iTnews
  • Home
  • News
  • Technology
  • Security

Comms, AFP cyber defences under scrutiny

By Paris Cowan on May 5, 2015 11:48AM
Comms, AFP cyber defences under scrutiny

National auditor kicks off new security checks.

Australia's national auditor has placed the Australian Federal Police, the Communications and Agriculture departments and money-laundering watchdog AUSTRAC on its hit list for a second round of in-depth infosec assessments.

The Australian National Audit Office has started combing through the cyber defences of the four agencies to ascertain whether they meet the demands of the mandatory federal government Information Security Manual (ISM).

Since last July, agencies have been required to comply with the Australian Signals Directorate’s top four cyber attack mitigation strategies under the ISM.

The four demands include application whitelisting, keeping application and operating system patches up to date, and minimising administrative privileges.

The ANAO audited seven agencies in June last year before the ISM compliance state came into effect, and found the agencies were unlikely to be compliant before the June 30 deadline.

Prior to the 2014 audit, the last time the ANAO looked into ISM compliance was March 2011, when the office reported on the security of information held by the Office of Financial Management, ComSuper, Medicare and the Department of Prime Minister and Cabinet.

The ANAO expects to hand down its latest findings in in the last quarter of this year. It is current calling for submissions from members of the public.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
afpanaodepartment of communicationsinfosecsecurity

Partner Content

"We're seeing some good policy put in place, but that's the exception"
Partner Content "We're seeing some good policy put in place, but that's the exception"
How to turn digital complexity into competitive advantage
Promoted Content How to turn digital complexity into competitive advantage
The Great Resignation has intensified insider security threats
Promoted Content The Great Resignation has intensified insider security threats
Why Genworth Australia embraced low-code software development
Promoted Content Why Genworth Australia embraced low-code software development

Sponsored Whitepapers

Extracting the value of data using Unified Observability
Extracting the value of data using Unified Observability
Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see
Beyond FTP: Securing and Managing File Transfers
Beyond FTP: Securing and Managing File Transfers
NextGen Security Operations: A Roadmap for the Future
NextGen Security Operations: A Roadmap for the Future
Video: Watch Juniper talk about its Aston Martin partnership
Video: Watch Juniper talk about its Aston Martin partnership

Events

  • Micro Focus Information Management & Governance (IM&G) Forum 2022
  • CRN Channel Meets: CyberSecurity Live Event
  • IoT Insights: Secure By Design for manufacturing
  • Cyber Security for Government Summit
By Paris Cowan
May 5 2015
11:48AM
0 Comments

Related Articles

  • AFP gets budget backing to beef up account takeovers
  • FBI says Russian hackers scanning US energy systems
  • NSW Police issues first coercive notice under encryption-busting powers
  • Home Affairs says online account takeover powers now in use
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Qantas calls time on IBM, Fujitsu in tech modernisation

Qantas calls time on IBM, Fujitsu in tech modernisation

Service NSW hits digital services goal two years early

Service NSW hits digital services goal two years early

NBN Co taking orders for 'non-premises' connections

NBN Co taking orders for 'non-premises' connections

Australian scientists build world's first quantum computer IC

Australian scientists build world's first quantum computer IC

Digital Nation

COVER STORY: Operationalising net zero through the power of IoT
COVER STORY: Operationalising net zero through the power of IoT
Integrity, ethics and board decisions in the digital age
Integrity, ethics and board decisions in the digital age
The security threat of quantum computing
The security threat of quantum computing
IBM global chief data officer on the rise of the number crunchers
IBM global chief data officer on the rise of the number crunchers
Crypto experts optimistic about future of Bitcoin: Block
Crypto experts optimistic about future of Bitcoin: Block
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.