Home Insights What you need to know about Australia’s critical infrastructure reforms
Share

What you need to know about Australia’s critical infrastructure reforms

Despite a complex legislative history, the amendments to the Security of Critical Infrastructure Act 2018 (Cth) (SOCI Act) have now been finalised (subject to the ongoing development of a number of ‘Rules’, which play an important role in determining the application and also determining certain operational details of the SOCI Act). 

Amongst other things, the SOCI Act’s extended operation imposes three key obligations on entities responsible for critical infrastructure assets. Our previous article provides an overview of the legislative history of these reforms and some of the key provisions.

These amendments have wide-reaching implications for numerous sectors, and organisations that are subject to the SOCI Act have a number of immediate steps to take to ensure that they are ready to comply with the ‘positive security obligations’ (described below) as compliance becomes mandatory in the coming months.

Expanded sector and asset coverage

The sectors and asset classes that fall within the SOCI Act have been significantly expanded. Australia’s critical infrastructure regime now encompasses 11 broadly framed sectors and 22 critical infrastructure asset classes. The sectors are:

  • communications

  • data storage or processing

  • financial services and markets

  • water and sewage

  • energy

  • health care and medical

  • higher education and research

  • food and grocery

  • transport

  • space technology

  • defence industry

Generally, the definition of ‘critical infrastructure assets’ is determined by reference to specific infrastructure that is core to each sector. Most obligations apply to the ‘responsible entity’ which owns or operates the critical infrastructure asset. ‘Direct interest holders’ (those entities which hold an interest of at least 10% in a critical infrastructure asset or influence or control the asset) may also have obligations under the SOCI Act. 

 

Source: Department of Home Affairs and the Cyber and Infrastructure Security Centre. 

Positive security obligations 

Following the Security of Critical Infrastructure (Application) Rules (Application Rules) taking effect on 8 April 2022, two of the three positive security obligations now apply for certain of the newly included asset classes. Not all sectors or asset classes have had these obligations ‘switched on’. Home Affairs has been in contact with entities in the asset classes about the Application Rules and their applicability to those entities, and we expect it will continue to do so with entities in the impacted sectors. 

The third obligation to establish and comply with a risk management program will apply once the Risk Management Program Rules are registered. The Department of Home Affairs has released a policy document setting out the proposed Risk Management Program Rules. However, the final draft of these Rules has not been released. Once published, the draft Risk Management Program Rules will be subject to a mandatory consultation period of 28 days. 

1. Report information to the Register of Critical Infrastructure Assets. Reporting entities (either a responsible entity or a direct interest holder) must provide interest, control and operational information to the Cyber and Infrastructure Security Centre. This register will not be publically available. Following the Application Rules taking effect, this obligation applies to a defined list of critical asset classes, but a six month ‘grace period’ means that compliance is not compulsory until 8 October 2022. Non-compliance can result in a maximum penalty of 50 penalty units (currently $11,100).

2. Mandatory cyber security incident notification requirements. The Application Rules also ‘switched on’ the mandatory cyber incident reporting obligations for certain critical asset classes, subject to a three month ‘grace period’. From 8 July 2022, this obligation requires that:

  • if an entity becomes aware of a cyber security incident that has had, or is having, a significant impact on the availability of the asset, it must report this event within 12 hours; and

  • if an entity becomes aware that a cyber security incident has had, or is having, a relevant impact on the availability of the asset, it must report this event within 72 hours

A ‘significant impact’ is one which has materially disrupted the availability of essential goods or services provided by the asset (or as otherwise specified in sector-specific rules, which have not yet been developed). A ‘relevant impact’ is any other impact on the availability, integrity, reliability or confidentiality of the asset. Non-compliance can result in a maximum penalty of 50 penalty units (currently $11,100).

3. Risk management program. The Risk Management Program Rules will ‘switch on’ the obligation for responsible entities to establish, maintain and comply with a risk management program that manages and mitigates prescribed risks associated with its critical infrastructure assets. It is anticipated that the Risk Management Program Rules will not apply to all asset classes (for example, if the Government forms the view that there would be regulatory overlap with other regimes applicable to the sector which already place obligations on the management of relevant risks). Once these Rules are enacted, there will be a six month grace period for compliance. A risk management program must: 

  • identify all hazards that present a material risk to the availability, integrity, reliability and confidentiality of its critical infrastructure asset;

  • mitigate risks to prevent incidents;

  • minimise the impact of realised incidents; and

  • implement effective governance and oversight procedures relating to security. 

Failing to adopt, maintain or comply with a critical infrastructure risk management program can result in a maximum penalty of 200 penalty units (currently $44,400).

Government powers

The SOCI Act also now includes additional government powers which are seen by the Australian Government as being vital for maintaining the security of Australia’s critical infrastructure. In particular, from December 2021, the Government can exercise the following powers to respond to a cyber security incident that is affecting a critical infrastructure asset: 

  • an information gathering direction – requiring a responsible entity to provide information in relation to a cyber security incident;

  • an action direction – where the Home Affairs Minister can direct an entity to do, or refrain from doing, any action deemed reasonably necessary, proportionate and technically feasible to respond to a cyber security incident if the entity is unwilling or unable to resolve the incident; and

  • an intervention request – which provides the Australian Signals Directorate a ‘last resort’ power to take control of an asset where an entity is unwilling or unable to resolve a cyber security incident.

The Government may also privately declare a critical infrastructure asset (which may potentially comprise the whole or a large component of the business of an entity) to be a System of National Significance (SoNS). Once declared as forming part of a SoNS, the Government may then provide a written notice requiring the relevant responsible entity for the SoNS to comply with the following enhanced cyber security obligations: 

  1. Develop and maintain cyber security incident response plans.

  2. Undertake cyber security exercises.

  3. Undertake vulnerability assessments.

  4. Provide access to system information.

Responsible entities will be specifically notified and consulted with by the Government if these additional powers are exercised in respect of their critical infrastructure assets.

Key takeaways 

There are a number of immediate steps to be taken by organisations that may be impacted by the SOCI Act, including:

  • Gathering asset information to identify whether they are captured as the owner, operator or direct interest holder in critical infrastructure assets. This assessment is sector specific and will be a more complex assessment for organisations in some sectors than others. An asset audit should be undertaken to ensure that critical infrastructure assets are properly identified and, where relevant, ensuring that reporting and other obligations are complied with in relation to those assets.

  • Ensuring existing cyber incident response plans include processes for quick identification of cyber incidents and their impact on critical infrastructure assets. This step is especially important for responsible entities for asset classes that have been ‘switched on’ so they can comply with the obligation to report relevant incidents to the Australian Cyber Security Centre within 12 hours and 72 hours (as applicable) by no later than 8 July 2022 and take appropriate action to address the incident.

  • Considering internal processes and procedures to be followed if the organisation were to receive a request for information or a direction from the Government in response to a cyber security incident. For example, how will the request or direction be handled and to whom within the organisation will it be escalated.

  • Considering existing risk management processes relating to critical infrastructure assets. It should be noted that the risks to be managed are those arising from all hazards (including supply chain, people and natural and physical hazards), not just cyber hazards and whether they are likely to require uplift once the Risk Management Program Rules are finalised and come into effect.

  • For responsible entities that engage third parties to assist with the operation of their critical infrastructure assets, review these arrangements. Where necessary, a responsible entity should seek to uplift those contracts to include contractual obligations on third parties to ensure that they will support the organisation’s compliance with its obligations under the SOCI Act (including by the provision of information and co-operation with the security requirements). 


Authors

NORTH-james-highres_SMALL
James North

Head of Technology, Media and Telecommunications

GAY Justin highres SMALL
Justin Gay

Special Counsel

Claire Allen

Law Graduate


Tags

Technology, Media and Telecommunications

This publication is introductory in nature. Its content is current at the date of publication. It does not constitute legal advice and should not be relied upon as such. You should always obtain legal advice based on your specific circumstances before taking any action relating to matters covered by this publication. Some information may have been obtained from external sources, and we cannot guarantee the accuracy or currency of any such information.