Cyber resilience good practices

The following good practices enable organisations to operate highly adaptive and responsive cyber resilience processes. We encourage all organisations to discuss, share and consider their application to improve their cyber resilience preparedness.

On this page:

Cybersecurity strategy and governance

The good practices we observed in relation to cybersecurity strategy and governance were characterised by board ‘ownership’, and responsive and agile governance models.

Cyber risk management and threat assessment

Good practice in the area of cyber risk management and threat assessment is led by intelligence gathering through the use of third-party experts, and driven by routine threat assessments, including of relevant third parties

Collaboration and information sharing

Collaboration is often characterised by confidential information-sharing arrangements with other financial institutions, security agencies and law enforcement. Information sharing is fundamental for organisations that are intelligence-led and aids in understanding attackers and potential threats, including terrorist organisations, political activists, organised crime and nation-state-sponsored attackers. This process also helps organisations to understand attackers’ motives—whether it be information, funds or general disruption.

Asset management

Effective management of organisational assets is characterised by centralised management systems for critical internal and external assets (e.g. software and data), and configuration management that ensures visibility of critical assets.

Protective measures and controls

Proactive measures and controls for cyber risks are characterised by implementation of the Australian Signals Directorate’s (ASD) Strategies to mitigate targeted cyber intrusions (or equivalent), as well as a range of additional controls (e.g. encryption for ‘data in transit’ based on a risk assessment of the asset in question).

Detection systems and processes

There has been a lot of development in the approaches taken by ‘good-practice’ organisations in the area of cyber detection systems and processes. Good practices are characterised by the use of enterprise-wide continuous monitoring systems and the use of data analytics to integrate sources of threats in real time.

Response and recovery planning

Response planning for cyber risks is different from standard business continuity planning because the scenarios are not as predictable, in part due to:

  • the range of threat sources (e.g. insider threats, which contribute to over 30% of identified incidents – see also, Australian Cyber Security Centre Threat Report 2017; and
  • the speed at which the sophistication levels of attacks are changing.

Good practices we observed included routine and detailed scenario planning, war gaming, proactive reporting to the board and well-developed communication plans.

Do you need to report a cyber incident?

Visit the Australian Cyber Security Centre website or call the Australian Cyber Security Hotline: 1300 CYBER1 (1300 292 371).

You should also consider whether a cyber event or incident gives rise to other reporting obligations, including requirements to report to ASIC (such as reportable situations for AFS and credit licensees) or make a public disclosure. You can self-report to ASIC online or call us on 1300 300 630.

What's new

Last updated: 16/01/2023 03:53