Six Australian government agencies have come under fire from the Australian National Audit Office (ANAO) for having lax security.Figures from the 2005 audit of security management of Internet security in Australian government agencies conducted by the ANAO were released yesterday and found 31 specific risks as defined by the Defence Signals Directorate (DSD) in agency Web servers. Three percent of risks were high level, 32 percent were medium level, and 65 percent were low-level risks. The ANAO made 51 suggestions for improvements.Alarmingly, the ANAO report also concluded the current level of Internet security in six government agencies is insufficient, and none of the agencies fully complies with the Protective Security Manual (PSM) and ACSI 33. The PSM is a list of common standards for protective security for all Australian government agencies and contractors with eight points, including security policy and personnel security. ACSI 33, part of the PSM, breaks down risk management into five simple steps—context, identifying, analyzing, assessing and developing a plan—and is mandatory for all commonwealth agencies.The audited agencies include Australian Customs Service, Australian Federal Police, Australian Radiation Protection and Nuclear Safety Agency, Department of Education and Workplace Relations, Department of Industry, Tourism and Resources, and Medicare Australia. None of the agencies has ICT security documentation that complies with the PSM and ACSI 33, and all lack a systematic and coordinated program for ongoing management of ICT security-related risk assessments. Security policies and system security plans are not linked to ICT risk assessments and plans, and the agencies lack system security plans.The ANAO report states agencies have only limited business continuity plans, if at all.“While several of the six agencies had initiated development of business continuity and disaster recovery plans for Internet services, only one had sound plans in place,” the report states.“Two agencies largely depended upon the knowledge of key staff and had few documented procedures. Documents were found in draft form and some plans had not been regularly reviewed.“A majority of the agencies audited had implemented standard operating desktop procedures that did not comply with ACSI 33. Non-compliance was found in inappropriate password management, user account privileges inappropriately administered, no documented procedures for incident detection and response and management of hardware and the use of remote access was not adequately secured.”E-mail filtering in all agencies was found to be inadequate. Only one government agency has sound disaster recovery plans in place. Two agencies were found to depend on the knowledge of key staff, and few agencies have documented procedures. Some documents were left in draft form, and some plans had not been regularly reviewed. The report also recommends the Department of Industry, Tourism and Resources document the coverage of Internet services within business continuity and disaster recovery plans in 2006-07, introduce requirements for documenting benefits versus risk before purchasing new technologies, and review e-mail blocking tools with a view to “improving the blocking of malicious e-mails.”-Michael Crawford, Computerworld Today (Australia)Check out our CIO News Alerts and Tech Informer pages for more updated news coverage. Related content feature Key IT initiatives reshape the CIO agenda While cloud, cybersecurity, and analytics remain top of mind for IT leaders, a shift toward delivering business value is altering how CIOs approach key priorities, pushing transformative projects to the next phase. By Mary Pratt May 30, 2023 10 mins IT Strategy IT Leadership opinion Managing IT right starts with rightsizing IT for value While there are few universals when it comes to saying unambiguously what ‘managing IT right’ looks like, knowing how to navigate the limitless possibilities of IT is surely one. By Thornton May May 30, 2023 6 mins Digital Transformation IT Strategy IT Leadership feature Red Hat embraces hybrid cloud for internal IT The maker of OpenShift has leveraged its own open container offering to migrate business-critical apps to AWS as part of a strategy to move beyond facilitating hybrid cloud for others and capitalize on the model for itself. By Paula Rooney May 29, 2023 5 mins CIO 100 Technology Industry Hybrid Cloud feature 10 most popular IT certifications for 2023 Certifications are a great way to show employers you have the right IT skills and specializations for the job. These 10 certs are the ones IT pros are most likely to pursue, according to data from Dice. By Sarah K. White May 26, 2023 8 mins Certifications Careers Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe