Keyboard shortcuts

Press or to navigate between chapters

Press S or / to search in the book

Press ? to show this help

Press Esc to hide this help

Compliance Mapping

This table maps ADRs to specific controls and requirements in Western Australian and Australian compliance frameworks.

ACSC Information Security Manual (ISM)

ADRTopicISM Guidelines & Control IDsKey Controls
001 IsolationApplication isolationGuidelines for Networking (ISM-1182, ISM-0535, ISM-1277, ISM-1517)Network segmentation, micro-segmentation, preventing bypass of controls
002 WorkloadsCloud workloadsCloud Computing Security (ISM-1588, ISM-1589, ISM-1452, ISM-0499)Cloud security assessment, multi-tenant isolation, virtualisation hardening
004 CI/CDBuild and releaseGuidelines for Software Development (ISM-1256, ISM-0400, ISM-1419, ISM-2032)Secure development lifecycle, environment segregation, automated testing
005 SecretsSecrets managementGuidelines for Cryptography (ISM-0507, ISM-0488, ISM-0518, ISM-1090)Key management, secure storage of secrets, key rotation
007 LoggingSecurity loggingGuidelines for System Monitoring (ISM-0580, ISM-1405, ISM-1985, ISM-0988)Event logging policy, centralised logging, log protection, time synchronisation
008 Email AuthEmail authenticationGuidelines for Email (ISM-0574, ISM-1151, ISM-1540, ISM-0259)SPF, DKIM, DMARC, email encryption
010 IaCInfrastructure as codeGuidelines for System Hardening (ISM-1211, ISM-1409, ISM-1383)Configuration management, automated deployment, drift detection
011 AI GovernanceAI tool governanceGuidelines for Software Development (ISM-2074, ISM-1755, ISM-0226)AI usage policy, supply chain risk management, software assessment
012 Privileged AccessPrivileged accessGuidelines for System Management (ISM-1175, ISM-1507, ISM-1483, ISM-1173)Restricting privileged access, JIT access, jump servers, MFA for admins
013 IdentityIdentity federationGuidelines for Personnel Security (ISM-0418, ISM-1173, ISM-1420, ISM-1505)Authentication, MFA, federated identity trust, credential management
016 Edge ProtectionWAF and CDNGuidelines for Gateways (ISM-1192, ISM-1262, ISM-1460)Web application firewalls, traffic inspection, DDoS protection

WA Government Cyber Security Policy (WA CSP)

The 2024 WA Government Cyber Security Policy defines baseline cyber security requirements for WA Government entities.

ADRWA CSP RequirementSection
001 IsolationCyber security context & risk management2.1, 2.2
002 WorkloadsSupply chain risk, data offshoring2.3, 1.5
005 SecretsInformation security (Cryptography)3.1
006 Policy EnforcementCyber security governance1.4
007 LoggingContinuous monitoring4.2
011 AI GovernanceSupply chain risk management2.3
012 Privileged AccessIdentity and access management3.6
013 IdentityIdentity and access management3.6

Implementation Guidance:

WA Government AI Policy

The WA Government AI Policy and Assurance Framework requires AI Accountable Officers and self-assessments for AI projects.

ADRWA AI Policy Requirement
011 AI GovernanceAI Accountable Officer, AI Assurance Framework self-assessment
015 Data GovernanceData quality validation for AI systems

Key Requirements:

Privacy and Responsible Information Sharing (PRIS)

The Privacy and Responsible Information Sharing (PRIS) framework governs personal information handling and upcoming statutory requirements.

ADRPRIS Alignment
007 LoggingMinimise PII in logs (Data Minimisation)
013 IdentityData minimisation, consent protocols
015 Data GovernanceInformation classification, retention schedules

Digital ID Act 2024 (Commonwealth)

The Digital ID Act 2024 establishes privacy safeguards for the Australian Government Digital ID System (AGDIS).

ADRDigital ID Act Requirement
013 IdentityData minimisation (s15), no single identifiers (s16), voluntary participation (s18), biometric safeguards (Part 4)

Key Privacy Safeguards:

  • Prohibit collection beyond identity verification requirements
  • Prevent tracking across services using persistent identifiers
  • Users cannot be required to create a Digital ID for service access (voluntary)
  • Strict restrictions on collection, use, and disclosure of biometric information

Additional Resources