Shauneel Kumar’s Post

View profile for Shauneel Kumar

Head of IRAP Services at Mantel Group. IRAP Assessor, CISSP, CISM, CISA, ISO27001 Senior Lead Auditor, PCI DSS Lead Implementer, RHCSA , GSEC, ITILv4, PRINCE2, SAFe Agile, DOFD, Azure Fundamentals

Building on the below insights from my post, I want to highlight how Home Affairs has digitised its process to ensure that relevant security controls are applied and kept up to date for its numerous ICT systems. This initiative is critical in helping the department meet its Protective Security Policy Framework (PSPF) and Essential Eight obligations. This is a great example of how lessons learned can be effectively implemented for maintaining a central record of all systems and continuous assessment/authorisation of our systems For more details - https://lnkd.in/gMGTkS7W.

View profile for Shauneel Kumar

Head of IRAP Services at Mantel Group. IRAP Assessor, CISSP, CISM, CISA, ISO27001 Senior Lead Auditor, PCI DSS Lead Implementer, RHCSA , GSEC, ITILv4, PRINCE2, SAFe Agile, DOFD, Azure Fundamentals

Sharing some insights from the recent ANAO audit on the security authorisation of ICT systems within the Department of Defence. The findings highlight crucial areas for improvement in our approach to cyber security, which is vital for safeguarding our national interests. Key Findings: - Partly Effective Arrangements: Defence's management of ICT systems security authorisations has been inconsistent, leading to delays and compliance issues. - Policy Deficiencies: Many policies are outdated or internally inconsistent, failing to align with current security requirements. - Defence’s arrangements for system authorisation have not been regularly reviewed and do not reflect current PSPF requirements. - Defence’s reporting did not comply with DSPF requirements, omitted key system authorisation data, and indicated a more optimistic outlook than was reflected in other Defence documentation. - Defence did not comply with the PSPF and DSPF system authorisation requirements for the five case studies examined in the audit. Lessons Learnt and Way Forward applying to all industries - Personal Perspective: 1. Continuous assessment and authorisation of our systems are paramount to ensure they operate securely. It’s not enough to treat these processes as a tick-and-flick exercise; we need ongoing management and active implementation. Establishing a proactive approach to security assessments is crucial to maintaining operational integrity and timely authorisation of systems. 2. We must maintain a central record of all systems because we cannot protect what we don't know about. This visibility is essential for effective risk management and safeguarding our operations. Knowledge is power in cybersecurity. 3. Policy Alignment is Essential: Regularly updating policies to reflect current security standards is vital. Consistency across all sections of the organisation ensures everyone is on the same page and reduces confusion. This alignment should also encompass all applicable laws, regulations and industry standards. 4. Continuous education and awareness for external/internal assessors and personnel is imperative. Cultivating a culture of awareness where employees are encouraged to follow processes, report suspicious activities and understanding their roles in maintaining security. 5. Communication and Collaboration is key to a unified posture for monitoring the status of system authorisations. I hope these insights help shape your security assessment and authorisation processes within your organisations. I’m keen to hear thoughts from others on this paper or more generally about system assessment and authorisations and how we could improve the current processes in place in industry. Your perspectives could contribute to refining our approaches and fostering a stronger security culture. #LessonsLearned #CyberSecurity #Defence #ContinuousImprovement #RiskManagement #Collaboration #CyberSecurity #SecurityAuthorisation #Securityfundamentals #Accountability

To view or add a comment, sign in

Explore topics