09 October 2018

Protective Security Framework Report

The Attorney-General's unsurprisingly terse and decidedly unannounced  Protective Security Policy Framework 2016-17 Compliance Report states
Effective protective security is essential to the secure delivery of government business. 
Security arrangements support government entities to identify threats and manage risks that have the potential to:
• harm staff or the public 
• compromise official information or assets, or 
• interrupt progress toward meeting government policy objectives.
The Protective Security Policy Framework (PSPF) is administered by the Attorney-General’s Department (AGD). It mandates 36 security requirements as detailed at Attachment A. 
The PSPF applies to non-corporate Commonwealth entities (NCCEs) subject to the Public Governance, Performance and Accountability Act 2013 in 2016–17. For corporate Commonwealth entities and wholly-owned Commonwealth companies (CCEs), the PSPF represents better practice. 
Entities are required to undertake an annual selfassessment of their PSPF compliance, then report on their security posture and measures taken to address identified key risks. 
Entity reporting 
All NCCEs submitted a PSPF compliance report for 2016–17; this is an improvement from 2015–16 where two NCCEs failed to report. In addition, five CCEs reported voluntarily (down from 12 in 2015 16) 
Key findings 
PSPF compliance 
While few (34.4%, 32 entities) NCCEs are fully compliant with all of the PSPF, the government’s security posture is still broadly sound. On average, NCCEs fully comply with a significant proportion of requirements (91.2%, 33 out of 36 – shown as “2016–17 PSPF compliance average” in Figures 3, 4 and 5). 
Key risk areas 
NCCEs continue to face challenges in achieving the PSPF’s information security requirements. Of note, only 60.2% of NCCEs reported full compliance with the INFOSEC 4 requirement. ... 
Security governance 
Compliance with PSPF governance requirements was high and remained relatively stable. On average, entities complied with 11.9 of the 13 governance requirements in 2015–16, increasing marginally to compliance with 12 requirements in 2016–17. ... 
Information security 
Information security is dynamic with challenges posed by continuous technological advancement. Information security arrangements are an important element of an entity’s effective protective security regime. 
Compliance with information security requirements has been an area of ongoing concern. Despite increased awareness of cyber security risks, and a concerted effort over the year to promote risk mitigation measures,1 entity compliance with information security requirements did not see significant change. In 2016–17, average compliance remained stable at 6.0 out of 7 requirements. 
Physical security 
NCCEs continued to report high-level compliance against the PSPF’s physical security requirements. On average NCCEs complied with 6.5 out of 7 requirements, broadly in line with the 2015–16 compliance rate of 6.6. 
Of particular note:
• all entities reported full compliance with the PHYSEC 4 requirement to ensure that physical security measures do not breach relevant employer occupational health and safety obligations, and 
• almost all entities reported full compliance with the PHYSEC 5 requirement to show a duty of care for the physical safety of members of the public interacting directly with the Australian Government.
A 5.4 percentage point decline in compliance with the PHYSEC 7 requirement was recorded such that ten NCCEs reported they did not have up-to-date plans and/or procedures in place to respond to heightened security levels in case of an emergency or increased threat. Most of these entities reported they expect this matter to be resolved in 2017–18. 
Personnel security 
In 2016–17, AGD led outreach activities on security culture and managing the ongoing suitability of personnel. 
In line with this, there was a significant (5.4 percentage point) improvement in entities reporting full compliance with the PERSEC2 requirement over the year. Reported compliance has increased from 78.5% of NCCEs in 2014–15 (82.8% in 2015–16) to 88.2% in 2016–17 
Compliance against other personnel security requirements did not see significant change. Average compliance remained stable at 8.3 out of 9 personnel security requirements. 
Personnel security waivers 
Access to classified resources is subject to personnel successfully undergoing a vetting process and holding a valid security clearance. Where clearance requirements are waived, government faces increased malicious insider risks (and may be more vulnerable to exploitation from organised crime and interference from foreign governments). There are two types of waivers: waivers of the Australian citizenship requirement, and waivers of the checkable background requirement. 
Waivers of the Australian citizenship requirement 
In 2016–17, there were 317 Australian Government security clearance holders who were not Australian citizens. Nonetheless, clearances with a citizenship waiver still make up less than 0.2% of the 200,000+ (as at August 2017) active clearances. Across government, citizenship waivers at the NV1 level saw the greatest increase over the year (47 in 2015–16, compared with 175 in 2016–17). 
Waivers of checkable background requirement 
Assurance about a person’s background gives confidence that they can be trusted to protect government information and resources. A person is considered to have an uncheckable background where more than 12 months (cumulative) of the security clearance background checking period cannot be verified. 
In 2016–17, there were 216 people with a security clearance whose background could not be adequately checked. Clearances with checkable background waivers represent only 0.1% of all active clearances. 
Historically, checkable background waivers have most commonly been for clearances at the Positive Vetting (PV) level. This reflects more onerous PV background checking expectations. 
In 2016–17 there were 130 additional NV1 checkable background waivers (from 7 in 2015–16, up to 137). The sizeable increases in checkable background waivers are attributable to a single entity. ... 
CCE compliance summary 
Five CCEs submitted a PSPF compliance report in 2016–17 (down from 12 in 2015–16). Noting the very small sample size, significant variations in year-to-year reported compliance can be expected. 
Two CCEs (40%) claimed full compliance with all 36 mandatory requirements, above the NCCE average of 35.5% (33 entities) but well below the 58% of CCEs (7 of 12) reporting full compliance in 2015–16. 
On average, CCEs reported full compliance with 35 of the 36 mandatory requirements; this is a slight improvement from the 34.4 compliance average reported in 2015–16 (and above the 32.8 NCCE average). 
CCEs reported: 
• full compliance with all PERSEC requirements. There was one citizenship waiver, held at the Baseline level, across all five entities 
• full compliance with all PHYSEC mandatory requirements (an increase from 6.9 of 7 requirements in 2015–16) 
• high rates of compliance with GOVSEC mandatory requirements. On average, CCEs complied with 12.4 of 13 requirements (95.4%) in both 2015-16 and 2016–17 (slightly above NCCE average of 12), and 
• like NCCEs, compliance was lowest in relation to INFOSEC requirements. CCEs reported compliance with 6.6 of 7 requirements in 2016–17 (94.3%), compared to 6.7 out of 7 in 2015–16.