TSS Administrative Guidelines
TSS Administrative Guidelines
1300 27 25 24
[email protected]
Contents
Disclaimer 4
Contact us 4
TSSR Framework 6
Table 1. Who does TSSR affect? 6
How does TSSR work? 6
Security Obligation 6
Notification Obligation 7
General Engagement 7
TSSR framework principles 7
Implementation of the TSSR framework by Government and industry in good faith 7
Key security principles 7
Regulatory powers 9
Power to direct C/CSPs 9
Power to obtain information from C/CSPs 9
Civil penalty regime 9
Relationship between TSSR and the Security of Critical Infrastructure Act 2018 9
Security Obligation 17
Unauthorised access or unauthorised interference 17
Availability and integrity of telecommunications networks and facilities 18
Confidentiality of communications and information 19
How do you meet your Security Obligation? 19
Ensure regular two-way engagement with the Critical Infrastructure Centre 19
Do your ‘best’ 20
Implement a risk management approach 20
Demonstrate competent supervision and effective control 21
A note on standards compliance and certification 23
Notification Obligation 24
Overview of the Notification Obligation 24
Notifiable changes 24
Non-notifiable changes 25
The right time to notify 27
Administrative process for notifications 27
Post-Notification 28
Re-notification 29
Notification exemptions 29
Grounds for exemption 29
Security Capability Plans 30
How far in advance should Security Capability Plans forecast? 30
What information should be included in a security capability plan? 30
Regulatory powers 31
Direction powers 31
Direction to cease use or supply of a carriage service 31
Direction to do, or not do, a thing to address a risk to security 31
Transparency and accountability measures 31
Consultation 32
Glossary 34
List of acronyms 35
Appendices 36
Notification process chart 36
Resources to help you meet your national Security Obligation 37
Checklists 38
Ways to meet your Security Obligation 38
Sensitive functions and facilities 39
Disclaimer
This document is intended as a guide and readers should seek legal, technical and risk advice as
to their own specific needs. The information in this document should not be relied upon as legal
advice. The provision of this information does not override the need to observe laws, in particular
requirements to protect personal information under Australian privacy law.
Contact us
The Critical Infrastructure Centre (the Centre) within the Department of Home Affairs is responsible for
the administration of Telecommunication Sector Security Reforms (TSSR) and for ongoing engagement
with the telecommunications industry.
Any questions about this document or TSSR should be directed to the Centre:
Website: cicentre.gov.au
Email: [email protected]
Detailed guidance is provided to carriers, carriage service providers and carriage service intermediaries
(C/CSPs) on how to comply with their obligations to:
do their best to protect telecommunication networks and facilities from risks of unauthorised
interference or unauthorised access; and to
engage with Government to discuss proposed changes to their telecommunications systems and
services that may impact national security.
The Guidelines also detail the importance of the enhanced partnership between Government and the
telecommunications industry and the processes to support early engagement on potential risks,
increased information sharing on specific national security risks, and increase industry awareness of
national security vulnerabilities and risks.
"security" means:
(a) the protection of, and of the people of, the Commonwealth and the several States and
Territories from:
(i) espionage;
(ii) sabotage;
(aa) the protection of Australia's territorial and border integrity from serious threats; and
(b) the carrying out of Australia's responsibilities to any foreign country in relation to a matter
mentioned in any of the subparagraphs of paragraph (a) or the matter mentioned
in paragraph (aa).
Australia’s telecommunication networks, systems and facilities are critical infrastructure that are vital to
the social and economic well-being of the nation. As many commercial entities have experienced,
espionage, sabotage and foreign interference pose a real and growing threat to Australia’s
telecommunications infrastructure.
The TSSR framework responds to these threats by formalising engagement mechanisms and helping
telecommunications service providers to understand and take into account national security risk factors
when making investment and operational decisions. By working closely with Government,
telecommunications providers can better safeguard Australia’s sensitive information and systems.
Security
Obligation ✔ ✔ ✔ ✔
Notification
✔ ✔ ✘ ✘
Obligation
Information
✔ ✔ ✔ ✔
Gathering Power
Direction Powers ✔ ✔ ✔ ✔
Carriers and carriage service providers (C/CSPs) and carriage service intermediaries should do their
best to protect the networks and facilities they own, operate or use, from unauthorised access or
interference to ensure:
the availability and integrity of telecommunications networks and facilities; and
the confidentiality of communications carried on, and information contained on
telecommunications networks or facilities.
Notification Obligation
Section 314A requires carriers and nominated carriage service providers (C/NCSPs) to notify the
Communications Access Co-ordinator (CAC), through the Critical Infrastructure Centre (the Centre), of
proposed changes to their telecommunication systems or services that are likely to have a material
adverse effect on their capacity to comply with the Security Obligation.
General Engagement
Carriers and carriage service providers are encouraged to engage with the Centre, even if they consider
that changes to their telecommunications systems or services are not notifiable under TSSR.
Regular, two-way engagement with the Centre is the best way for C/CSPs to stay informed about the
changing security environment, the potential implications for the security of their infrastructure and
operations.
C/CSPs are expected to comply with the Security Obligation, and engage with Government
cooperatively and in good faith.
Government will work cooperatively with C/CSPs to identify and mitigate risks to Australia’s national
security arising from the design, construction or operation of telecommunications systems and networks.
Government agencies will take adequate steps to engage with C/CSPs, listen to the C/CSPs’ concerns
and work with C/CSPs’ to develop mitigation measures reasonably necessary for addressing identified
risks.
Government recognises that some mitigation measures to address some security risks to networks may
have cost impacts. For this reason, Government will work closely with C/CSPs to ensure the TSSR
framework operates in a pragmatic way that balances national security outcomes with commercial
drivers.
Owners and operators of telecommunications networks and systems have primary responsibility for
ensuring their security; this is a matter of good corporate governance and business continuity. Owners
and operators are best placed to manage risks to their operations and determine the most appropriate
strategies to boost resilience.
This document does not specify how telecommunications companies must protect their networks.
Rather, it encourages a risk-based approach that allows companies to choose the best technical and
business solutions for their unique circumstances. There is no single solution to protect networks and
facilities—good security is multi-layered and tailored to identified threats.
Good risk management is an ongoing process. It involves establishing a context, determining threats,
vulnerabilities and criticality of systems and information, then analysing likelihood and consequence
before evaluating and applying risk controls to the identified vulnerability.
Good security should be part of an organisation’s principles, practices and culture. If compliance with the
Security Obligation is only considered as an afterthought, it can leave systems or business
arrangements exposed and increase cost and complexity. Integrating security measures into business
systems and processes from the start is ultimately more effective and less costly than adding on security
measures after the fact.
C/CSPs are encouraged to engage with the Centre early in the process of planning changes to systems
and services which affect core and sensitive parts of a network and may give rise to national security
risks. C/CSPs are also encouraged to engage with the CAC at any stage if they are uncertain about what
parts of a network or system may be vulnerable to unauthorised access or unauthorised interference.
Section 315A of the Act enables the Minister for Home Affairs (the Minister) to give a C/CSP a direction
to cease using or supplying a carriage service if the Minister considers the use or supply is, or would be,
prejudicial to security.
The Minister can only give a direction under section 315A if the Australian Security Intelligence
Organisation (ASIO) has issued an adverse security assessment in relation to the C/CSP.
Section 315B of the Act enables the Minister to give a C/CSP a direction to do, or not do, a specified act
or thing where there is a risk of unauthorised interference or access involving telecommunications
networks or facilities and the risk would be prejudicial to security. These include risks to:
the confidentiality of information contained on or carried across telecommunications networks
and/or facilities
the availability and integrity of telecommunications networks and facilities and this was prejudicial
to security
The Minister can only give a direction under section 315B if ASIO has issued an adverse security
assessment in relation to the C/CSP and if there have been reasonable steps to negotiate in good-faith
with the C/CSP to achieve an outcome of eliminating or reducing the risk.
Section 315C of the Act enables the Secretary of the Department of Home Affairs (or the Director-
General of Security, ASIO if authorised), to request information or documents from a C/CSP for the
purpose of assessing compliance with the Security Obligation.
The Minister can initiate proceedings in the Federal Court to seek civil remedies for non-compliance with
the Security Obligation, a Direction or a request for information, including civil penalties, enforceable
undertakings and injunctions.
However, there will be some instances where regulated entities may have obligations under both
frameworks. For example, an energy company that holds a carrier licence would need to comply with its
Contact the Centre if you have specific questions about the application of TSSR and SOCI to your
organisation.
Specific assistance
C/CSPs of all sizes can get targeted security assistance about national security risks through one-on-
one engagement with the Centre.
Nobody knows C/CSPs’ networks and operations better than C/CSPs themselves—not even
Government. Conversely, even the most well-informed, capable and well-resourced C/CSP may not
have access to the most up to date security information available to Government.
Engaging with the Centre ensures C/CSPs benefit from Government information and Government’s
experience responding to security threats. C/CSPs can benefit from Government information holdings by
raising specific issues with the Centre, who may then consult with security agencies in appropriate
circumstances.
Submitting a Notification is the Centre’s preferred mechanism for providing guidance about C/CSPs’
particular risks and vulnerabilities, as it affords the greatest protection to information C/CSPs share with
the Centre. C/CSPs are also welcome to engage informally with the Centre, outside the Notification
process, though the Centre may be more limited in the assistance that it can provide.
Confidentiality
The Centre always operates to the highest standards for the protection of information, and must comply
with the following legislative provisions:
Privacy Act 1988 (Cth) sch 1 (Australian Privacy Principles).
Archives Act 1983 (Cth) s 33.
Crimes Act 1914 (Cth) ss 70, 79.
Criminal Code s 91.1.
Public Service Regulation 1999 (Cth) reg 2.1.
Public Service Act 1999 (Cth) s 13 (APS Code of Conduct).
Information shared through Notifications or Security Capability Plans, or obtained as a result of the
Information Gathering Power, is subject to additional, specific protections under section 315H.
Security clearances
Security agencies may request that specified personnel within a C/CSP apply for a security clearance.
Having cleared staff will give security agencies the option of sharing classified information where there is
a need to know this information. While these individuals cannot disclose the classified information to
colleagues without security clearances, they will be able to provide better informed guidance on
identifying and addressing network security risks.
These publications are intended to assist C/CSPs of all sizes to understand Government’s expectations
about TSSR, and ensure that all C/CSPs have equal awareness of the Government’s position.
Please note that participating in any of the following information sharing schemes will not in and of
itself achieve compliance with either the Security Obligation or Notification Obligation.
https://cicentre.gov.au/tisn
The Trusted Information Sharing Network for Critical Infrastructure Resilience (TISN) Communications
Sector Group (CSG) is one of the key mechanisms for Government to provide security advice to
telecommunications providers. The Centre and security agencies will use this forum to provide updates
about national security risks to the communications sector, share information and techniques required to
assess and mitigate risks, and build capacity within organisations so they are better able to respond to
risks and develop a common approach to organisational resilience.
To join the CSG interested parties must demonstrate they are owners and operators of communications
critical infrastructure, and provide a company biography to the CSG Secretariat.
ASIO Outreach
https://outreach.asio.gov.au
ASIO Outreach is the principal interface between the Australian Security Intelligence Organisation
(ASIO) and government and industry stakeholders.
ASIO Outreach provides information via a number of means including a subscriber-controlled website,
ASIO-hosted briefings, face to face engagement and participation in joint government and industry
forums. All these mechanisms are aimed at providing risk management decision-makers within
government and industry with the most current security intelligence and protective security advice to
assist them to:
The secure website operates on a free subscription basis. The ASIO Outreach website contains
intelligence-backed reporting on the domestic and international security environment. This reporting is
drawn from the full range of ASIO's information holdings and expertise (including the multi-agency
National Threat Assessment Centre, ASIO's protective security area (T4) and the Counter-Espionage
and Interference Division) and some foreign intelligence partner agency reports.
https://cyber.gov.au
The Australian Cyber Security Centre (ACSC) leads the Australian Government’s efforts to improve
cyber security, and provides a wealth of information on information security best practices.
The ACSC monitors cyber threats to Australia and distributes advice through a range of publications and
partnership programs. Up to date information about available ACSC publications and programs is
available through the ACSC website.
https://oaic.gov.au
The Office of the Australian Information Commissioner (OAIC) is the independent national regulator for
privacy and freedom of information and has a number of powers and functions under the Privacy Act
1988, including oversight of Australia’s Notifiable Data Breaches (NDB) scheme. The OAIC can provide
general information about obligations under the Privacy Act, factors to consider in responding to a data
breach, and steps to take to prevent similar future incidents.
In some cases, national security risks will overlap with general security risks related to the running of a
business, for example ensuring personal information about customers is protected. The difference lies in
how that risk may be exploited by specific threat actors, and the impact it may have on Australia's critical
infrastructure and national security.
Global supply chains create particular challenges for implementing controls to mitigate personnel,
physical and ICT security risks and therefore make networks and facilities more vulnerable to
unauthorised access or unauthorised interference, such as espionage, sabotage, and foreign
interference.
The TSSR framework is designed to ensure adequate risk management, not prescribe particular
business models or service delivery solutions. There is no general prohibition against C/CSPs using third
party cloud services, and/or service providers or facilities located offshore.
Foreign solutions operate in different legal environments that may create potential national security
vulnerabilities and risks. These can be further exacerbated by an operator’s lack of competent
supervision and effective control over offshore arrangements. The objective of the TSSR framework is to
ensure that these types of risks are appropriately identified and adequately managed by C/CSPs.
For guidance see the ACSC’s Cyber Supply Chain Risk Management Practitioner Guide, which is
available from https://cyber.gov.au.
The following parts of networks and facilities are generally considered to be most sensitive. ‘Sensitivity’ is
established based upon the following three impacts:
availability impact: the damage to the network of the equipment going offline
integrity impact: the disruption caused by changing the data over which the equipment has
control
confidentiality impact: the cost of compromise of data within the network equipment.
A Network Operations Centre (NOC) or Security Operations Centre (SOC) contains the function or
functions through which network operations are controlled, either as a function distributed among
business units, or as a discrete business unit itself. This includes equipment, services, locations and
processes used to support the network should this occur outside a NOC. This includes SOCs if distinct
from the NOC (since they also perform key functions of network governance and oversight).
Lawful interception equipment refers to any equipment, parts of equipment, or software designed to
facilitate the lawful interception of communications on a network, which is permanently installed on the
network, or able to be installed on request. For the purposes of this guidance, this also includes
hardware or software which supports or facilitates this function.
These are the places where information of a sensitive nature is likely to be stored, making the systems
hardware and its support/operation of specific security interest. This refers to:
applications, databases and hardware that store or process data in bulk, such as call records or
network traffic data
For the purposes of security, carriers, carriage service providers and carriage
service intermediaries must do their best to protect telecommunications networks
and facilities they own, operate or use from unauthorised interference or
unauthorised access.
The Security Obligation in subsections 313(1A), (1B) and (2A) of the Act has two elements:
All carriers and providers must do their best to protect telecommunications networks and facilities from
unauthorised access or unauthorised interference to ensure the:
confidentiality of communication carried on and information contained on telecommunications
networks or facilities; and
availability and integrity of telecommunications networks and facilities.
This includes providers that have telecommunications networks and facilities, based in Australia or
overseas, which are used to provide services and carry and/or store information from Australian
customers.
Carriers and carriage service providers (but not carriage service intermediaries) must also maintain
competent supervision of, and effective control over, telecommunication networks and facilities that
they own, operate or use.
The obligation to protect networks and facilities from unauthorised access or unauthorised interference
requires C/CSPs to maintain competent supervision and effective control. This may include taking
reasonable steps to prevent intrusions or breaches within networks or facilities or to minimise the effect
of malicious activity, demonstrable by the security controls in place. This will be particularly relevant
where activity, if left unchecked, could provide opportunity to compromise the confidentiality, availability
or integrity of telecommunications infrastructure or information carried by, or across it.
Breaches and security incidents are not reportable under TSSR, but carriers and providers may have
obligations under other Commonwealth legislation such as the mandatory reporting regime for data
breaches in the Privacy Act 1988.
Availability is about ensuring that authorised users have access to information, communications and
telecommunications networks and facilities when required. An example where networks and facilities are
not available would be a denial-of-service attack which prevents the ordinary functioning of the service,
which could have serious economic, social or other consequences (particularly in an emergency).
Integrity relates to the accuracy and completeness of information and communications, as well as the
protection of telecommunications networks and facilities from compromise or unauthorised modification.
An example of a breach of integrity would be where a C/CSP’s systems are accessed by a third party
and modified to allow remote access by that party.
Confidentiality refers to ensuring that only authorised people have access to information, systems or
facilities.
The objective of the Security Obligation under subsections 313(1A) and 313(2A) is the protection of all
communications carried on and information contained on networks and facilities, including information
about the network itself, not just personal information or communications content.1 This includes
government and business information such as intellectual property, information that could provide a
competitive advantage, and information of a sensitive nature about a C/CSP’s network, service delivery
models and customers.
For example, a C/CSP that provides services to large businesses or research organisations (such as
universities) may be at a greater risk of espionage, sabotage or foreign interference because of the
commercial value of the information held by their clients (such as scientific research).
Note: a consolidated list of ways to comply with the Security Obligation is available at Appendix C
–.
The most effective way for C/CSPs to comply with their Security Obligation is to:
ensure regular two-way engagement with the Critical Infrastructure Centre
do your ‘best’
adopt a risk-based approach to protecting networks and facilities
demonstrate competent supervision of, and effective control over, telecommunications networks
and facilities owned or operated by the carrier or provider.
Regular two-way engagement with the Critical Infrastructure Centre is an essential component of
C/CSPs ‘doing their best’, and the easiest way for C/CSPs to demonstrate that they are complying with
the Security Obligation.
Confidential, working-level engagement between C/CSPs’ technical personnel and the Centre’s analysts
underpins TSSR’s cooperative approach to security. Supported by Australia’s security agencies, the
Centre’s analysts can work with C/CSP personnel to advance commercially-minded solutions to the full
breadth of security challenges confronting Australia’s telecommunications service providers. See
Specific assistance on page 11 for further information.
Openness with the Centre about security practices and decisions, underpinned by the Centre’s
confidentiality obligations, enables C/CSPs to demonstrate that they are ‘doing their best’. This includes
where a C/CSP ‘doing its best’ is on a path to strengthen its security practices. The Centre is keen to
__________
1 C/CSPs are already required to comply with the obligations contained in the Australian Privacy Principles (APPs) in
Schedule 1 of the Privacy Act 1988 that regulate the handling of personal information.
Do your ‘best’
Compliance with the Security Obligation requires C/CSPs to take all reasonable steps to prevent
unauthorised access and interference for the purpose of protecting the confidentiality of information and
the availability and integrity of networks.
Steps that may demonstrate a carrier, carriage service provider or carriage service intermediary is doing
its best to protect its networks and facilities from unauthorised access or interference, for the purposes of
security include, but are not limited to:
clearly define the security-related roles and responsibilities of the Board, senior management and
individuals
maintain a security capability commensurate with the size and extent of risks from unauthorised
access or interference
considering risks to information security, and risks to physical security, personnel security and
supply chain security
employing sufficient competent personnel to identify, assess and manage the full breath of risks
to security
adopting industry best practices to protect the confidentiality, integrity and availability of systems
and data
implementing recommended aspects of technical standards (e.g. ‘SHOULD’ aspects) that
increase security or decrease vulnerability
addressing known vulnerabilities in systems, standards, configurations, etc.
maintaining awareness of the threat environment
understanding the criticality of the telecommunications services that are being supplied
adopting policies and procedures to validate the effectiveness of security controls
knowing the physical locations where third parties can and do deliver their services from
knowing the physical locations and supply chains for ‘cloud services’ and other external data
storage and processing services
maintaining awareness of who else may have access to shared facilities, such as data centres
and telephone exchanges
engaging with Government when planning major changes to networks or facilities
implementing and testing data and disaster recovery plans and procedures
formalising required security, control and supervision expectations and practices with vendors,
service providers and similar third parties
adopting change management policies and procedures that mandate consideration of the
security implications of a change and whether a change is subject to the Notification Obligation.
Risk management includes the principle, processes and structures that underpin the effective
management of potential opportunities and adverse effects. It is a structured approach to identifying,
assessing and controlling risks that emerge during a program or project life cycle.
A risk-management approach under the TSSR framework should particularly focus on risks posed by
arrangements with suppliers (in particular managed service providers) and particular service delivery
models (i.e. outsourcing/offshoring) that can make risks more difficult to manage. For example, if a
C/CSP is using a supplier or managed service arrangement, or has outsourced elements (such as data
hosting), the C/CSP will need to consider the controls it has in place, or is proposing to put in place, to
manage who can access and control sensitive parts of the network or data.
If a C/CSP is engaging offshore arrangements, one of the key risks to consider is the legislative
environment in the offshore location and whether offshoring particular parts of their business may mean
that personal information about Australians, as well as sensitive commercial information or
communications, may have to be provided to a foreign government under a lawful request in the foreign
jurisdiction.
External assessments provide a mechanism for organisations to have their security controls
independently reviewed. Organisations can engage an appropriately qualified and/or certified individual
or company to provide an external assessment on the appropriateness and sufficiency of their security
controls.
Australian organisations can engage a Certified Information Security Registered Assessors Program
(IRAP) Assessor to conduct independent ICT assessments, identify security risks facing their
organisation and develop mitigation strategies. The IRAP is governed and administered by the Australian
Government Australian Signals Directorate (ASD).
Third party assurance may also mean implementing controls which can be tested, and, when fully
effective, provide evidence that primary information security requirements have been, or are able to be,
satisfied. The Protective Security Policy Framework (PSPF) administered by the Attorney-General’s
Department provides best practice guidance, in particular INFOSEC-4 and INFOSEC-5.
A key element of complying with the Security Obligation is ensuring that a C/CSP is able to demonstrate
that it has competent supervision and effective control of its network and facilities.
A C/CSP must demonstrate that it has processes, controls and arrangements in place to manage
‘who and how’ can access and use its systems, networks and communications.
C/CSPs cannot delegate, or contract out of, responsibility to comply with the Security Obligation.
‘Competent supervision’ refers to a C/CSP knowing and understanding what is happening with its
networks, data and facilities.
Where a C/CSP uses a third party to operate, maintain or support a network or facility owned or
operated by the C/CSP, maintaining competent supervision requires the C/CSP to have mechanisms to
supervise and verify the third party’s activities and work that are independent of the third party.
A C/CSP cannot maintain competent supervision by relying solely on assurances from a third party about
what that third party is or is not doing to the C/CSP’s networks or facilities.
Effective control
‘Effective control’ refers to a C/CSP having the practical ability to take action as required to protect its
networks, data and facilities, either directly or by instructing a third party.
This would include maintaining ultimate authority over all parties with access to network infrastructure
and maintaining ultimate control over who has access to network systems, facilities, information and
access restrictions.
Effective control over networks and facilities can be maintained using appropriate contractual and legal
arrangements with third parties, but C/CSPs cannot rely solely on those arrangements to discharge their
obligation.
Where a C/CSP uses a third party to operate, maintain or support a network or facility owned or
operated by the C/CSP, maintaining effective control requires the C/CSP to retain the capacity, in
appropriate circumstances, to assert control over such networks and facilities without reliance on support
or cooperation from the third party.
However, ISO/IEC 27001 certification and similar certifications (with appropriate scope) can go towards
demonstrating that a C/CSP is doing its best to protect networks and facilities it owns, operates or uses
from unauthorised interference or unauthorised access.
Submitting a notification demonstrates that a C/NCSP has the capability to recognise that a proposed
change could adversely affect its capacity to protect its networks and facilities, and that the C/NCSP is
looking to make an appropriately informed decision about how best to implement that change.
Submitting a notification provides assurance to Government that a C/NCSP is doing its best to comply
with its Security Obligation. Submitting a notification is not an admission by a C/NCSP that the C/NCSP
would implement a change the C/NCSP is aware is likely to, or would, adversely affect its capacity to
protect its networks and facilities.
Notifiable changes
The scope of the Notification Obligation is limited to changes that are likely to have a material adverse
effect on the capacity of the C/NCSP to comply with the Security Obligation. A ‘material adverse effect’
includes any change which could have an actual or potential negative impact on the capacity of the
C/NCSP to comply with the Security Obligation to protect network and facilities from unauthorised
access or interference.
The CAC strongly encourages C/NCSPs to engage with the Critical Infrastructure Centre if they are
proposing to implement any change to the core or sensitive systems or services outlined on page 14, as
these changes are most likely to have a material adverse effect on the capacity of a C/NCSP to comply
with the Security Obligation.
The CAC considers that changes to a telecommunications service or a telecommunications system that
include one or more of the following features or characteristics are likely to have a ‘material adverse
effect’ and would ordinarily trigger the Notification Obligation:
involvement of a high risk vendor2
new access technologies
IP core (routing or switching of traffic)
__________
2 For guidance on what constitutes a ‘high risk vendor’ see the ACSC’s Cyber Supply Chain Risk Management Practitioner
Guide, which is available from https://cyber.gov.au.
The above list is not exhaustive. Please Contact us the Critical Infrastructure Centre if you have
questions about whether a particular change should be notified.
Non-notifiable changes
C/NCSPs providers do not need to submit notifications for changes that do not affect their capacity to
comply with their Security Obligation. Examples include:
like-for-like replacement equipment
day-to-day changes, such as routing changes or software updates
testing or trials not connected to an Australian telecommunications network and where
protections are applied to customer data.
If a C/NCSP believes that a change is unlikely to have a material adverse effect on its capacity to meet
the Security Obligation, the C/NCSP should maintain a record of the decision not to provide the
CAC with a notification. The CAC may, during routine compliance activities, seek evidence regarding
how the C/NCSP determined the change did not have a material adverse effect.
Case Study – Which proposed changes to their systems should Security First Telco
notify?
Security First Telco is reviewing proposed changes to their telecommunications systems to decide
which changes need to be notified to Government.
Examples of changes that should be notified
After a risk assessment of options (based on the guidance in this document), they have decided
the following changes are likely to have a material adverse effect on their capacity to protect their
networks from unauthorised access and interference (i.e. espionage, sabotage and interference)
for the following reasons:
Engagement of a new billing provider
This proposal would likely involve the new billing supplier and a third party, being used by the
billing supplier, having access to Security First Telco’s sensitive customer information during the
projects and possibly after the project as part of support arrangements.
After discussing the project with Government, appropriate risk mitigation could include controlling
the access any third party company located outside of Australia may have to the personal
information and billing data for all of Security First Telco’s Australian customers.
A mobile network operator to deploy Long Term Evolution (LTE) technology
A mobile network operator plan to deploy LTE would likely mean new or upgraded equipment and
involve an equipment supplier or managed service provider to have access to sensitive parts of
Security First Telco’s networks, including access to communications.
In this instance, appropriate mitigation could include ensuring adequate control and monitoring
over levels of access the equipment supplier may have, including remote access arrangements.
This would also apply if the network operator were planning to trial new equipment before
considering any tender related activity.
Engagement of an existing supplier to upgrade core routing equipment
This plan would likely require a supplier to access or install software on equipment where a
significant proportion of the network traffic travels including telecommunications intercepted traffic.
Appropriate mitigation could address concerns related to unauthorised access to the network real
time traffic or interception data.
Examples of changes that do not need to be notified
Through their risk assessment, Security First Telco has assessed that the following changes are
not likely to have a material adverse effect on their capacity to protect their network and therefore
do not need to be notified:
__________
3 For guidance on what constitutes a ‘high risk vendor’ see the ACSC’s Cyber Supply Chain Risk Management Practitioner
Guide, which is available from https://cyber.gov.au.
Completed forms and attachments should be submitted using the web form located at
https://cicentre.gov.au/tss-submission.
C/NCSPs are encouraged to contact the Critical Infrastructure Centre for advice before submitting their
first notification.
Corporate groups
If two or more related carriers or providers (e.g. two carriers in the same corporate group) are jointly
implementing the same proposed change, then one notification form may be submitted to the CAC on
behalf of the related carriers.
In this situation the notification must clearly identify the carriers or providers the change applies to and
the specific carriers or providers that own or operate the affected networks, systems and facilities.
Post-Notification
Following the submission of a complete notification, a C/NCSP will receive one of the following notices
from the CAC within 30 calendar days of notifying of a proposed change:
Further information: request under subsection 314B(1) for further information about the planned
change so the Centre can assess whether there is a risk of unauthorised access to, or
interference with, telecommunications networks or facilities that would be prejudicial to security.
C/NCSPs are expected to respond to a notice requesting further information either within 30
calendar days of receipt or in a timeframe agreed with the CAC. Assessment will resume for a
further 30 calendar day period once the C/NCSP has provided the requested information.
Risk associated: notice under subsection 314B(3) advising the C/NCSP of a risk associated
with the planned change of unauthorised access to, or interference with, telecommunications
networks or facilities that would be prejudicial to security.
A notice under subsection 314B(3) will also ordinarily list measures the CAC considers the
C/NCSP could adopt to reduce or mitigate the identified risk. The Critical Infrastructure Centre
may follow-up with C/NCSPs to confirm their response to this advice.
Where the CAC considers that further measures are necessary to manage the identified risks
associated with particularly large or complex changes, the CAC encourages a dialogue with
C/NCSPs about how best to implement necessary measures. Support is also available for
C/NCSPs proposing smaller or less complex changes who have questions about implementing
suggested measures.
The CAC recognises and appreciates that commercial concerns often underpin or influence the
approaches C/NCSPs adopt to manage risks to their networks and facilities, and that C/NCSPs
often have a deeper understanding than Government of their networks and facilities. The CAC is
happy to work with C/NCSPs to identify alternative measures to eliminate or reduce identified
risks in appropriate circumstances.
No risk: notice under subsection 314B(5) advising that the CAC is satisfied there is not a risk
from the planned change of unauthorised access to, or interference with, telecommunications
networks or facilities that would be prejudicial to security.
The CAC’s assessment of a notified change, and any corresponding advice, is limited to risks to
security; the CAC will not consider, or advise of, other risks unless those risks intersect with risks
to security.
While the above process is premised on cooperative engagement and collaboration, in the event that a
C/NCSP refuses to provide information requested by the CAC or fails to address potential security risks,
the responsible Minister may use a direction or information gathering power.
Re-notification
A C/NCSP may need to submit a new notification if a previous notification no longer accurately reflects
the proposed change. For example, if a C/NCSP elects to use different vendors than was initially notified.
C/NCSPs who believe they may be affected by this requirement should Contact us the Critical
Infrastructure Centre for advice.
Notification exemptions
C/NCSPs may receive a full or partial exemption from their obligation to notify the CAC of proposed
changes to a telecommunications system or service.
A full exemption means the C/NCSP does not have to notify the CAC of any planned changes to
telecommunications systems or services. A partial exemption may be given in relation to certain
categories of changes or in respect of particular parts of the C/NCSP’s business.
For example, a large carrier which offers a number of different types of services, may be exempted from
providing any notifications in relation to a part of their business, but would still be required to notify of
changes to other parts of their business. The details of a partial exemption would be specified in a notice
provided to the C/NCSP.
The CAC may grant an exemption under subsections 314A(4) or (5), either on the CAC’s own initiative
or in response to a written application to the CAC using the TSS2 – Notification exemption application
form.
The CAC may also grant class exemptions on their own initiative. Class exemptions will typically relate
to particular classes of low risk service or network operator.
If a C/NCSP submits a written application, the CAC must respond within 60 calendar days by either:
granting the exemption; or
refusing the exemption and providing written reasons for the refusal.
A C/NCSP may apply to the Administrative Appeals Tribunal (AAT) for review of a decision by the CAC
not to grant an exemption.
The CAC will consider applications for exemptions on a case-by-case basis, with regard to the security risk profile
of a company based on factors such as:
advice from ASIO on the security risk profile of the C/NCSP
the market share held by the C/NCSP
the sensitivity of the C/NCSP’s customer base
the criticality of the networks and services owned or operated by the C/NCSP
the prospective regulatory burden of complying with the Notification Obligation.
The CAC will not grant unnecessary exemptions; for example, in the instance that a carrier or nominated
carriage service provider does not have obligations to notify for a particular change.
One Security Capability Plan may be submitted in any 12-month period to notify about one or more
proposed changes that are likely to have a material adverse effect on their capacity to meet their
Security Obligation to protect networks.
The legislation does not prescribe how far in advance the plan should capture proposed changes.
However, it may not be feasible to include changes that have tight deadlines for implementation and
which require CAC consideration in less than 60 calendar days. For such proposed changes, a C/NCSP
may wish to complete a standard notification form which the CAC must respond to within 30 calendar
days (unless further information is required).
A Security Capability Plan must include the same level of detail about each proposed change as
would be required if an individual notification was submitted for each change using the TSS1 –
Notification of proposed change form. Carriers and providers submitting a Plan should complete a
separate TSS1 – Notification of proposed change form for each change notified as part of the Plan.
Carriers and nominated carriage service providers who have submitted a Plan must still submit individual
notifications if:
the submitted Plan no longer accurately reflects a change a carrier or provider is proposing to
implement; or
the carrier or provider proposes to implement a notifiable change not included in the Plan it
submitted.
Direction powers
The Minister for Home Affairs may give a C/CSP a written direction under the following circumstances:
if the use or supply of a carriage service is prejudicial to security (s 315A)
if there is a risk of unauthorised interference or access involving networks of facilities (s 315B)
Noting the TSSR framework is premised on cooperative engagement and collaboration, the Minister’s
direction powers are intended as a last resort to achieve compliance or address security risks.
Section 315A provides that the Minister may issue a direction not to use or supply, or to cease using or
supplying a carriage service if:
a person who is a C/CSP uses or supplies, or proposes to use or supply, for the person’s own
benefit, one or more carriage services; and
the Minister, after consulting with the Prime Minister, considers the proposed use or supply would
be prejudicial to security.
Section 315B provides that the Minister may issue a direction to a C/CSP to do, or not do, a specified act
or thing where there is a risk of unauthorised interference with or unauthorised access to, networks or
facilities that would be prejudicial to security. These include risks to the:
confidentiality of information contained on or carried across telecommunications networks
and/or facilities;
availability and integrity of telecommunications networks and facilities and this was prejudicial
to security.
The Minister may only issue a direction under either section if:
the Minister is satisfied that there is a risk of unauthorised interference with or unauthorised
access to networks or facilities that would be prejudicial to security having reference to the
meaning of ‘security’ in the Australian Security Intelligence Organisation Act 1979; and
ASIO has made an adverse security assessment in respect of a C/CSP.
In addition, the Minister may only issue a direction under s 315B if satisfied that all reasonable steps
have been taken to negotiate, in good faith, with the C/CSP to achieve an outcome of eliminating or
reducing the security risk.
The requirement to have regard to these matters is intended to ensure that a direction is proportionate
and reasonable and does not have an unnecessarily negative effect on the C/CSP’s business, or impede
market innovation and competition.
Consultation
Before giving a C/CSP either direction the Minister must consult with the Minister administering the Act,
and provide the C/CSP an opportunity to make representations in relation to the proposed direction.
Where the Minister is considering issuing a s 315A direction, the Minister must also consult with the
Prime Minister.
Where the Minister is considering issuing a s 315B direction, the Minister must also provide the C/CSP
with a written notice setting out the proposed direction and invite the C/CSP to make written
representations to the Minister in relation to the proposed direction, and have regard to any
representations made.
If the Minister gives a C/CSP either direction, the Minister must provide a copy of the direction to the
Australian Communications and Media Authority (ACMA).
This provision is necessary to ensure that the Government can access the relevant information needed
to make an assessment regarding the C/CSP’s compliance with its obligations and to assess the risk to
security. To ensure the relevant information is accessible, section 315D removes the privilege against
self-incrimination; a C/CSP cannot refuse to comply with a direction on the grounds it may incriminate a
person or expose the person to a penalty.
Information that can be requested is limited to material relevant to monitoring compliance with the
Security Obligation.
The Secretary must have regard to the costs for the C/CSP in complying with any requirement in the
notice that would be likely to be incurred by the C/CSP.
There may be circumstances where it is not feasible or necessary to engage the C/CSP prior to issuing
the notice. A failure to engage or consult does not affect the validity of the notice as it is not a pre-
condition for issuing the notice.
Written notice
A formal notice requesting information and or documents must be made by written notice and include:
timeframe for the provision of information
the form in which the C/CSP is required to provide/produce the information or documents
outline the effect of provisions relevant to C/CSPs concerning compliance with the Act and
offences under the Criminal Code for providing false or misleading information.
This ensures C/CSPs understand the consequences of failure to comply with a notice issued under
section 315C, including the criminal consequences for providing misleading or false information.
Carrier A carrier is defined in the Telecommunications Act 1997 to mean the holder of a
carrier licence.
Carriage service provider A carrier service provider (CSP) is defined by the Telecommunications Act 1997 to be
a person who supplies, or proposes to supply, a listed carriage service to the public
using:
a network unit owned by one of more carriers, or
a network unit in relation to which a nominated carrier declaration is in force.
A CSP may include an international CSP, a secondary user of an exempt network
unit, an intermediary and a specified person declared by the Minister as a CSP.
Carriage service A carriage service intermediary (CSI) is defined in the Telecommunications Act 1997
intermediary as a person who is a carriage service provider under subsection 87(5) of that Act. To
summarise, carriage service intermediaries are middle persons that arrange the
supply of a service between carriage service providers and customers, for reward.
Communications Access The Communications Access Co-ordinator (CAC) is a role established under section
Co-ordinator 6R of the Telecommunications (Interception and Access) Act 1979 and performed in
the Department of Home Affairs.
Confidentiality Confidentiality under 313 (1A) and (2A) of the Telecommunications Act 1997 relates
to the obligations to protect information and communication from unauthorised
access or unauthorised interference for the purpose of security.
Nominated carriage service A carriage service provider covered by a declaration in force under subsection 197(4)
provider of the Telecommunications (Interception and Access) Act 1979.
The United Kingdom Cyber Essentials Scheme: Requirements for basic technical protection from cyber-
attacks is an accessible guide for organisations of all sizes to mitigating the most common internet based
threats to cyber security.8
The United Kingdom National Cyber Security Centre, Cloud Security Collection is a comprehensive suite of
documents to assist organisations in how to configure, deploy and use cloud services securely.9
The United States National Institute of Standards and Technology (NIST) Framework for Improving Critical
Infrastructure Cybersecurity10 includes standards, guidelines, and practices to help owners and operators of
critical infrastructure to manage cybersecurity-related risk. It can help organisations determine their current
cybersecurity capabilities, set goals for a target level of cyber resilience and establish a plan to improve and
maintain cybersecurity.
Further assistance can be obtained from other non-government sources such as:
MITRE Common Vulnerabilities and Exposures (CVE)
MITRE Adversarial Tactics, Technologies & Common Knowledge (ATT&CK)
NIST Computer Security Resource Centre (CSRC)
__________
4 Available at www.itu.int/rec/T-REC-X.1051
5 Available at www.asd.gov.au/infosec/ism/
6 Available at http://www.asd.gov.au/infosec/cloudsecurity.htm
7 Available at www.asd.gov.au/infosec/mitigationstrategies.htm
8 Further information is available at www.gov.uk/.
9 Available at www.ncsc.gov.uk/guidance/cloud-security-collection
10 Further information is available at www.nist.gov/cyberframework/
These are examples of the ways that C/CSPs can meet their Security Obligation:
These are examples of the telecommunications functions and facilities that are generally considered most
sensitive: