Policy 3 Security Planning and Risk Management
Policy 3 Security Planning and Risk Management
A. Purpose
1. This policy describes how entities establish effective security planning and can embed security into risk
management practices. Security planning can be used to identify and manage risks and assist decision-
making by:
a. applying appropriate controls effectively and consistently (as part of the entity’s existing risk
management arrangements)
b. adapting to change while safeguarding the delivery of business and services
c. improving resilience to threats, vulnerabilities and challenges
d. driving protective security performance improvements.
B. Requirements
B.1 Core requirement
Each entity must have in place a security plan approved by the accountable authority to manage the
entity’s security risks. The security plan must detail the:
a. security goals and strategic objectives of the entity, including how security risk
management intersects with and supports broader business objectives and
priorities
b. threats, risks and vulnerabilities that impact the protection of an entity’s people,
information and assets
c. entity’s tolerance to security risks
d. maturity of the entity’s capability to manage security risks
e. entity’s strategies to implement security risk management, maintain a positive
risk culture and deliver against the PSPF, and
f. entity’s arrangements for implementing any direction issued by the Secretary of
the Department of Home Affairs under the PSPF.
2. Where a single security plan is not practicable due to an entity’s size or complexity of business, the
accountable authority may approve a strategic-level overarching security plan that addresses the core
requirements.
C. Guidance
C.1 Security planning approach
3. Successfully managing entity security risks and protecting people, information and assets requires an
understanding of what needs protecting, what the threat is and how assets will be protected. Security
planning is designing, implementing, monitoring, reviewing and continually improving practices for security
risk management.
a. A security plan (see section C.2) specifies the approach, responsibilities and resources applied to
managing protective security risks. The security plan allows entities to review the degree of security risk
that exists in different areas of operations and take action to mitigate identified risks.
b. A security risk management process (see Annex A) manages risks across all areas of security
(governance, information, personnel and physical) to determine sources of threat and risk (and
potential events) that could affect government or entity business. Security risk management includes:
i. security risk assessments, which are structured and comprehensive processes to identify,
analyse and evaluate security risks and determine practical steps to minimise the risks
ii. security risk treatments, which are the considered, coordinated and efficient actions and
resources required to mitigate or lessen the likelihood or negative consequences of risks.
4. Regardless of an entity's functions or security concerns, the central messages for managing security risks
are:
a. security is everyone’s responsibility and risk management is the business of all personnel (including
contractors) in the entity, supported by security awareness training
b. security is a business enabler that informs decision-making, is part of day-to-day business and is
embedded into an entity’s business processes
c. security management is logical, systematic and transparent and is part of the enterprise risk
management process
d. security processes identify changes in the threat environment and allow for adjustments to maintain
acceptable levels of risk, balancing operational and security needs.
5. For information on how a risk-based approaches work with the PSPF core requirements, refer to
section C.4.
The entity’s approach to implementing the requirements specified in any directions, including to
ensure any timeframes or additional reporting obligations specified in the direction are met.
12. The Department of Home Affairs recommends security plans be comprehensive and span all areas of
protective security. This includes governance arrangements and information, ICT, personnel and physical
security as outlined in Table 2.
Table 2 Suggested coverage for security plan
Information (including ICT)
Governance arrangements Personnel security Physical security
security
Suggested coverage for Suggested coverage for Suggested coverage for Suggested coverage for
governance arrangements: information security: personnel security: physical security:
a. roles and a. classification and a. personnel security a. access control systems
responsibilities management provisions during b. security monitoring
b. risk tolerances arrangements for recruitment in and alarm systems
c. security risk information holdings conjunction with human c. measures to increase
management (including b. access to information resource management security if the National
threat, vulnerability and including sharing b. security clearance Terrorism Alert Level
criticality assessments) information maintenance plans that or entity-specific
d. security incidents c. ICT access and system address risks identified by threats increase.
e. security culture security security vetting agencies
13. When developing or reviewing the security plan (and supporting security plans), entities are encouraged to
seek advice and technical assistance from specialist entities such as:
a. Australian Security Intelligence Organisation for threat assessments
b. ASIO-T4 Protective Security for physical security advice or technical assistance
c. local police for state and territory criminal threat information
d. Australian Government Security Vetting Agency for security vetting procedural advice
e. Australian Signals Directorate for ICT, cyber security and certified cloud services advice
f. subject-matter experts.
18. When setting goals, entities are encouraged to consider historical security experience and knowledge,
results from previous performance indicators and past compliance with the PSPF.
19. The Department of Home Affairs recommends that entities assess their existing protective security
arrangements and procedures to identify areas for improvement. This could be areas of exposure,
vulnerability or ‘target attractiveness’. Target attractiveness is the value of an entity or its components to
an adversary when viewed as a target. Reviewing protective security arrangements also considers the
entity’s maturity in implementing PSPF requirements.
24. Where risks are identified that could potentially affect the operations of another government entity,
Requirement 4 mandates that entities communicate these risks to the affected entity. 1
25. Where a risk with national security implications is identified, the Department of Home Affairs recommends
the entity inform ASIO of these risks. 2
1
Refer to the Australian Government Directory for contacts.
R
Report to the Australian Security Intelligence Organisation or call the National Security Hotline on 1800 123 400.
40. For information, refer to the Commonwealth Risk Management Policy Defining risk appetite and tolerance
information sheet.
C.2.6 Security plan - strategies to implement security risk management, maintain a positive
risk culture and deliver against the PSPF
42. The success of security risk management depends on the effectiveness of security planning and how well
arrangements are supported by the entity’s senior leadership and integrated into business processes. This
includes meeting core and supporting requirements of the PSPF or adopting mitigations that are equivalent
to or exceed those requirements.
43. It is important that entities foster a culture where risk management is an important and valued aspect of
decision-making, where risk management processes are understood and applied appropriately; and where
personnel can be confident in managing and taking risks, within defined parameters, in order to achieve
objectives.
44. Effective security risk management supports better decision-making and builds positive risk culture by:
a. identifying possible risks and opportunities in advance, lessening the potential of adverse outcomes
and increasing the likelihood of desirable outcomes
b. having processes in place to monitor risks and provide access to reliable, up-to-date information about
risks
c. providing guidance around appropriate limits through well understood risk appetite and risk tolerance
statements
d. providing transparency over the decision-making process and the achievement of entity objectives.
45. When security risk management is done well, it underpins organisational resilience and a positive risk
culture because entities know their security risks, make coordinated and informed decisions in managing
those risks, identify opportunities and learns from mistakes. This is reinforced with meaningful training and
support across all levels of management.
46. Refer to the Department of Finance:
a. Developing a positive risk culture information sheet
b. Commonwealth Risk Management Policy Element Eight – Maintaining risk management capability
c. Commonwealth Risk Management Policy Element Four – Embedding systematic risk management into
business processes.
3
For guidance on security maturity levels, see the PSPF policy: Reporting on security.
a. Role of accountable authority – for accountable authority’s security risk management responsibilities
b. Sensitive and classified information – for advice on business impact levels when determining the
consequences of compromise, or loss of entity information or assets, or harm to its people
c. Reporting on security – for risk management reporting obligations
d. Security governance for contracted goods and service providers – for advice on security risks in
contracts
e. Physical security for entity resources – for advice on physical risks.
1. Elements of this guidance are based on the recommended Australian Standards: Commonwealth Risk
Management Policy, AS/NZS ISO 31000 and HB 167 – Security Risk Management).
2. Risk is defined as the effect of uncertainty on objectives. An effect is a deviation from the expected—
positive or negative. 4
4
As defined in ISO Guide 73 – Risk Management Vocabulary.
risk management process is used to determine all applicable sources of risk and potential events that could
impact government or entity business.
Organisational context
7. Organisational context includes:
a. scope and parameters of activities where risk management is applied
b. resources (or limitations) available or required for risk treatments and activities
c. reputational expectations or objectives
d. logistical or locational challenges
e. outcomes of related internal or external audit reports
f. security risk management processes adopted
g. processes for documenting results of risk assessments and risk treatments.
External context
8. External context includes:
a. Regulatory environment, including legislative or policy obligations and responsibilities, foreign laws or
potential jurisdictional access to information
b. political or economic climate
c. community sensitivities or expectations.
Security context
9. Security context includes:
a. purpose and scope of security in supporting or achieving the entity’s business objectives
b. criteria for evaluating the significance of security risks
c. risk appetite and tolerance criteria and threshold levels for the entity (see section C.2.4 Error!
Reference source not found. for information on risk tolerances)
d. threat and risk environment (areas of concern, specific threats identified, known vulnerabilities)
e. decision-makers (when and by whom)
f. critical asset statement (what are you looking to protect)
g. interdependencies and links to other plans or security procedures
h. details of any shared risk
i. constraints and assumptions.
Criticality assessment
14. Criticality assessment identifies and assigns importance to all resources (something that has value to the
entity including personnel, information and physical assets or processes that support them) that are critical
to the ongoing operation of the entity or to the national interest. Asset identification and security risk
management documents can form part of the security plan or be standalone and inform the security plan.
15. The criticality assessment will be different depending on the entity’s purpose, business objectives and risk
environment. Criticality assessments include:
a. criticality ratings – the scale of the resources’ importance to the entity (eg a numerical scale 1-5 or
importance value scale such as catastrophic, significant, moderate, low, insignificant). Alternatively, a
business impact level can be applied by assessing the impact on the entity if the integrity or availability
of the resource was compromised (applying a business impact level to the confidentiality of an resource
means applying a security classification. See the PSPF policy: Sensitive and classified information)
b. consequence of loss, compromise or harm – a description of what the consequence is
c. category – consequences can also be expressed across categories such as people, information,
property, reputation, financial, business operations or services.
Threat assessment
16. A threat assessment identifies the source of harm and is used to inform the entity’s risk assessment.
Threats are assessed by determining the intent to cause harm, damage or disruption and the capability (the
potential that exists to actually cause harm or carry out intentions) of the threat source.
Vulnerability assessment
17. Vulnerability assessment identifies the degree of susceptibility and resilience of an entity to hazards. To
understand the potential of risks, it is recommended that entities assess the possible vulnerabilities to each
risk to gauge the consequence and likelihood of these risks. This process of understanding possible
vulnerabilities helps entities to prioritise the risks and guides the allocation of resources in mitigating their
effects.
Annex A Figure 2 Using threat, criticality and vulnerability to inform risk analysis
Implementation
28. Implementation involves deciding on the resources required and who is responsible for implementing the
risk treatments. In addition, implementation details the ongoing resources needed to maintain the required
5
Where entities have been directed to undertake the activity, they will not be able to avoid the risks. Risk treatment is
preferable to risk aversion or avoidance.
level of protective security and identifies resources that may be needed to take additional precautions if
the threat level increases.
29. Refer to section C.3 for information on security alert levels.
33. Key questions to ask when monitoring and reviewing risk may include:
a. Are the controls (and respective implementation strategies) effective in minimising the risks; how might
improvements be made?
b. Are the controls comparatively efficient and cost-effective?
c. Are the assumptions made about the context/environment still valid?
d. Do controls comply with policy requirements, legal obligations and entity procedures?
e. Is the entity’s security planning approach effective in managing security risks and achieving objectives?
34. Refer to:
a. Commonwealth Risk Management Policy Element Five – Developing a positive risk culture
b. Commonwealth Risk Management Policy Element Nine – Reviewing and continuously improving the
management of risk
c. PSPF policy: Security maturity monitoring.