Act on your security obligations and work with a trusted critical infrastructure cybersecurity partner
The Security of Critical Infrastructure (SOCI) Act 2018 is a law passed by the Australian government, requiring critical infrastructure organisations to:
Certain industry types are prone to more damages than the others, with cascading effects on the interdependent essential public services that are serving as the backbone of the economy. Threats can range from cyber-attacks to natural disasters, which must be disclosed, addressed, and reported holistically, as per the CIRMP requirement, post amendments in 2022.
The SOCI Act allows the government to step in when there’s a threat to the national security. So, it is important to establish safety protocols from the beginning while also taking initiative to improve throughout the lifecycle of the asset.
Critical Infrastructure (CI) is any asset, system, or service critical to serving a nation’s people, economy, and the government.
There are 11 sectors identified, under the ambit of SOCI:
SOCI has outlined compliance obligations for both the asset owners and operators of CI assets, consisting of business service owners, organisational asset operators, and supply chain partners involved in Australia’s essential service sector.
These can either be Australian-owned, operating with foreign entities or international owners operating in Australia.
A Critical Infrastructure Risk Management Program (CIRMP) is a mandate under SOCI, to methodically report risk management associated to critical infrastructure by identifying potential threats, mitigate through measures, monitor effectiveness, and maintain compliance.
There are four hazard vectors outlined in a CIRMP, with specific rules and requirements to address risks according to the all-hazards approach:
For the Cyber & Information Security Hazards, the responsible entities must comply with one of the listed cyber frameworks: Australian Energy Sector Cybersecurity Framework (AESCSF), National Institute of Standards and Technology (NIST), Cybersecurity Framework (CSF), ISO 27001/27002, ASD's Essential Eight, and the Australian Government Information Security Manual (ISM).
OpusV offers cybersecurity solutions and consultancy, in adherence to the AESCSF framework, in view of the legislation.
The government has mandated the documentation and submission of CIRMP report, annually.
It is not only a responsible way to demonstrate accountability, but also a method to seek government-assistance in terms of remediation in case of severe cyber-attacks with high intensity impact, ensuring continuous operations.
Although the SOCI Act is primarily a legislative requirement, as an asset owner, you must ensure that you are aware of, and in control of managing risks across your asset adequately, to ensure safety and security, be it for the community, stakeholders, or partners.
Following the SOCI Act will help you stay informed of the various regulations surrounding critical infrastructure risk management. It helps enhancing security, credibility, governance, and business continuity during disruptions.
The possible repercussions of non-compliance can be exponentially high, in the long run. From financial loss to credibility damage, some common issues may include penalties and fines by the government, cyber-terrorism causing halt of operations, loss of goodwill, and legal costs.
Apart from a business standpoint, a major setback can look like disruption in power supply impacting the functioning of power plants, hospitals, or transport, leading to direct government intervention.
The SOCI Act was first introduced in 2018 to strengthen Australian critical infrastructure’s cyber resilience and national security. Since then, it has undergone various reforms to expand the scope of legislation and enhance regulatory oversight:
In conjunction with these latest reforms, SOCI Act mandates the below requirements catering to ensure accountability, transparency, and preparedness planning:
The owners, operators, or vendors of critical infrastructure must register assets with the government, providing detailed information such as asset location, service areas, utilisation arrangements, data storage or processing, and operational dependencies. Failure to register your assets can result in breach of the legislative act and regulatory standards.
Asset owners and operators should maintain holistic digital and physical structural security, as well as supply chain security, such as strong measures for the data service providers involved in storing or processing data related to the critical infrastructure assets.
PSO requires the establishment of a Critical Infrastructure Risk Management Program (CIRMP), for vulnerability assessment and risk mitigation, which must be reported to Cyber and Infrastructure Security Centre (CISC) annually for compliance monitoring.
The implementation of a Risk Management Program (RMP) should holistically cover various types of hazards, whether technological issues like digital ecosystem malfunction, operational failures, or physical dysfunctionalities due to natural disasters. As a part of RMP, the legislation requires a cyber security incident response plan, to be developed and submitted to the secretary department of home affairs. Critical infrastructure assets must go under cyber security testing and simulated attacks, which will be reviewed by the authorised representative from the Australian Cyber Security Centre (ACSC) and check if critical assets are equipped to address security challenges. Also, annual reports must be submitted according to the Australian financial year and regulatory standards, as a support document outlining the measures taken for advancing security and threat defence mechanism.
In failure of compliance with RMP obligations, there can be regulatory action. However, the act currently limits the regulator’s ability to issue directions on remediation.
Cyber incidents must be reported to ACSC within 12 hours, with track of occurrence, analyses, and response to threats. In case of ransom payments, while ambiguously legal, there is a requirement to report within 72 hours of the events under ransom payment notification obligations. Any changes related to the internal information management system such as contact information, reporting entity, change in ownership, or changes in power and control should be disclosed near-real-time. In consideration of an overall incident management uplift, reporting cyber incidents within the recommended timeframe will assist with response and recovery procedures.
According to the reforms, an ‘all-hazards’ approach should be followed, which includes, not only incidents post-occurrence but also consequence management of potential events like ransom payments.
To avoid legal risks and authorities’ limited ability, the SOCI Act allows government to intervene in case of significant threats and offer assistance to ensure quick response and recovery. The government will also provide instruction on using and disclosing sensitive information related to national security. By establishing a mechanism for sharing reports and information on critical infrastructure management, authorities can issue guidelines and remediation help in crisis management, through the framework.
The Security of Critical Infrastructure (SOCI) Act has undergone significant amendments and reforms since its enactment in 2018. The timeline highlights key developments in the legislation, aligning with the Australian Cyber Security Strategy 2023-2030.
Each update reflects stronger regulations, enhanced risk management and evolving compliance measures, to safeguard Australia’s digital and physical infrastructure. Explore the timeline to know more.
At OpusV Tech Group, we consult and equip asset owners and operators with cybersecurity tools, operational efficiency installations, and risk management solutions, while ensuring compliance with the Security of Critical Infrastructure (SOCI) Act and AESCSF framework. Our engineering expertise and cybersecurity capabilities help organisations safeguard their most vital assets
We help with incident remediation and reporting, covering event analysis, impact assessment, and assistance in recovery options.
We assist with situational awareness as a crucial phase of risk assessment, detecting unusual activities in physical or digital environment, and conducting root-cause analysis.
We conduct regular risk assessment, ongoing monitoring, and develop proactive defence strategies that mitigate emerging risks, alongwith asset mapping.
We offer automated patching and remediation workflows along with continuous vulnerability scans, simulated tests, and OT configuration analyser.
IXID is a scalable, transferable, customisable, and always-on tool that ensures strong authentication, authorisation, and data management across assets, devices, and sites.
We merge cybersecurity with operational excellence, ensuring that security investments drive efficiency without disrupting business operations.
Together with OpusV, you will be empowered proactively to protect your critical infrastructure, meet various legislative obligations, and keep your operations running and the business thriving.
01
Get guidance on how you can apply SOCI-approved practices to your critical infrastructure.
02
Invest in services and technology that provides you the risk resilience to confront risks, monitor progress, and report.
03
Enjoy the benefits of ongoing operational efficiencies, threat management, gaining industry credibility and saving remediation costs.