Protective security better practice guide Developing agency protective security policies, plans and procedures Approved March 2012 Amended April 2015 Version 1.1 © Commonwealth of Australia 2011 All material presented in this publication is provided under a Creative Commons Attribution 3.0 Australia (http://creativecommons.org/licenses/by/3.0/au/deed.en ) licence. For the avoidance of doubt, this means this licence only applies to material as set out in this document. The details of the relevant licence conditions are available on the Creative Commons website (accessible using the links provided) as is the full legal code for the CC BY 3.0 AU licence (http://creativecommons.org/licenses/by/3.0/legalcode ). Use of the Coat of Arms The terms under which the Coat of Arms can be used are detailed on the It's an Honour (http://www.itsanhonour.gov.au/coat-arms/index.cfm) website. Contact us Inquiries regarding the licence and any use of this document are welcome at: Business Law Branch Attorney-General’s Department 3-5 National Cct BARTON ACT 2600 Telephone: (02) 6141 6666 copyright@ag.gov.au Document details Security classification Unclassified Dissemination limiting marking Publicly available Date of security classification review June 2018 Authority Protective Security Policy Committee Author Protective Security Policy Section Attorney-General’s Department Document status Approved 22 March 2012 Amended April 2015 Contents 1. Introduction ......................................................................................................................... 1 1.1 Purpose ................................................................................................................................... 1 1.2 Audience ................................................................................................................................. 1 1.3 Scope ....................................................................................................................................... 1 1.3.1 2. Approach ............................................................................................................................. 2 2.1 3. Review of policies, plans and procedures ............................................................................... 3 Asset identification and risk assessment................................................................................ 4 3.1 Asset identification ................................................................................................................. 4 3.2 Risk assessment ...................................................................................................................... 4 3.2.1 4. Threat assessment .......................................................................................................... 4 Protective security policy ...................................................................................................... 6 4.1 5. Use of specific terms in these guidelines ........................................................................ 1 Components of protective security policy .............................................................................. 6 Protective security plans and procedures .............................................................................. 8 5.1 Classification and control of the security plan ........................................................................ 8 5.2 Components of a security plan ............................................................................................... 8 5.2.1 Governance arrangements ............................................................................................. 8 5.2.2 Personnel security ........................................................................................................... 9 5.2.3 Information security........................................................................................................ 9 5.2.4 Physical security .............................................................................................................. 9 5.3 Security plan format ............................................................................................................. 10 5.3.1 Foreword ....................................................................................................................... 10 5.3.2 Statement of purpose and objectives ........................................................................... 10 5.3.3 Security assessment ...................................................................................................... 10 5.3.4 Actions/strategies, resources, responsibilities and outcomes/performance indicators ............................................................................... 10 5.3.5 Procedures and other attachments .............................................................................. 11 Annex A—Protective security in an agency’s risk management and planning ............................... 12 Amendments No. Location Amendment 1. Throughout Update links 2. Throughout Insert paragraph numbering 1. Introduction 1.1 Purpose 1. The Protective Security Policy Framework (PSPF) requires agencies to develop their own protective security policies, plans and procedures. The Australian Government Protective security better practice guide—Developing agency protective security policies, plans and procedures provides guidance to agencies in developing their protective security policies, plans and procedures. It also assists agencies to achieve a consistent approach to determining personnel, information, physical and procedural controls used to manage security risks. 1.2 2. Audience This document is primarily intended for: 1.3 3. Australian Government security management staff, and any other body or person responsible for developing protective security policies, plans or procedures on behalf of Australian Government agencies. Scope This guide provides better practice advice to agency security management staff. Specific controls and risk mitigation measures used by agencies should be based on the requirements of legislation or the PSPF, and supporting protocols and guidelines, whichever is the higher. 1.3.1 4. Use of specific terms in these guidelines In this guide the use of the term ‘should’ refers to better practice. Agencies are expected to apply better practice unless there is a reason based on their risk assessment to apply alternative controls. 2. Approach Diagram 1—Components of agency protective security 5. Agencies should take an integrated approach to preparing their protective security policies, plans and procedures. All components are interdependent and can be conducted concurrently. 6. After setting up a policy framework based on operational needs, the first stage in developing protective security policies, plans and procedures is asset identification and risk assessment as presented in the order of the guide. The policy, plan and procedures then become intermeshed as the plan will include revision of the policy and procedures to mitigate and provide specific agency risk mitigation strategies (plans) and measures (controls – includes procedures) to be implemented over a prescribed time (plan). 7. Agency protective security policies, plans and procedures may be a single document, separate documents or incorporated into other agency operations documents. If agency protective security policies, plans and procedures are not a single document they should be developed in conjunction with each other, based on the agency risk assessment, as each document will influence the other. 8. 2.1 9. The security policies, plans and procedures should consider the agency objectives and other agency operational policies and outcomes. See Annex A—Protective security in an agency’s risk management and planning. Review of policies, plans and procedures All protective security policies, plans and procedures should be reviewed as the risk environment changes or at least every two years. 10. These reviews should also identify any gaps in agency policy or mitigation measures and comply with Australian Government expectations as outlined in the PSPF. 3. Asset identification and risk assessment 11. All protective security policies, plans and procedures should: mitigate identified risks to agency assets—including personnel, information, physical assets and services (including third party dependencies); or apply controls to meet the Australian Government’s governance expectations, and in the case of asset sharing arrangements, apply controls to meet the other agencies’ expectations whichever is the higher. 12. In addition to meeting general Government policies, agency protective security policies should address any applicable legislative or policy requirements that are specific to the agency. 13. Asset identification and security risk management documents can form part of an agency security plan or be standalone and inform the agency protective security policies and plan. 3.1 Asset identification 14. Agencies should identify all assets that are critical to the ongoing operations of the agency or to the national interest. 15. The Australian Government protective security governance guidelines—Business impact levels provide a consistent model for agencies to use when assigning a value to assets based on the impact arising from the compromise of confidentiality, loss of integrity or unavailability of the assets. 3.2 Risk assessment 16. After identifying an agency’s critical assets, the agency should determine the risks to these assets. 17. The PSPF requires that agencies apply the risk management methodology detailed in AS/NZS ISO 31000:2009 Risk management—Principles and guidelines and HB 167:2006 Security risk management to assess their security risks. Diagram 2—Security risk management process provides a summary of the security risk management process. 18. Security risk assessment is closely related to other agency risk assessment processes and should not be considered in isolation from other areas of risk. See Annex A—Protective security in an agency’s risk management and planning. 3.2.1 Threat assessment 19. Agencies should identify the threats to their assets to enable them to adequately assess their risks. 20. National security threat assessments may be sourced from the Australian Security Intelligence Organisation National Threat Assessment Centre. Agencies may also seek threat advice from other government agencies and local authorities. 21. Agencies may also develop their own threat assessments using the guidance provided in Standards Australia handbook HB167:2006—Security Risk Management if they feel their personnel have the requisite skills, or to address agency specific threats. Diagram 2—Security risk management process (This diagram has been reproduced from Standards Australia HB167:2006 - Security Risk Management by permission of SAI Global Ltd.) 4. Protective security policy 22. Agency protective security policy gives authority to all protective security controls used in the agency protective security plan and procedures. The controls mitigate the risks to agency assets or where higher meet the Australian Government’s expectations in asset sharing arrangements. 23. The agency head, or his or her delegate, should approve protective security policy as agency policy. This will ensure that the policy can be enforced. 24. The Australian Public Service Code of Conduct (Public Service Act 1999 (Cth) Section 13) states: An APS employee must comply with any lawful and reasonable direction given by someone in the employee’s Agency who has authority to give the direction. 25. Agencies operating outside of the Public Service Act will have similar provisions relating to the requirement for employees to follow direction. 26. The agency security executive and agency security adviser should actively monitor agency security policy to ensure that the policy continues to address the risks to the agency’s security. 4.1 Components of protective security policy 27. Protective security policies should cover: Governance arrangements—including how protective security relates to other components of an agency’s operational governance, including, but not limited to: - fraud control - security components of employee and public safety - security requirements in contracts - assigning security management roles - audit and compliance reporting - processes for policy exceptions, and - review and amendment. Personnel security policy—including, but not limited to, the reasons supporting and authority for: - agency specific checks - security clearance requirements - use of temporary access arrangements, that is emergency, limited higher and provisional access, and - security violation, breach and infringement investigation and management arrangements. Information security policy—including, but not limited to, the reasons supporting and authority for: - classification and business impact levels - ICT access - email and internet use, and - removal of information from agency premises. Physical security policy—including, but not limited to, the reasons supporting and authority for: - agency employee and visitor access—there may be site specific policies where there are different roles/risks in facilities - access by children - security and safety of people—in conjunction with other agency safety policies - tele-working and mobile computing, and - physical security of information. 5. Protective security plans and procedures 28. An agency’s protective security plan and procedures should mitigate an agency’s security risks, and facilitate sharing arrangements. Protective security procedures supplement the security plan and, while they may form part of the plan, can be used as standalone advices to employees. 29. Each agency’s security plan will be different. It will reflect an agency’s individual protective security requirements and mitigation strategies according to the levels of threat and risk to its assets. As such, a plan should be as comprehensive as possible and developed with attention to detail. This can be achieved by: developing the plan through consultation with representatives from every section within an agency, and having extensive liaison with other staff directly involved with providing agency security infrastructure (e.g. Information Technology Security Adviser, security guards and building maintenance staff) throughout the whole developmental process and during its ongoing review. 30. A security plan is also a means by which an agency can review the degree of security risk that exists in different areas of its operations and make plans to mitigate the risks. The objectives of a security plan are to: identify areas of security risk through appropriate security risk assessment, and outline practical steps that can be taken that will minimise these risks. 31. An agency needs to develop site security plans for each individual agency site. The agency should assess each site separately so that the controls applied address the specific risks at each site. 32. Agency protective security plans and procedures will only be successful if senior management input and support is gained. 5.1 Classification and control of the security plan 33. The classification and control of the complete security plan should be carefully considered against the business impact of the compromise of the confidentiality of the plan. Individual elements of the plan should be classified as appropriate to each element. 5.2 Components of a security plan 34. The protective security plan covers controls to address all elements of protective security. 5.2.1 Governance arrangements 35. Governance arrangements should include, but not be limited to: contract service provider and third party security fraud control disaster recovery and business continuity planning reporting incidents and conducting security investigations audit and compliance reporting review and amendment, and roles and responsibilities. (Governance arrangements may be standalone plans managed by other sections of the agency; if so agency security management personnel should be consulted in the development of the individual plans.) 5.2.2 Personnel security 36. Personnel security arrangements should include, but not be limited to: personnel security provisions in the recruitment process—in conjunction with agency human resource management designated security assessment position list contact reporting security clearance aftercare, and ongoing security awareness training. 5.2.3 Information security 37. Information security arrangements should include, but not be limited to: ICT access classified and sensitive information archival—in conjunction with agency records management cyber security, and information handling—within the agency as well as when in transit or out of the office. 5.2.4 Physical security 38. Physical security arrangements should include but not be limited to: site security plans physical security of employees, visitors and the public on agency sites—in conjunction with the agency safety plans physical security of information protection of physical assets—in conjunction with the fraud control plans access control systems security alarm systems measures to increase security if the National Alert Level or agency specific threats increase security of disaster recovery or alternate agency sites—in conjunction with business continuity plans, and physical security for tele-working. 5.3 Security plan format 39. The following is a suggested format for security plans. 5.3.1 Foreword 40. The foreword to the security plan allows the agency head to state the importance of, and endorse the plan as well as outline the need for effective security risk management. 5.3.2 Statement of purpose and objectives 41. The statement of purpose and objectives links the security plan to the security policy. It sets out the role and responsibility of the agency or department and links this to the security practices required to ensure minimal disruption to its operation and resources. In other words, what the agency considers its vital tasks and how security relates to its ability to perform these tasks. It also takes into consideration the strategies reflected in an agency’s corporate plan. The objectives of the security plan should be set out clearly. 5.3.3 Assessment of existing security measures 42. The assessment evaluates the agency’s current protective security arrangements and details current exposure as well as any potential threats. This may be in the form of a formal threat assessment undertaken by competent agency personnel or a contracted service provider. 5.3.4 Actions/strategies, resources, responsibilities and outcomes/performance indicators 43. The actions/strategies, resources needed, responsibilities and outcomes/performance indicators of the plan can be separate documents or incorporated into a single spreadsheet Actions/strategies 44. The actions/strategies are an outline of what needs to be done to meet the objectives and treat the security risks identified in the threat assessments, or meet the controls needed to give assurance in asset sharing agreements. This section includes a timetable for these actions to occur. Resources and responsibilities 45. The resources and responsibilities describe what resources are needed and who is responsible for implementing the strategies. In addition, this section details what ongoing resources are needed to maintain the required level of protective security and identifies resources that may be needed to implement additional precautions if the threat level increases. (Note: such an event may happen at short notice.) Outcomes/ performance indicators 46. The desired outcomes and performance indicators are detailed to allow an assessment of whether the objectives have been met. Indicators need to be measurable both in scope and time. Examples of a performance indicator could be: reduction in risk levels to the agency’s physical premises (possibly achieved by using crime prevention through environmental design concepts) to a level acceptable to the agency; or reduction in fraud, theft or losses to agency resources or assets (possibly achieved by implementing a fraud control plan) to a level acceptable to the agency. 47. Outcomes/ performance indicators can also be used to inform an agency’s compliance report to its Minister. 5.3.5 Procedures and other attachments 48. Any procedures developed to support the plan should be included as attachments. These procedures may also be released as standalone documents to help inform employees. 49. Other attachments may include, but are not limited to: the security risk assessment site plans policy documents an agency specific PSPF compliance tracking/mapping spreadsheet, and links to other agency operational and compliance plans. Annex A—Protective security in an agency’s risk management and planning Agency risk management Operational risk management Financial risk management including fraud risk Security risk management Personnel risk review elements incorporating: agency requirements program requirements sub-program requirements key individual requirements Physical risk review elements incorporating: agency requirements site requirements area requirements Information risk review elements incorporating: agency requirements site requirements compartmental requirements Agency business plan Operational plan Personnel security policy and procedures elements: eligibility policy employment conditions policy security clearance policy ongoing suitability maintenance policy Security plan Physical security policy and plan elements including: site security plans personal safety and security measures physical asset protection measures information protection measures Business continuity plan ICT and information security policy and plan elements including: ICT plan information classification policy access and availability policies Financial plan including fraud control plan Security and fraud governance policies and procedures elements including contractor security/fraud management policy security/fraud awareness training, investigations and review policy audit and reporting policy International obligations