Policy
- Security risks can arise through the procurement of goods and services and effective risk management is required to reduce the likelihood and consequence of security issues or incidents.
- This policy supports the South Australian Government’s procurement requirements [1] which detail how agencies procure goods and services. The requirements of this policy seek to ensure security risk is a considered element in all procurement processes.
[1] The South Australian Procurement Framework consists of Treasurer's Instruction 18, the Procurement Governance Policy, and supporting policies that set the minimum requirements for each key procurement activity (planning, sourcing and contract management).The Framework is designed to empower public authorities to engage with industry, clients and communities to innovate and take balanced risks to pursue better outcomes.
Manage any security risks that arise from the procurement of goods and services
- To ensure any security risks that arise from the procurement of goods and services are managed, agencies [2] must:
- identify and mitigate security risks to the agency’s people, information and assets generated by the procurement
- ensure relevant security terms and conditions are included in contracts and service agreements that mange identified security risks to the procurement
- manage and monitor:
- security risks for changes or incidents that could affect the procurement, service agreement or security of the agency
- the performance of the contractor (including subcontractors) over the lifetime of the contract
- implement appropriate security arrangements to manage the completion or termination of a contract or agreement
Guidance
- The overall value of a procurement can be significantly reduced by negative security outcomes. Agencies remain responsible for identifying, managing and mitigating security risks when the provision of goods and services is outsourced.
- While an agency must manage any security risks, contractors play an important part in identifying, managing and mitigating those risks.
- The South Australian Governments procurement requirements mandate that risks to the procurement must be identified, managed and monitored. This policy mandates that protective security risks are specifically considered within that same process.
- If security risks identified in procurement processes cannot be mitigated to an acceptable level, or the risks to government or the agency are too great, agencies should seek alternate procurement arrangements and record any decisions to do so. This includes where a security risk cannot be quantified or is too complex to be calculated.
Understanding risks, threats or vulnerability to procurement
- If an agency does not understand or appreciate the risks associated with a procurement, they will not be able to identify appropriate risk treatments. For example, cloud technologies may seem more affordable and faster, however, specific contract clauses or operational controls might be required if that contractor stores information in a foreign country.
- Table 1 provides some examples of potential risks associated with procuring goods and services:
Table 1 – Potential risks associated with procurement
Risk type | Risk description |
---|---|
Insider threat |
|
Supply chain |
|
Foreign involvement |
|
Differences in legal and business cultures |
|
Multiple legal jurisdictions |
|
- Agencies should consider and seek to identify security risks that could affect or be caused by:
- the state or national interest
- risks to critical infrastructure (agency-specific, South Australian and national critical infrastructure)
- risks to people transacting with the agency via a contractor (or subcontractor)
- the ability to maintain control of information or resources that are outsourced, offshore or supply chain arrangement with potentially changing legal frameworks
- foreign involvement
- insider threat
- South Australian Government agencies or other entities
- agency security plans
- Relevant security provisions and associated protections must be included in contracts or service agreements. The benefit of ensuring security terms and conditions are identified means they are legally enforceable.
- Agencies should do this by including terms and conditions in their procurement documents [3] relating to:
- imposing appropriate information, physical and personnel security requirements
- identified security risks relevant to the procurement
- ongoing management of security risks and any proposed risk treatments
- Table 2 outlines some of the recommended terms and conditions to be included.
Table 2 - Recommended terms and conditions
Security domain | Terms and conditions |
---|---|
Governance | Governance arrangements include provision for agencies to:
That require the primary contractor to:
|
Information |
Office of the Chief Information Officer Department of the Premier and Cabinet P: 1300 244 168 |
Personnel |
|
Physical |
|
[3] Such as requests for tender and subsequent contracts
- Good contract management includes oversight and review to ensure adherence to all essential security requirements and enable new or changing security risks to be identified.
- Agencies must monitor any contract for changes to the identified risks, threats, vulnerabilities or criticalities as well as the performance of the contractor in complying with the terms and conditions over the lifetime of the contract. Agencies should identify an appropriate contract manager to be responsible for managing and monitoring each contract.
- If an agency’s risks are subject to regular change (e.g. internal or external security environment changes), a flexible approach to contracts and their management may be required. As such it is recommended that agencies:
- develop positive working relationships with contractors based on open communication to help issues be resolved efficiently and effectively
- ensure contractors (including subcontractors) effectively communicate security risks to their employees and all relevant security terms and conditions of the contract that must be followed
- inspect any premises of the contractor (including subcontractors) prior to the contract commencing to verify that protective security measures have been applied to the standard required by the contract, and then reinspect periodically during the contract for any changes and overall compliance
- ensure all contractor personnel requirements have been achieved or obtained, such as:
- security clearances and clearance maintenance requirements
- legislative or policy requirements
- conflicts of interest
- confidentiality or non-disclosure agreements
- test and monitor (through site visits and audits) the contractor’s processes for handling and storing the agency’s information. Where required, seek access to vulnerability and risk assessments, business continuity plans and security threat advice that could affect the security of contract or information
- Security arrangements governing the completion or termination of contracts helps to prevent the compromise of official government information and damage to the agency. Agencies must put in place arrangements to securely manage the completion or termination of all contracts.
- It is recommended that at the completion of a contract, agencies:
- recover all information (electronic and hard-copy) and assets under the control of the contractor (or ensure the contractor maintains all security measures if for legal reasons the information or assets cannot be returned)
- require the contractor to delete all agency information on the contractors ICT systems [4]
- ensure sponsorship of any security clearances is removed and the authorised vetting agency notified (see SAPSF policy Employee separation for more details)
- obtain formal acknowledgement from contractors and their employees of their continuing obligations to maintain confidentiality.
[4] If security classified information (PROTECTED or above) was held, destruction must be as per the requirements of the South Australian Cyber Security Framework (PDF, 553.6 KB) or the Commonwealth Information Security Manual
Approved by: Chief Executive, Department of the Premier and Cabinet | Date of first approval: 20 April 2020 |
Revision number: 2.0 | Date of review: 30 November 2022 |
Next review date: December 2024 Division: Security and Emergency Management, Intergovernmental and Diplomatic Relations | contact: sapsf@sa.gov.au |
Change log
Version | Date | Changes |
---|---|---|
1.0 | 20/04/2020 | First issue of policy |
1.1 | 21/08/2020 | Definition of ‘personnel’ updated |
1.2 | 2/11/2020 | Footnote 1 updated regarding the Procurement Policy Framework |
2.0 | 30/11/2022 | Table 2 – Recommended terms and conditions updated: Reference to SACSF Ruling 2 regarding outsourcing and offshoring of ICT arrangement added |