Follow us


Part 1: Cyber Security Act 2024

The Act is Australia’s first ‘standalone’ Cyber Security Act and is part of the Australian Government’s vision to become a world leader in cyber security by 2030. In many respects, it marks the start of a new suite of reforms designed to give effect to the Government’s Cyber Security Strategy.

Security standards for smart devices

The Act enables the Minister to prescribe mandatory security standards (via ‘rules’ under the Act) for internet or network connectable devices. It also imposes obligations on manufacturers and suppliers of connectable devices to produce statements of compliance with the mandatory security standards, and establishes an enforcement regime, including potential ‘stop sell’ and product recall obligations.

The Government has, for some time, expressed concern about the risks associated with the proliferation of internet-of-things or IoT devices in Australian households, the manner in which they collect data (including sensitive data), and the cyber risk arising from the use of these devices. The legislation provides the Government the flexibility to address these concerns through specific standards.

After the 12 month implementation period, manufacturers and suppliers of ‘relevant connectable products’ will need to meet the mandatory security standards. These standards are yet to be developed but, once they are, suppliers will need to work with manufacturers (and others in the supply chain) to ensure compliance.

Our insight

We see this as a sensible way to promote cyber security and embed ‘security by design’. A standards regime reflects existing Australian product design protections, eg ‘compliance statements’ are well known for medical devices, as are ‘recall’ regimes for consumer goods.

The devil will be in the detail, and we are yet to see the standards (so it’s difficult to assess how onerous they will be for Australian businesses). We expect the standards will draw heavily on the existing voluntary Code of Practice and be influenced by UK and EU regimes.

12 months is also a relatively short window for product (re)design and production, and we are cognisant that the costs of implementation (or redesign) may flow through to consumers.

 

Ransomware payment reporting

The Act requires a reporting entity (a business with annual turnover >$3M1 or certain responsible entities for critical infrastructure) to report payments and certain information about a cyber extortion incident (including threat actor communications).

There are some protections associated with the reported information. It cannot be used by government agencies for enforcement (except re some criminal laws), the information is generally not admissible as evidence, and the Act looks to protect “privilege” to the extent it applies to reported details.

Ransom payment data has been notoriously patchy – it is often anecdotal or derived from survey questions or insurance related data sets. There is a need for good data to enable informed policy decisions. The Australian Government has also raised concerns about the limited reporting of cyber incidents (citing that only around 1 in 5 incidents are reported), including the corresponding impact on threat intelligence and mitigation.

After the 6 month implementation period, reporting entities will need to report cyber extortion payments (including details of the payment process and related communications). While this is unlikely to be onerous, it adds another notification requirement. Importantly, it is not just the amount that is reportable – other details also need to be provided.

Our insight

We have consistently advocated against a prohibition on ransom payments without clear data, and we support reporting as a means of gathering that data. The details required to be reported appear to go well beyond what is needed to develop a national threat picture. Furthermore, the evidence, privilege and limited use protections are only partial shields, and may not provide companies with sufficient comfort to build the kind of openness the government was hoping for around reporting.

The Act does not require a company to notify when it is subject to an extortion demand, only if it makes a ransomware payment. We query the value of the regime given this lack of relativity, ie how can this data be of value without knowing the number of companies threatened with extortion?

We believe that reporting itself may have a cooling effect on payment trends, given perceived reputational concerns associated with payment. However, as businesses with revenues <$3M are excluded, and these constitute the majority of Australian businesses (as well as the cohort arguably most likely to pay), this does bring the data into question.

 

National Cyber Security Coordinator, limited use, admissibility and privilege

The Act formalises the role of the National Cyber Security Coordinator as the Australian coordinator of significant cyber incidents, and creates a voluntary information flow regime for incident coordination, including:

  • providing for organisations to voluntarily give the Coordinator and ASD (and ACSC) information about significant (and other) cyber incidents
  • granting the Coordinator and other government entities the rights to use the information, and
  • limiting the use of the information to certain purposes.

This ‘limited use’ regime is nominally for the purpose of responding to and resolving the incident. As with reported ransom information, the Act provides that the information provided voluntarily cannot be re-used by government agencies for enforcement (except re some criminal laws), is generally not admissible as evidence, and the disclosure does not affect privilege claims (to the extent privilege would apply).

The ASD and other arms of Government have often lamented the lack of information flow around cyber incidents. In the context of a highly litigious space (with high regulatory and litigation risk), many organisations are reluctant to share openly without some form of protection. It follows that the limited use protections are an attempt to support open information flows.

Every organisation should plan for how it will work with government agencies, including the Coordinator, ahead of a cyber incident, and understand what information it would be comfortable providing. Despite the protections, legal advice will be needed to manage the complexity of the limited use rights. Cyber documentation should be updated to account for these considerations.

Our insight

We suspect that various Government agencies have been frustrated by information flow, and we know that agency representatives have complained about "lawyers" inhibiting information sharing. We believe the concern is misguided, focusing on the adviser and not the risk environment. Is it any surprise that companies want to tread carefully here, given the very significant legal risks (now playing out slowly in our courts)?

In practice, we observe that most organisations experiencing a cyber incident correspond constructively with the ASD, ACSC and the CISC. Furthermore, in our experience, companies can often provide helpful information to the ASD without compromising their legal position.

The limited use protections stop well short of a 'safe harbour'. In fact, use of information for criminal prosecution has been expressly left open (which could extend to matters including sanctions breaches and dealing with proceeds of crime offences).

 

Cyber Incident Review Board (CIRB)

The Act establishes an independent board for the purpose of conducting no-fault, post-incident assessments of certain cyber incidents. The CIRB’s purview has a threshold (which in summary) includes serious or nationally significant incidents that are referred to it for review.

At the conclusion of a review, the CIRB will issue a report detailing its findings and recommendations. The CIRB also has certain information-gathering powers. Non-compliance with an information request may attract a civil penalty. Information received by the CIRB under this provision is subject to ‘limited use’ obligations.

There have been a number of calls for mechanisms to enable whole-of-economy learnings from cyber incidents, including a post-incident type review for impacted organisations. The resulting CIRB mechanism is based on civil aviation accident review bodies.

CIRB review is likely to extent the tail of an incident. The nature and extent of participation and information required to be shared is unclear, and companies will need to prepare for certain incident details to be publicised. Organisations also need to be cognisant of the potential exposure to the organisation (at both a management and a board level) with any CIRB information-gathering request. The 6 month implementation period allows time for companies to add the CIRB process to their Cyber Incident Response Plans.

Our insight

The ‘no-fault’ nature of the CIRB review highlights the desire of the Government to learn more about cyber security incidents in Australia and encourage businesses to share information (and their learnings) more freely. However, businesses face significant uncertainty when participating in CIRB reviews – the balance between sharing information and protecting company interests is unclear (and of course the nature and extent of proceedings will evolve over time).

We expect CIRB reports to attract significant media attention when released, and this may open a company to further scrutiny and legal exposure. We also have concerns that the CIRB reports may add fuel to an increasingly active class action market. It is likely that Boards and executives, may now have to defend their actions in an open forum.

 


Part 2: Security of Critical Infrastructure and Other Legislation Amendment (Enhanced Response and Prevention) Bill 2024

The SOCI Amendment Act has amended the Security of Critical Infrastructure Act 2018 (Cth) (SOCI Act) to give the Government broader powers to deliver on Shield 4 of the Cyber Security Strategy 2023-2030 (protecting critical infrastructure), and to address gaps and issues. More incidents will now fall under the SOCI remit, with a previously cyber-focused regime further evolving to address ‘all hazards’.

Data storage systems to form part of critical infrastructure assets

The reform expands the type of assets currently captured as ‘critical infrastructure’ under the SOCI Act to more clearly cover related data storage systems that store or process business critical data.

Data storage systems, even where they are not primary or operational assets, can impact the operation of critical infrastructure. In some sectors the definition of critical infrastructure asset does not include data or data storage or processing systems, even though these may be components of a critical infrastructure asset.

The data storage systems of all SOCI entities will now expressly be subject to SOCI obligations. To be captured, a data storage asset:

  • must be owned / operated by a critical infrastructure owner/operator which also owns/operates the primary critical infrastructure asset
  • must store or process ‘business critical data’, and
  • must be of a kind where vulnerabilities could impact the critical infrastructure asset itself (eg systems which are not network segregated or which hold key operational data).

Relevant entities have 6 months to ensure that:

  • they meet the obligations to maintain a register and provide information about their regulated data storage systems
  • their critical infrastructure risk management programs also cover regulated data storage systems, and
  • they notify cyber incidents affecting those data storage assets.

Our insight

It’s no surprise that data storage systems holding business critical data are now part of the regime. The Australian Government has previously noted that it was seeking to improve its ability to respond to high profile critical infrastructure cyber incidents, where that may have been constrained in the case of a ‘data only’ breach.

This amendment does not expand the obligations a responsible entity already has under the SOCI Act regarding regulated assets (eg maintaining a CIRMP and mandatory cyber incident reporting). However, critical infrastructure owners / operators have work to do to understand which data assets will fall into scope, and to ensure playbooks, risk registers, and plans are updated. Outsourced data arrangements (beyond arrangements with responsible entities for critical data storage or processing assets which are subject to their own obligations under the SOCI Act) will also need consideration.

 

Expansion of government powers to all serious incidents (not just cyber)

The amendments extend existing government powers under Part 3A of the SOCI Act to a wider range of incidents (not only cyber security incidents, but any incident affecting the availability, reliability, or integrity of a critical infrastructure asset). This forms part of what has been described as an ‘all hazards’ approach. This means non-cyber incidents will be subject to government powers including information gathering and directions (although not intervention, which will remain confined to cyber security incidents). Trigger incidents could include things like terrorist attacks and natural disasters such as floods or bushfires. There are no new categories of government powers, and the powers are limited to ‘serious’ incidents, for example, those impacting national security, or social and economic stability, and which cannot be effectively addressed by another regulatory means.

The reforms address a gap in the Australian Government’s ability to manage major events affecting critical infrastructure, particularly where those events have broader consequences for the critical infrastructure ecosystem.

Entities have 6 months to ensure that business continuity, disaster recovery, and other response documents (not just cyber-related documents) are updated to take into account potential government powers under the SOCI Act. (We note entities responsible for critical broadcasting, domain name systems, data storage and processing, energy, food and grocery, payment services, freight assets and hospitals are already required to adopt an all hazard approach as part of their risk management program obligations.)

Careful consideration needs to be given to government stakeholder communication plans (although we note that obligations to notify incidents remain limited to cybersecurity).

Our insight

We don’t think the impact of this amendment should be dismissed. The Government’s new powers to direct and be informed about non-cyber incidents are very broad and unusual (from a global perspective). Whilst there are safeguards in place to give some comfort to regulated entities (for example the immunity from civil action), these are limited, and do not protect against onerous government directions. We see the potential for situations where there is strong disagreement between the entity and government about an appropriate response or necessary action (eg in the context of a natural disaster, if an entity feels it is being asked to disproportionately shoulder financial burden or risk in for public good, which has traditionally been the domain of government).

It is unclear whether the expanded powers will result in a more efficient and effective response to non-cyber incidents. In our experience, the operational experience of critical infrastructure operators means they are best placed to manage the consequences of incidents affecting them; Government direction may well create an additional layer of administrative burden in a high pressure and high stakes environment where competing priorities and issues need to be carefully balanced.

 

Broader ability to share ‘protected information’

The SOCI Act constrains the use and sharing of ‘protected information’ to protect potentially sensitive information regarding critical infrastructure.  The amendments narrow the definition of ‘protected information’, and expand and clarify when it can be disclosed.

The Government has acknowledged that the constraints on information sharing under the SOCI Act were too restrictive. Among other things, they were preventing information sharing in circumstances where it would have been beneficial during an incident. The reforms are intended to enable entities and government agencies to use and disclose information about incidents more broadly.

The reforms have reduced an artificial and technical barrier to information sharing (including during major incidents) for critical infrastructure owners/operators. A 6 month implementation period will apply.

Our insight

These reforms continue the theme of enabling information sharing about incidents more broadly. We can see opportunities for further improving the regime (for example, to better enable information sharing where it could assist other entities vs a business’ own response). The efficacy of regulation of incident information flows will require monitoring, particularly given that incorrect disclosure or use of ‘protected information’ is still an offence.

 

Consolidation of telecommunications security requirements under SOCI Act

The amending legislation brings telecommunications security obligations out of the ‘TSSR’ regime under Part 14 of the Telecommunications Act 1997 (Cth) and under the SOCI Act.

The amendment is a long-anticipated consolidation of telco- specific and general critical infrastructure security obligations.

Entities that operate telco assets have 12 months to assess their current compliance posture to ensure that they can continue complying with all security obligations. The  TSSR and equivalent SOCI provisions are not identical, and some uplift will be required.

Our insight

The telco sector is a key area of focus for critical infrastructure regulation. Telcos operate sensitive infrastructure and – as the Optus cyber incident demonstrated – hold significant customer data.

The reforms involve some change to existing obligations. For example, the definition of ‘telecommunications assets’ which are subject to critical infrastructure regulatory oversight has been expanded.

This is a complex area, with many moving parts. The reforms need careful review against existing obligations, including once subordinate legislation lands (eg the Telecommunications Security and Risk Management Plan Rules).

 

New power: Critical Infrastructure Risk Management Plan (CIRMP) variations

Responsible entities are required to develop and maintain a CIRMP for their critical infrastructure assets under Part 2A of the SOCI Act. Under the reforms, the Critical Infrastructure Security Centre (CISC) now has the power to compel a responsible entity to vary its CIRMP to address ‘serious deficiencies’ (ie those that present a material risk to Australia’s national security, defence, or social or economic stability).

The changes are consistent with the Consultation Paper and reflect the government’s desire for a regulatory mechanism which helps to ensure responsible entities are adequately protecting critical assets.

Once the CISC has identified deficiencies and issued a direction to address them, entities have 6 months to amend their CIRMP in consultation with the CISC. However, entities should not wait for a direction to amend their CIRMPs if concerns about serious deficiencies are raised.

While the amendments may be consistent with the CISC’s Compliance and Enforcement Strategy, it’s difficult to assess how they will be used in practice (eg as a last resort?). While the CISC has issued useful guidance on the content of CIRMPs, , it’s unclear what a ‘serious deficiency’, or the window of opportunity to address it, will look like in practice.


Part 2¾: Intelligence Services and Other Legislation Amendment (Cyber Security) Bill 2024

We conclude our series on the Australian Government’s Cyber Security Legislative Package 2024 by briefly mentioning the third and final component of the package. The ‘IS Bill’ has amended (predominantly) the Intelligence Services Act 2001 (Cth) to apply the evidence, ‘limited use’ and privilege protections to information voluntarily provided to the Australian Signals Directorate (ASD). The amendments complement the equivalent provisions applying to the National Cyber Security Coordinator under Part 4 of the Cyber Security Bill. Please see our comprehensive discussion of the protections in Part 1 of this series. It should also be noted that the IS Bill also exempts the National Cyber Security Coordinator from FOI requests, which while not surprising or unprecedent for security agencies, nevertheless decreases transparency.


Footnotes

  1. Note that the threshold has been announced but not formalised, and is to be formally set out in the Rules.

Key contacts

Cameron Whittfield photo

Cameron Whittfield

Partner, Melbourne

Cameron Whittfield
Peter Jones photo

Peter Jones

Partner, Sydney

Peter Jones
Christine Wong photo

Christine Wong

Partner, Sydney

Christine Wong
Merryn Quayle photo

Merryn Quayle

Partner, Melbourne

Merryn Quayle
Kaman Tsoi photo

Kaman Tsoi

Special Counsel, Melbourne

Kaman Tsoi
Magdalena Blanch-de Wilt photo

Magdalena Blanch-de Wilt

APAC Cyber Risk Advisory Lead, Melbourne

Magdalena Blanch-de Wilt
Heather Kelly photo

Heather Kelly

Senior Associate, Melbourne

Heather Kelly
Laura Newton photo

Laura Newton

Senior Associate, Sydney

Laura Newton

Stay in the know

We’ll send you the latest insights and briefings tailored to your needs

Sydney Australia Perth Brisbane Melbourne Technology, Media and Entertainment, and Telecommunications Data Protection and Privacy Crisis Prevention and Management Cyber Risk Advisory Technology, Media and Telecommunications Digital infrastructure Cyber Security Cameron Whittfield Peter Jones Christine Wong Merryn Quayle Kaman Tsoi Magdalena Blanch-de Wilt Heather Kelly Laura Newton