Skip to main content

You are here

Security

These policies relate to ICT security and include supporting guidelines and templates related to the Information Security Management Framework (ISMF).

Framework

PCO30
The Protective Security Management Framework (PSMF) describes the arrangements and expectations for personnel, physical and information security in South Australian Government agencies.

Framework

DPC/F4.1
The Information Security Management Framework (ISMF) addresses cyber security in the Government of South Australia, and consists of 40 policies supported by 140 standards.

Policy

ISMF change log showing the differences between recent versions.​

Policy

DPC/R4.1
ISMF Ruling 1

This ruling is issued for application of the South Australian Government Information Security Management Framework (ISMF) to critical Information Communications Technology (ICT).

Policy

DPC/R4.2
ISMF Ruling 2

This ruling describes how South Australian Government information is managed in alignment with the Cabinet approved expectations stipulated in the PSMF. 

Guideline

DPC/G4.1a
ISMF Guideline 1a

This guideline assists agencies and relevant suppliers in transitioning from the current state to an operating environment that meets the requirements introduced in ISMF version 3.

Guideline

DPC/G4.1b
ISMF Guideline 1b

This guideline provides clarification on the roles and responsibilities within agencies that are currently defining, establishing and maintaining an Information Security Management System (ISMS).

Guideline

DPC/G4.2
ISMF Guideline 2

This guideline describes a process flow for managing risk and recording risk treatments and applied controls from the ISMF. 

Guideline

DPC/G4.3
ISMF Guideline 3

This document describes the processes for initiating, developing and endorsing across-government cyber security ICT standards, guidelines or plans. 

Guideline

DPC/G4.4b 
ISMF Guideline 4b

This guideline describes the role of the Information Technology Security Adviser (ITSA).

Guideline

DPC/G4.6
ISMF Guideline 6

This guideline highlights specific policies and standards related to procurement.

Guideline

DPC/G4.7
ISMF Guideline 7

This guideline has been developed to provide clarification on the steps involved in creating and maintaining an information asset inventory and the roles and responsibilities regarding these activities.

Guideline

DPC/G4.8a
ISMF Guideline 8a

This guideline outlines a process for classifying information and associated information assets.

Guideline

DPC/G4.8b
ISMF Guideline 8b

This guideline assists agencies and suppliers in translating earlier classification markings to the revised scheme. 

Guideline

DPC/G4.9
ISMF Guideline 9

All personnel (including contractors) requiring ongoing access to the Australian Government security classified information or resources need security clearances.

Guideline

DPC/G4.11
ISMF Guideline 11

Agencies are required to take steps to manage personnel departures from the organisation. 

Guideline

DPC/G4.12a
ISMF Guideline 12a

This guideline has been developed to assist agencies understand the Cyber Security Incident Reporting Scheme and implement it in to their agency’s internal processes.

Guideline

DPC/G4.18
ISMF Guideline 18

This guideline provides information about the measures that should be implemented to provide appropriate levels of protection for Endpoint devices.

Guideline

DPC/G4.21
ISMF Guideline 21

This guideline describes practices and procedures for secure information management, recovery, sanitisation and/or disposal activities for storage devices and media.

Guideline

DPC/G4.23
ISMF Guideline 23

This guideline will assist agencies in establishing and integrating appropriate logging and monitoring of information security events.

Guideline

DPC/G4.25
ISMF Guideline 25

This guideline deals with appropriate considerations for user access control measures for information and related systems and services.

Guideline

DPC/G4.30a
ISMF Guideline 30a

This guideline assists individuals and Responsible Parties (as defined in the ISMF) in fulfilling their information security obligations when working remotely or travelling on business.

Guideline

DPC/G4.30b
ISMF Guideline 30b

Telecommuting offers a wide range of benefits but also brings a distinct set of risks to government information assets.

Guideline

DPC/G4.37a
ISMF Guideline 37a

ICT infrastructure that the Government has a critical reliance on must be managed appropriately.

Guideline

DPC/G4.38
ISMF Guideline 38

This guideline outlines legislative and regulatory requirements for agencies and suppliers to agencies whose contractual requirements include the ISMF.

Guideline

DPC/G4.39
ISMF Guideline 39

Agencies are responsible for developing and implementing procedures to ensure security compliance in accordance with the PSMF and the ISMF.

Standard

DPC/S4.5
ISMF Standard 140

All agencies and applicable suppliers are required to report cyber security incidents and events which disrupt or are likely to disrupt ICT services.

Standard

DPC/S4.6
ISMF Standard 141

Endpoint Protection refers to the security measures implemented for user accessible devices at the edge of a network that may contain or provide access to information for an end user.

Mixed

This spreadsheet will help agencies to define and document the policies, standards and controls from the ISMF that are applied to a given location, business function or ICT system. 

Mixed

This spreadsheet is designed to assist agencies submit information about their critical ICT infrastructure and services to ICT and Digital Government

Guideline

DPC/G3.7
This guideline provides succinct and overarching guidance for storing SA Government data off-site.