SOCI CIRMP – are you ready?
15 July 2024
The Security of Critical Infrastructure Act 2018 (SOCI Act) requires responsible entities to have a Critical Infrastructure Risk Management Program (CIRMP) in place. Significant deadlines in relation to CIRMPs are fast approaching:
Make sure your CIRMP complies with a cyber and information security hazards framework and, if you are responsible for obtaining annual report sign off within your organisation, start thinking about what the board might want to see in order to provide the relevant approval.
The SOCI Act is designed to manage risks to critical infrastructure assets (CI assets) by ensuring:
Responsible entities are encouraged to adopt an 'all hazards' approach towards managing their CI assets. The Security of Critical Infrastructure (Critical Infrastructure Risk Management Program) Rules (LIN 23/006) 2023 (the Rules) outline the specific areas that a CIRMP has to address. The 'all hazards' approach goes beyond a simple box ticking exercise, and requires responsible entities for CI assets to consider all possible risks to the asset and what can be done within reason to mitigate those risks.
A recap
A responsible entity must have and maintain a CIRMP. These programs have no prescribed format and are intended to incorporate existing risk management frameworks and processes.
A CIRMP must identify each hazard where there is a material risk that the occurrence of the hazard could have a relevant impact on the asset. The CIRMP should outline the processes/systems in place to, as far as reasonably practicable, minimise risks and mitigate the relevant impacts of each hazard.
A material risk includes:
The four defined (and non-exhaustive) hazard categories (and potential examples of each) are:
Cyber and Information Security Hazards | Personnel Hazards | Physical Security and Natural Hazards | Supply Chain Hazards |
Phishing | Malicious or negligent employees who have access to CI assets | Unauthorised access to, or interference with, a CI asset | Unauthorised access, interference or exploitation of a CI asset's supply chain |
Malware | Off-boarding processes for outgoing employees and contractors | Fire, flood, cyclone, storm, heatwave, earthquake, tsunami, space weather, or biological health hazards | Misuse of privileged access to the CI asset by any provider in the supply chain |
In addition to each hazard, the following must also be included in a CIRMP:
A CIRMP should emphasis proactive and broad risk mitigation approaches. Entities should not limit themselves to considering issues directly within the vacuum of their own asset, and instead need to consider the broader hazards which could potentially affect their asset.
This includes risks emanating from third parties, unrelated industries, or even interdependencies with other critical assets, even if those assets are owned or operated by other entities.
By 18 August 2024, entities will need to update their CIRMPs in order establish and maintain a process/system which complies with one of the cyber and information security frameworks nominated by the Rules:
Document | Condition |
Australian Standard AS ISO.IEC 27001:2015 | |
Essential Eight Maturity Model published by the Australian Signals Directorate | Meet maturity level 1 as indicated in the document |
Framework for Improving Critical Infrastructure Cybersecurity published by the National Institute of Standards and Technology of the United States of America | |
Cybersecurity Capability Maturity Model published by the Department of Energy of the United States of America | Meet Maturity Indicator Level 1 as indicated in the document |
The 2020-21 AESCSF Framework Core published by Australian Energy Market Operator Limited (ACN 072 010 327) | Meet Security Profile 1 as indicated in the document |
Alternatively, entities can choose to implement an alternative framework if they consider that it better addresses the risks affecting the entity's critical assets. Equivalent frameworks need to, at a minimum, meet the standards of the above frameworks. The CISC recommends that any chosen alternative frameworks are promulgated by a government or international organisation, and that their equivalency to one of the frameworks identified in the Rules is justified in their CIRMP.
Responsible entities have an obligation to submit an annual report in relation to their CIRMP.
The first annual reports on CIRMPs are due to be submitted any time between 1 July 2024 to 28 September 2024. The annual report has to be submitted using an approved form, which is located on the CISC website.
The annual report needs to address the following requirements:
Identify the hazard |
Evaluate the effectiveness of the CIRMP in mitigating any significant relevant impact that the hazard may have had on the CI asset |
Specify whether any variations were made to the CIRMP during the year as a result of the occurrence of the hazard |
If the responsible entity has a board, council or other governing body, then they need approve the report. To do so will require the board, council or other governing body to take steps to satisfy itself that the CIRMP has been developed in accordance with the requirements of the SOCI Act and is appropriately managing risks associated with the CI asset. This is the critical part of the process – if you are responsible for obtaining this sign off within your organisation, you need to start thinking about what the board might want to see in order to provide the relevant approval.
CIRMPs do not need to be submitted alongside the annual reports, but the regulator may review a responsible entity's CIRMP as part of a compliance audit.
The importance of CIRMPs must not be underestimated. They are a vital document for assessing how risk is being managed.
Now is the time for responsible entities to make sure their CIRMPs are up to date, compliant with an appropriate cyber and information security framework and ready for the annual reporting process. It will be important for am organisation to understand what level of comfort their board might require in order to approve the annual report.
The Ashurst Group comprises Ashurst LLP, Ashurst Australia and their respective affiliates (including independent local partnerships, companies or other entities) which are authorised to use the name "Ashurst" or describe themselves as being affiliated with Ashurst. Some members of the Ashurst Group are limited liability entities.
Ashurst Australia (ABN 75 304 286 095) is a general partnership constituted under the laws of the Australian Capital Territory.
Ashurst Risk Advisory Pty Ltd is a proprietary company registered in Australia and trading under ABN 74 996 309 133.
The services provided by Ashurst Risk Advisory Pty Ltd do not constitute legal services or legal advice, and are not provided by Australian legal practitioners in that capacity. The laws and regulations which govern the provision of legal services in the relevant jurisdiction do not apply to the provision of non-legal services.
For more information about the Ashurst Group, which Ashurst Group entity operates in a particular country and the services offered, please visit www.ashurst.com.
This material is current as at 15 July 2024 but does not take into account any developments after that date. It is not intended to be a comprehensive review of all developments in the law or in practice, or to cover all aspects of those referred to, and does not constitute professional advice. The information provided is general in nature, and does not take into account and is not intended to apply to any specific issues or circumstances. Readers should take independent advice. No part of this publication may be reproduced by any process without prior written permission from Ashurst. While we use reasonable skill and care in the preparation of this material, we accept no liability for use of and reliance upon it by any person.
The information provided is not intended to be a comprehensive review of all developments in the law and practice, or to cover all aspects of those referred to.
Readers should take legal advice before applying it to specific issues or transactions.