CASE001
Topics
Themes
- risks of having official or government information compromised
- effect of having aggregated information compromised
- appropriately protecting government information and information storage methods
CASE001
Topics
Themes
A government agency that liaises extensively with external and foreign partners has a thorough and content-rich website to maintain its relationships and provide the public with information.
The information, documents and resources on the agency’s website are all non-protectively marked information, covering the agency’s structure, trade relationships and various policies and legislation.
To date, the agency has not conducted a risk assessment on having the information published online.
However, it is discovered that due to poor coding, a hostile foreign agency could hack the agency’s firewall to access all public content, as well as information in a private back-end database not intended for public release.
Allowing hackers to access to such a range of information would lead to a catastrophic compromise of information and irreparably damage the reputation of the agency.
The agency made several errors in this scenario. The agency should have:
1. Considered the risks of official or government information becoming compromised
Agencies must factor more than protective markings into their risk assessments when considering the compromise of official or government information.
As part of a risk assessment a Business Impact Level (BIL) assessment should consider the value of information beyond the protective marking of sections of information or individual documents.
This is particularly relevant to aggregated information, whether it is aggregated on an internal database or accessible in a way that allows it to be aggregated, for example, non-protectively marked information publically available online.
Special consideration should be given to aggregated information because while the individual components or documents may be assessed to have low value or be non-protectively marked when in isolation, the business impact from the compromise of that information combined may be very high and/or warrant a national security classification.
2. Considered the effect of having aggregated information compromised
Agencies should consider the effect of a compromise to aggregated information on functionality and the provision of services, client/customer assurance and confidentiality and operational, reputational and/or monetary capability.
3. Appropriately protected its information and used correct information storage methods
Agencies must ensure they appropriately protect their aggregated information and the devices and/or methods for storing that information:
For example: