GOV003
These guidelines will help your organisation to:
- manage security risks
- meet security threats
- protect people, information, and assets
- give assurance to other organisations you work with.
GOV003
These guidelines will help your organisation to:
First, set up a policy framework based on your organisation’s operational needs.
Then identify which assets you need to protect — the assets required for your organisation’s ongoing operations, or for the national interest. Include personnel, information, physical assets, and services.
Next, conduct a risk assessment. Use the Business Impact Levels (BILs) to help you assess risk. BILs enable consistent assessment of the impact if assets are compromised or lost.
Use your risk assessment to inform your policies, plans, and processes — to tell you which security measures you need to implement, how, and when.
Remember to consider other operational policies and outcomes that could be affected by your policies, plans, and processes.
Record your policies, plans and processes in a single document or separate documents. If you choose to use separate documents, make sure you coordinate their development.
Ensure your whole organisation is aware of your security policy, plans and processes. Consider publishing them on your intranet and promoting them. Building security awareness has more information.
Review them regularly to identify gaps and keep up with changes to risk factors — at least every 2 years.
Your protective security policy gives a mandate for your organisation’s protective security plan and processes. It should meet the PSR mandatory requirements.
Your chief executive/agency head, or their delegate, should approve your protective security policy and support its enforcement. Your Chief Security Officer (CSO) should actively monitor the policy.
Protective security policies must cover four key areas – governance, personnel, information, and physical.
Each policy should say why the policy is necessary and who has authorised it.
Governance arrangements cover how protective security relates to other components of operational governance, including:
Make sure your personnel security policy covers:
Your information security policy should cover:
Creating a policy for protective marking of documents gives you detailed guidance on this aspect of your information security policy.
You should use the following sources as your primary guidance when developing information security policy:
Your physical security policy should address:
Your organisation’s protective security plan and processes must mitigate security risks while allowing secure information sharing.
Protective security processes may form part of your security plan, or be standalone advice to employees.
Your plan should be comprehensive and detailed. Achieve this by:
Also involve senior management and get their support to ensure the plan’s success.
The objectives of a security plan should be to:
Develop separate site security plans for each of your individual sites.
Consider carefully how you classify and protect the security plan, and the business impact if the plan’s confidentiality is compromised. Classify individual elements of the plan as appropriate.
Your security plan must cover four key areas – security of governance, personnel, information, and physical assets.
If governance arrangements are standalone plans managed by other sections of your organisation, consult your security management personnel as you develop the individual plans.
Personnel security arrangements should include:
Information security arrangements should include:
Physical security arrangements should include:
Here are suggested headings and sections for your organisation’s security plan.
Foreword from the chief executive/agency head
State the importance of security planning, endorse the plan, and outline the need for effective security risk management.
Statement of purpose and objectives
Link the security plan to the security policy. Set out the role and responsibility of the organisation and the security practices needed to minimise disruption to its operation and resources.
Assessment of existing security measures
Evaluate the organisation’s current protective security arrangements and describe current exposure and potential threats. This may be a formal threat assessment.
Main section
Split the main section into at least four parts. These parts can be separate documents or a single file.
Actions and strategies
Outline how to meet the objectives and treat the security risks identified in the threat assessments.
Resources and responsibilities
Describe the resources needed and who is responsible for implementing the strategies.
Desired outcomes and performance indicators
State your outcomes and how you will measure whether the objectives have been met. Examples of a performance indicator could be:
Related processes
Include the processes that support the plan. The processes may be attachments or standalone documents for your people. Other attachments may include: