP apply for a security clearance.
Having cleared staff will allow security agencies to share certain information about network security risks that
is classified. While these individuals cannot pass classified information to un-cleared colleagues, they will be
able to give informed guidance on identifying and addressing network security risks. If a C/CSP does not have
security cleared staff, security agencies will still seek to engage with them and share what information they
can about security risks.
Operational assistance
Effective protection of telecommunications networks and facilities is not just about prevention of threats, it
also relates to the overall resilience of an organisation. Monitoring processes to detect cyber-attacks and
plans to respond to, and recover from, a cyber-attack are also very important to consider. Further
information about developing effective monitoring processes and response plans is available in the resources
listed on page 22.
A key component of a response plan is knowing when to report a cyber-incident. C/CSPs should consider
whether to contact the following organisations if there is an incident or breach in their organisation.
CERT Australia
We encourage major businesses to report cyber security incidents to CERT Australia, which is part of the
Australian Cyber Security Centre. This allows the CERT to form a more accurate view of cyber security threats
and make sure that businesses receive the right help and advice.
To report an incident:



call the hotline on 1300 172 499
email info@cert.gov.au, or
visit www.cert.gov.au
Australian Cybercrime Online Reporting Network
Responsibility for combating different forms of cybercrime in Australia is shared between Commonwealth,
state and territory agencies. Cybercrime includes crimes directed at computers or other devices (such as
hacking), and crimes where computers or other devices are integral to the offence (such as online scams and
fraud).
Individuals and small to medium businesses may report suspected cybercrime online through the Australian
Cybercrime Online Reporting Network (ACORN) at www.acorn.gov.au. The ACORN is a secure reporting and
referral service for cybercrime and online incidents which may be in breach of Australian law. Certain reports
will be referred by the ACORN to law enforcement agencies for further investigation. We encourage major
businesses to report cyber security incidents to CERT Australia.
Telecommunications Sector Security Guidelines 35
Office of the Australian Information Commissioner
A robust data breach response plan is important should any data breaches occur (whether or not involving
personal information). Further information on responding to data breaches is available in the OAIC resource
Data breach notification — A guide to handling personal information security breaches24.
C/CSPs are strongly encouraged to report to OAIC any incidents or breaches involving personal information
where there is a real risk of serious harm to individuals. The OAIC can provide general information about
obligations under the Privacy Act, factors to consider in responding to a data breach, and steps to take to
prevent similar future incidents. The OAIC’s Data breach notification — A guide to handling personal
information security breaches contains information about notifying and responding to an incident or breach.
To report a breach email enquiries@oaic.gov.au
Box 9: Case study – Engagement between ASIO and a C/CSP to mitigate security risks
An Australian telecommunications company was considering a proposal to introduce a new customer
management and billing system. ASIO assessed management and billing systems as a sensitive part of a
telecommunications system because they are an aggregate of customer data and information. Through
reporting from an overseas partner, ASIO became aware of security concerns associated with the company’s
preferred supplier. In particular, that the preferred supplier could facilitate foreign intelligence services
gaining unauthorised access to sensitive customer and network information.
What engagement occurred?
The C/CSP advised ASIO early in the planning stage of the proposal. This meant ASIO could advise the
company of the potential national security risks associated with engaging the preferred supplier and the
types of mitigation measures that would need to be implemented to manage the risks and provide an
adequate level of mitigation.
The company acknowledged the potential national security risks and worked with ASIO to revise the criteria
in the tender process to incorporate security requirements (as the company had engaged ASIO early in the
process it was less complex to incorporate these requirements than if engagement had occurred later in the
process). The company also agreed to investigate additional mitigation options to sufficiently hinder actions
which may directly harm Australia’s interests.
What are the implications for this security framework?
In this case the national security risks were managed through early engagement and the establishment of a
cooperative partnership between the carrier and ASIO. TSSR seeks to support this cooperative approach
through a more formal, transparent and accountable security framework. Development of mitigation to
respond to the security risks was a cooperative process between ASIO and the company – allowing
development of the most cost-effective and practical measures to mitigate the risk.
24
www.oaic.gov.au/privacy/privacy-resources/privacy-guides/data-breach-notification-a-guide-to-handling-personal-information-securitybreaches
Telecommunications Sector Security Guidelines 36
Part 5: How will the Security Framework be
administered? A step by step guide
Telecommunications Sector Security Guidelines 37
Glossary
This glossary provides a description of key terms used in these guidelines. The descriptions are not intended
to be a legal definition. The descriptions are also specific for these guidelines only and should not be relied
upon in other contexts.
Telecommunications Sector Security Guidelines 38
Attachment A: Overview of the notification process
Download