In this section you will find general information on Australian Government Security Vetting Agency (AGSVA) issued security clearances, information for holders of security clearances sponsored by the Department of the Premier and Cabinet, and information on seeking a new clearance or sponsoring of an existing clearance.
- Home
- Protective Security
-
Cyber Security
- SA Cyber Security Strategy
-
South Australian Cyber Security Framework
- SACSF Introduction, Scope and Implementation Approach
- Governance
- Information Security
- Personnel and Physical Security
- SACSF Standard 4.16 - Secure Web Services Standard
- SACSF Standard 18.1 DMARC and Email Security Standard
- SACSF Ruling 2.1 - Offshore Data Storage And Processing
- SACSF Ruling 3 - Tik Tok Use On Government Devices
- SACSF Ruling 4 – Use Of DeepSeek In The South Australian Government
- SACSF Ruling 5 – Kaspersky Lab, Inc. Products and Services
- SACSF Ruling 6 – Implementation of the SACSF V2.0
- SACSF Guideline 1.0 - Executive Guide
- SACSF Guideline 2.0 - Suppliers Using The SACSF
- SACSF Guideline 3.0 - Engaging Suppliers
- SACSF Guideline 4.0 - Cyber Security Incident Reporting
- SACSF Guideline 5.0 - ITSA Role And Responsibilities
- SACSF Guideline 6.0 - Integrity And Availability Classification
- SACSF Guideline 7.0 - Remote Working
- SACSF Guideline 8.0 - Security Risk Management
- SACSF Guideline 9.0 - Essential Eight: Reporting And Use In SA Government
- SACSF Guideline 10.0 - Password Management
- SACSF Guideline 11.0 - Vulnerability Management And Patching
- SACSF Guideline 12.0 - Vulnerability Disclosure Program Implementation
- SACSF Guideline 13.0 - Cyber Security When Travelling Overseas
- SACSF Guideline 14.0 - Employees Based Offshore
- SACSF Guideline 15.0 - Logging And Monitoring
- SACSF Guideline 16.0 - Privileged Access Management
- SACSF Guideline 17.0 - Internet Of Things Security
- SACSF Guideline 18.0 - Cloud Security
- SACSF Guideline 19.0 Cyber Security Awareness and Training
- Cyber Crisis Emergency Management
- Report a Security Vulnerability
- Resources
- National Security
- Reporting a Security Incident
- Security clearances
- Contacts
- Glossary