On March 31, 2022, the Security Legislation Amendment Critical Infrastructure Protection Act 2022, also known as SLACIP, was passed by the Australian Parliament. The SLACIP Act aims to build upon the SOCI Act framework to improve the security of Australia’s critical infrastructures.
To learn how the SOCI Act reforms will affect you and for guidance on how to comply with its new risk management requirements, read on.
The SLACIP Act modifies the SOCI Act to introduce security risk management and cyber threat resilience as mandatory requirements for critical infrastructure entities.
The SLACIP Act aims to improve information exchange between critical infrastructure industries and the government to keep the Australian government informed of emerging threats to national security.
The SLACIP Act aims to give Australians increased peace of mind about the safety of the nation’s essential services.
The SLACIP Act was developed to address the intersection of two significant trends - Australia's increasing dependency on digital solutions and the increasing sophistication of cyberattacks.
The SLACIP Act modifies the SOCI Act by introducing a new obligation and a new framework.
The SLACIP Act centralizes critical infrastructure security guidelines into one legislation to address the interconnected nature of all SoNS.
Responsibility for compliance will sit with either the Responsible Entity or Direct Interest Holders of critical infrastructures.
A Responsible Entity includes anybody with ultimate operational responsibility for a critical infrastructure asset.
A Direct Interest Holder is either:
The Risk Management Program introduced in the SLACIP Act requires responsible entities to comply with a risk management program designed to identify and mitigate all material risks to critical infrastructure assets as much as reasonably practicable.
A material risk includes risks threatening the availability, integrity, reliability, or confidentiality of critical infrastructure assets.
Under SLACIP, the following categories of critical infrastructure assets are subject to SLACIP’s risk management plan rules:
The design of a risk management program must meet the following obligations:
Responsible entities need to follow an All-Hazards approach when identifying potential threats to their critical infrastructure assets' availability, reliability, and confidentiality.
An All-Hazards approach considers the events and processes impacting preparedness for all emergencies and disasters, both natural and human-made.
The SLACIP Act expects responsible entities to focus on four primary categories of hazard vectors:
Responsible entities need to develop strategies for minimizing the security risks increasing critical infrastructure asset vulnerability to material risks. Risk management efforts should be both proactive and ongoing.
A proactive and ongoing risk management strategy aims to discover and address security risks before cybercriminals exploit them.
The security incidents that bypass boundary security controls must be contained and swiftly addressed to minimize impacts on business operations. SLACIP requires entities to have robust processes for reducing the effects of realized incidents and processes for rapid recovery following an incident.
These requirements can be met in an updated and frequently tested incident response plan.
Entities bound to the SLACIP must establish risk management oversight arrangements with their relevant Commonwealth regulators. Regulators will evaluate and test an implemented risk management program to assess SLACIP compliance.
Entities need to submit an annual report summarizing the yearly efforts of their risk management program to their relevant Commonwealth regulator or the Secretary of the Department of Home Affairs.
Before submission, reports must be approved by the entity’s board, council, or other governing body.
Annual SLACIP reports must be submitted within 90 days after the end of the financial year.
To learn more about the proposed Risk Management Program Rules, refer to this draft policy document.
The SLACIP act includes a regime specifically focused on Australia’s most critical infrastructure assets to prevent catastrophic disruptions following a nation-state cyberattack. These entities have been grouped into a separate category known as Systems of National Significance (SoNS).
Systems of National Significance (SoNs) include any critical infrastructure entities that:
The criticality of Systems of National Significance makes these entities highly vulnerable to sophisticated nation-state attacks. By enforcing improved cyber resilience across all of Australia’s SoNS, the SLACIP Act will significantly reduce the nation’s potential of falling victim to a catastrophic nation-state cyberattack.
Only critical infrastructure assets of national significance are classified as a SoNS asset. Only a small subset of the nation's critical infrastructure assets are grouped in this category.
Two primary factors are considered when determining whether an asset is of national significance:
In addition to all of the obligations outlined for critical infrastructure assets under the SLACIP Act, SoNS must also comply with Enhanced Cyber Security Obligations (ECSO).
ESCO requirements may include the following:
An incident response plan is a written document detailing how a critical infrastructure entity will respond to different cyber security incidents. After completion, the incident response plan must be submitted to the Secretary of the Department of Home Affairs.
SoNS may be required to undertake cyber security exercises to test cyberattack readiness against specific threats. These exercises will involve a simulation of a cyber incident and may require observance by Department officers or designated officers from the Australian Cyber Security Centre (ACSC).
SoNS may be required to complete vulnerability assessments evaluating the security postures of all critical infrastructure systems.
Under the SLACIP Act, these assessments may be designated to the ACSC by the Department.
SoNs may be required to supply system information to the ACSC under the request of the Secretary of the Department.
There are two different system information reporting tiers based on reporting frequency:
ESCO may also require SoNS to:
For more information on SoNS obligations under the SLACIP Act, refer to the Systems of National Significance fact sheet.
UpGuard monitors the entire attack surface of security vulnerabilities facilitating data breaches and system compromise.
By extending security vulnerability detection to the third, and even fourth-party attack surface, UpGuard is the perfect solution for SLACIP-bound entities tracking security posture improvements across their entire IT ecosystem.
Here are just some of the UpGuard features that could support SLACIP compliance:
To learn more about how UpGuard can help you comply with the SLACIP Act, click here to request a free demo of the platform now.