09 May 2022
Despite a complex legislative history, the amendments to the Security of Critical Infrastructure Act 2018 (Cth) (SOCI Act) have now been finalised (subject to the ongoing development of a number of ‘Rules’, which play an important role in determining the application and also determining certain operational details of the SOCI Act).
Amongst other things, the SOCI Act’s extended operation imposes three key obligations on entities responsible for critical infrastructure assets. Our previous article provides an overview of the legislative history of these reforms and some of the key provisions.
These amendments have wide-reaching implications for numerous sectors, and organisations that are subject to the SOCI Act have a number of immediate steps to take to ensure that they are ready to comply with the ‘positive security obligations’ (described below) as compliance becomes mandatory in the coming months.
The sectors and asset classes that fall within the SOCI Act have been significantly expanded. Australia’s critical infrastructure regime now encompasses 11 broadly framed sectors and 22 critical infrastructure asset classes. The sectors are:
Generally, the definition of ‘critical infrastructure assets’ is determined by reference to specific infrastructure that is core to each sector. Most obligations apply to the ‘responsible entity’ which owns or operates the critical infrastructure asset. ‘Direct interest holders’ (those entities which hold an interest of at least 10% in a critical infrastructure asset or influence or control the asset) may also have obligations under the SOCI Act.
Source: Department of Home Affairs and the Cyber and Infrastructure Security Centre.
Following the Security of Critical Infrastructure (Application) Rules (Application Rules) taking effect on 8 April 2022, two of the three positive security obligations now apply for certain of the newly included asset classes. Not all sectors or asset classes have had these obligations ‘switched on’. Home Affairs has been in contact with entities in the asset classes about the Application Rules and their applicability to those entities, and we expect it will continue to do so with entities in the impacted sectors.
The third obligation to establish and comply with a risk management program will apply once the Risk Management Program Rules are registered. The Department of Home Affairs has released a policy document setting out the proposed Risk Management Program Rules. However, the final draft of these Rules has not been released. Once published, the draft Risk Management Program Rules will be subject to a mandatory consultation period of 28 days.
1. Report information to the Register of Critical Infrastructure Assets. Reporting entities (either a responsible entity or a direct interest holder) must provide interest, control and operational information to the Cyber and Infrastructure Security Centre. This register will not be publically available. Following the Application Rules taking effect, this obligation applies to a defined list of critical asset classes, but a six month ‘grace period’ means that compliance is not compulsory until 8 October 2022. Non-compliance can result in a maximum penalty of 50 penalty units (currently $11,100).
2. Mandatory cyber security incident notification requirements. The Application Rules also ‘switched on’ the mandatory cyber incident reporting obligations for certain critical asset classes, subject to a three month ‘grace period’. From 8 July 2022, this obligation requires that:
A ‘significant impact’ is one which has materially disrupted the availability of essential goods or services provided by the asset (or as otherwise specified in sector-specific rules, which have not yet been developed). A ‘relevant impact’ is any other impact on the availability, integrity, reliability or confidentiality of the asset. Non-compliance can result in a maximum penalty of 50 penalty units (currently $11,100).
3. Risk management program. The Risk Management Program Rules will ‘switch on’ the obligation for responsible entities to establish, maintain and comply with a risk management program that manages and mitigates prescribed risks associated with its critical infrastructure assets. It is anticipated that the Risk Management Program Rules will not apply to all asset classes (for example, if the Government forms the view that there would be regulatory overlap with other regimes applicable to the sector which already place obligations on the management of relevant risks). Once these Rules are enacted, there will be a six month grace period for compliance. A risk management program must:
Failing to adopt, maintain or comply with a critical infrastructure risk management program can result in a maximum penalty of 200 penalty units (currently $44,400).
The SOCI Act also now includes additional government powers which are seen by the Australian Government as being vital for maintaining the security of Australia’s critical infrastructure. In particular, from December 2021, the Government can exercise the following powers to respond to a cyber security incident that is affecting a critical infrastructure asset:
The Government may also privately declare a critical infrastructure asset (which may potentially comprise the whole or a large component of the business of an entity) to be a System of National Significance (SoNS). Once declared as forming part of a SoNS, the Government may then provide a written notice requiring the relevant responsible entity for the SoNS to comply with the following enhanced cyber security obligations:
Responsible entities will be specifically notified and consulted with by the Government if these additional powers are exercised in respect of their critical infrastructure assets.
There are a number of immediate steps to be taken by organisations that may be impacted by the SOCI Act, including:
Authors
Partner
Head of Technology, Media and Telecommunications
Partner
Special Counsel
Law Graduate
Tags
This publication is introductory in nature. Its content is current at the date of publication. It does not constitute legal advice and should not be relied upon as such. You should always obtain legal advice based on your specific circumstances before taking any action relating to matters covered by this publication. Some information may have been obtained from external sources, and we cannot guarantee the accuracy or currency of any such information.
Head of Technology, Media and Telecommunications