Skip to main content

๐Ÿ’ผ Attachment A - Security principles

  • Contextual name: ๐Ÿ’ผ Attachment A - Security principles
  • ID: /frameworks/apra-cpg-234/a
  • Located in: ๐Ÿ’ผ APRA CPG 234

Descriptionโ€‹

Empty...

Similarโ€‹

  • Internal
    • ID: dec-b-e3faf3b8

Sub Sectionsโ€‹

SectionSub SectionsInternal RulesPoliciesFlags
๐Ÿ’ผ 1 APRA envisages that an APRA-regulated entity would adopt a set of high-level information security principles in order to establish a sound foundation for the entityโ€™s information security policy framework. Common information security principles include:10
ย ย ย ย ๐Ÿ’ผ a. implement multiple layers and types of controls such that if one control fails, other controls limit the impact of an information security compromise. This is typically referred to as the principle of โ€˜defence in depthโ€™;
ย ย ย ย ๐Ÿ’ผ b. access to, and configuration of, information assets is restricted to the minimum required to achieve business objectives. This is typically referred to as the principle of โ€˜least privilegeโ€™ and aims to reduce the number of attack vectors that can be used to compromise information security;33
ย ย ย ย ๐Ÿ’ผ c. Timely detection of information security incidents. This minimises the impact of an information security compromise;
ย ย ย ย ๐Ÿ’ผ d. information security is incorporated into the design of the information system asset. This is typically referred to as secure by design;
ย ย ย ย ๐Ÿ’ผ e. use of, and access to, information assets is attributable to an individual, hardware or software, and activity logged and monitored;22
ย ย ย ย ๐Ÿ’ผ f. error handling is designed such that errors do not allow unauthorised access to information assets or other information security compromises;
ย ย ย ย ๐Ÿ’ผ g. assume information assets have an unknown and possibly reduced level of information security control. This is typically referred to as the principle of โ€˜never trust, always identifyโ€™;
ย ย ย ย ๐Ÿ’ผ h. segregation of duties is enforced through appropriate allocation of roles and responsibilities. This reduces the potential for the actions of a single individual to compromise information security;33
ย ย ย ย ๐Ÿ’ผ i. design controls that enforce compliance with the information security policy framework, thereby reducing reliance on individuals;
ย ย ย ย ๐Ÿ’ผ j. design detection and response controls based on the assumption that preventive controls have failed. This is typically referred as the principle of โ€˜assumed breachโ€™.