In 2024, the Australian government introduced PSPF Direction 001-2024 in recognition of the potential threats posed by Foreign Ownership, Control, or Influence (FOCI) on technology assets and GovTech (government technology operations). As part of the Protective Security Policy Framework (PSPF), PSPF 001-2024 is a crucial step in evaluating and mitigating cyber risks associated with foreign interference in the procurement and maintenance of technology assets.
This direction aims to enhance national security and strengthen the integrity of Australia's digital governance by safeguarding critical GovTech assets from foreign influence. This blog provides a detailed look at PSPF 001-2024, including key components and strategies organizations can follow to streamline implementation.
PSPF Direction 001-2024 is part of a series of mandatory directions issued in 2024 under the Protective Security Policy Framework (PSPF) by the Secretary of the Department of Home Affairs in Australia. This particular direction focuses on managing the risks associated with Foreign Ownership, Control, or Influence (FOCI) in technology assets used by Australian Government entities.
PSPF 001-2024 requires these entities to identify indicators of FOCI risk during the procurement and maintenance of technology assets and to act on and report these risks effectively. Indicators of FCOI risk include substantial foreign ownership, foreign leadership roles, dependency on foreign funding or suppliers, obligations to foreign laws, and foreign access to sensitive data. Identifying these factors is critical for mitigating associated risks.
The Direction aims to ensure that technology procurements are secure and free from undue foreign influence that could compromise Australia's national interests. It comes in response to growing concerns about foreign interference and vulnerabilities in government supply chains, including a specific incident in which surveillance devices linked to the Chinese government were found in government buildings.
PSPF 001-2024 focuses on several areas to safeguard Australian government entities from potential risks related to foreign involvement in their technology assets. Key components of the direction include:
These components are designed to enhance the security framework surrounding technology assets within government entities. Each component addresses the potential for foreign interference that could impact national security.
The Secretary of the Department of Home Affairs published PSPF 001-2024 alongside two other mandatory directions. These directions address a security risk to the Commonwealth, and all responsible authorities of each entity must comply with any issued directive. Additional PSPF directions include:
These three additions follow an earlier direction, PSPF 001-2023, which restricted the use of the TikTok application on government devices in Australia. The Australian Government made this decision due to concerns about the app's security risks, such as extensive data collection and potential exposure to unauthorized directives from foreign governments.
PSPF Direction 001-2024 must be complied with by a specific set of Australian government entities involved in managing technology assets and handling classified information. Each organization must ensure that its procurement and maintenance of technology assets comply with PSPF Direction 001-2024 to mitigate risks associated with foreign influence and ensure the security and integrity of its operations.
Organizations typically required to adhere to these types of directions include:
The penalties for non-compliance with the Protective Security Policy Framework (PSPF) are not explicitly prescribed in terms of specific fines or punitive measures. The PSPF focuses more on ensuring that entities have the proper measures to protect people, sensitive information, and assets from security threats and less on penalizing non-compliance.
The framework emphasizes accountability, with the accountable authority within each entity bearing the responsibility for achieving and maintaining compliance. Detailed enforcement actions are typically directed to the Attorney-General’s Department or the Department of Home Affairs, which oversees the implementation of the framework.
Complying with PSPF 001-2024 strengthens national security and enhances organizational integrity in technology procurement and maintenance. Below are five steps to fortify your organization against potential foreign threats while maintaining robust security protocols.
The first step to comply with PSPF 001-2024 involves thoroughly identifying FOCI risks in the procurement and maintenance of technology assets. Organizations need to conduct comprehensive audits of all GovTech suppliers and vendors, delving into their ownership structures to determine the level of foreign involvement. These assessments should go beyond simple ownership to include affiliations that could potentially exert control or influence.
Utilizing risk assessment tools can help in dynamic analysis, rating potential FOCI threats based on criteria such as technology providers' country of origin, historical compliance records, and political connections. This identification phase should be an ongoing process, with entities regularly revising their risk assessments to adapt to new threats as technological and geopolitical landscapes evolve.
Once potential FOCI risks have been identified, the next step is to create effective management strategies. This process involves establishing specific control measures customized to mitigate the identified risks, such as implementing access controls and authentication, encrypting sensitive data, and segregating critical systems from those managed by potentially compromised entities.
Furthermore, organizations need to develop comprehensive incident response plans that are ready to be activated if a risk materializes. These plans should address potential scenarios of foreign compromise and outline clear steps for containment and remediation. These strategies should not be static; continual improvement based on regular risk evaluations and audit findings is crucial to remain effective against evolving foreign threats.
Establish robust reporting mechanisms to ensure transparency and ongoing monitoring. Organizations should set up a regular reporting framework to keep all relevant stakeholders and required parties informed about the current FOCI risk landscape and the effectiveness of the management strategies in place.
Using real-time dashboards can provide stakeholders with a continuous view of FOCI risks, which can enhance decision-making processes. It is also crucial to maintain detailed records of any changes in risk profiles or management approaches. These records are essential for regulatory compliance and can offer valuable insights during audits.
The procurement policies of an organization play a crucial role in preventing FOCI risks from materializing. It is important to regularly review these security plans to ensure that they adequately reflect the current risk environment and include strict measures to mitigate potential foreign influences. This review may involve updating the supplier selection process to include thorough checks for foreign ownership and influence as standard criteria.
Additionally, the terms and conditions of contracts with suppliers should be revised to allow for regular audits, impose strict reporting requirements, and enable termination in the event of a breach related to foreign influence. Ensuring that these policies are up-to-date and rigorously enforced is essential for maintaining the integrity of the organization’s technology assets against foreign threats.
It is essential for organizations to maintain thorough documentation and compliance materials. This documentation involves systematically recording all processes related to risk assessment, mitigation strategies, and audit outcomes within a centralized document management system. This system ensures secure storage and easy access and should include secure version control to comply with relevant regulatory requirements.
Organizations should also keep detailed records of compliance training, policy changes, and control measure implementation. Regular reviews and updates of these information security practices are necessary to keep up with regulatory changes and improve the organization's ability to manage and verify compliance against foreign influences. This practice helps to strengthen operational integrity and trustworthiness in national security risk management.
Boost your organization's risk management processes with UpGuard's powerful tools for identifying and mitigating cybersecurity threats. UpGuard’s comprehensive cybersecurity management tools make monitoring your cybersecurity posture and vendors simple—all in one centralized dashboard.
UpGuard Breach Risk illuminates your organization’s external attack surface, allowing you to discover and remediate risks ten times faster with continuous monitoring capabilities. Additional features include:
UpGuard Vendor Risk provides complete visibility of your third-party risk, helping you identify vendor risks sooner and complete risk assessments twice as fast. Additional Vendor Risk features include: