The Australian Cyber and Infrastructure Security Centre (CISC) recently announced that the Critical Infrastructure Risk Management Program (CIRMP) obligation had entered into effect. The Minister for Home Affairs, the Hon Clare O’Neil, signed the CIRMP Rules as the final part (Section 61) of the Security of Critical Infrastructure Act 2018 (SOCI Act) on 17 February 2023, effective immediately.
CIRMP follows the Security Legislation Amendment Critical Infrastructure Protection 2022 (SLACIP) as part of Australia’s effort to further improve the security of its critical infrastructures and its assets.
This article will cover the main compliance requirements listed in the CIRMP Rules, how critical infrastructure entities can begin implementing a CIRMP, and the additional cybersecurity requirements they must meet to comply with CIRMP Rules.
The CIRMP Rule is significant because it requires Australia’s critical infrastructure entities to improve and uplift their core security practices and ensure that the relevant entities take a more proactive approach to their risk management processes.
Any disruption to critical infrastructure assets could have serious impacts extending to major businesses, the government, or the community, which could negatively impact resource supply, distribution and supply chain continuity, national security, and economic growth.
By implementing a strong risk management program, critical organisations can ensure that they can continue providing essential services to those relying on it. Additionally, critical organisations will be better equipped to respond to and recover from a potential incident, thus preserving their professional business reputation.
Learn how to comply with CPS 230 >
The Critical Infrastructure Risk Management Program (CIRMP) obligation requires responsible entities to develop and maintain a program that “identifies and manages material risks of hazards that could have a relevant impact” on critical infrastructure assets (CI assets).
Every critical infrastructure entity must accomplish the following in their CIRMP:
Under the CIRMP Rules, a hazard is defined by four key vectors:
A material risk is any risk that has a relevant impact that could lead to the “impairment, stoppage, loss of access to or interference” to a critical infrastructure asset.
Material risks can include:
Relevant impact is when the material risk has a direct or indirect effect on the “availability, integrity, reliability, and confidentiality” of the information about the asset or the information stored within the asset.
The impact must be more severe than a reduction in the quality of service provided, such as noticeable business disruptions or potential exposure of critical information.
“As far as reasonably practicable” allows organisations and entities to determine how they address material risks and relevant impacts in relation to the operating context of their business. In other words, mitigation processes and their implementation should be measured against factors such as business size, maturity, and overall budget. Risk mitigation and impact minimisation processes should not exceed the organization's capability to implement these processes but should be planned for accordingly.
The CIRMP Rules don’t necessarily apply to only critical infrastructure organisations — the Rules apply to all “responsible entities” that manage any critical infrastructure assets.
As such, the CIRMP Rules regulate any entity that manages the following CI asset classes:
Companies or entities responsible for managing a CI asset in the above asset classes have a 6-month grace period to implement a critical infrastructure risk management program (CIRMP), or until 18 August 2023. This means that companies must have documented controls in place that address how they plan to reduce and mitigate their material risks. Mitigations do not have to be fully implemented by the end of the 6-month grace period, but they must be documented and approved by the entity’s board, council, or governing body.
Additionally, companies will have an additional 12-month period to meet the cybersecurity requirements of the CIRMP. The Australian government is allowing additional time to meet these requirements due to the complexity and difficulty of implementing new cybersecurity frameworks at the enterprise level.
NOTE: The CIRMP Rules do not have a required format or framework to implement a CIRMP. Responsible entities are encouraged to use existing frameworks and processes to develop their CIRMP and complement their existing risk management processes.
Here is a basic list of what companies need to accomplish to begin developing their CIRMP:
The CIRMP Rules state that responsible entities must establish a system that:
*Note: Critical components are any part of the asset that, if damaged or compromised, would prevent proper functioning of cause significant damage to the asset itself.
Businesses must describe how their CI assets intersect with CI assets owned or operated by other entities. Whether the other entities are within the same sector or outside of it, the relations between CI assets must be clarified and documented if they are dependent upon each other.
By determining these interdependencies, entities can consider the operational extent of their networks of assets to broaden their mitigation processes.
To minimise risks, responsible entities should consider both a proactive approach to risk management and a reactive approach to respond to threats in the event of an active attack. Risk management processes should be regularly reviewed to adapt to evolving threat landscapes.
Proactive approaches to risk management involve identifying the attack surface of the CI assets and taking steps to reduce or remove involved risks. Reactive approaches should establish documented processes, such as incident response plans to detect and respond to each and every threat that poses a significant risk.
Mitigation processes or methodologies to reduce the impact of hazards must be documented as part of the annual reporting requirement.
Every entity must choose or designate an individual to oversee the implementation of the CIRMP. The individual must also develop, improve, review, and update the CIRMP annually. Contact information of the individual must also be provided in the annual report.
The individual in charge should be responsible for reviewing the CIRMP when:
Reports must be submitted within 90 days of the end of the relevant Australian financial year. The first report for responsible entities will be required in 2024, submitted between 30 June 2024 and 28 September 2024. Reports must contain information on the following:
Reports do not need to include the full CIRMP — they only need to include updated information regarding the status of the program. The CISC plans to use these reports to better understand the threat environment in each relative industry or sector. By doing so, the CISC can provide better and more meaningful support or assistance regarding the security and resilience of assets to each respective industry when they are at risk or subject to a hazard.
The CIRMP Rules recognize that cyber and information security hazards are the most difficult hazards to address and allow responsible entities an additional 12 months after the 6-month grace period to choose and implement an adequate cybersecurity framework at the enterprise level.
Although all hazards should be addressed appropriately, cyber risks represent the biggest threat to critical infrastructure entities. Cyber attacks or other cybersecurity incidents can potentially cripple entire organisations, which poses a huge threat to the infrastructure of Australian companies. Because cyber threats have continued to grow in sophistication and proportion, cybersecurity has quickly positioned itself as a primary focus and prioritisation in many companies around the world.
For example, some of the biggest cyber threats right now include phishing, malware, ransomware, credential theft, DDoS attacks, supply chain attacks, and third-party attacks. In order to minimise or eliminate these material risks, entities must consider tactics and strategies such as:
Subsection 8(4) of the CIMRP rules specify that entities must comply with one of the following cybersecurity frameworks (or an alternative equivalent):
When choosing the right framework for risk management, entities should consider which framework is most relevant to their respective cyber and information security hazards. If there is an alternative framework that better addresses all risks and hazards on the entity’s CI assets, then it can still be considered a valid equivalent framework.
NOTE: Assets that have been declared Systems of National Significance (SoNS) are subject to the Enhanced Cyber Security Obligations, separate from the Cyber and Information Security Hazards rules.
Personnel hazards are major hazards because employees with improper access to assets or information could potentially leak critical data, whether intentionally or unintentionally.
Subsection 9(1) of the CIRMP Rules lists specific requirements for the personnel hazard vector:
The Department of Home Affairs recommends their background-checking service for security-sensitive critical infrastructure sectors in Australia called AusCheck. Using the AusCheck scheme can help mitigate insider threats working with CI assets. However, entities are free to choose their own personnel hazard management processes.
Entities can consider the following practices to mitigate the impact of personnel hazards:
Disruptions in the supply chain can often lead to massive financial losses and reputational damages due to major suppliers experiencing business disruptions in the manufacturing, distribution, or shipping of CI asset components.
Section 10 of the CIRMP rules states that responsible entities must establish a CIRMP that addresses the following:
Major suppliers are defined as “any vendor that by nature of the produce or service they offer, has a significant influence over the security of a responsible entity’s CI asset.” To help minimise these risks, entities should consider:
Subsection 11(1) of the CIRMP Rules states that entities must establish and maintain a process to:
Section 3 and subsection 11(2) of the CIRMP Rules define the following hazards as the following:
Entities can minimise or eliminate material risks and reduce hazards by: