{"id":72402,"date":"2022-05-06T09:00:04","date_gmt":"2022-05-05T23:00:04","guid":{"rendered":"https:\/\/www.aspistrategist.ru\/?p=72402"},"modified":"2022-07-11T17:02:12","modified_gmt":"2022-07-11T07:02:12","slug":"securing-northern-australias-critical-infrastructure-against-cyberattacks","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/securing-northern-australias-critical-infrastructure-against-cyberattacks\/","title":{"rendered":"Securing northern Australia\u2019s critical infrastructure against cyberattacks"},"content":{"rendered":"
<\/figure>\n

The strategic importance of northern Australia within the broader defence and national security framework has been well articulated and widely acknowledged. Related to this is the significant role critical national infrastructure plays in supporting defence capabilities. However, digital communication technologies have changed the threat landscape in which critical national infrastructure providers operate and, in turn, placed Australia\u2019s national security at risk.<\/p>\n

Critical national infrastructure encompasses any capability, network or facility that, if compromised, would threaten Australia\u2019s security. The development of critical national infrastructure across Australia\u2019s north offers the federal government an opportunity to proactively work with private-sector providers of critical national infrastructure on cybersecurity. Such efforts are necessary in ensuring supply-chain relationships and vulnerabilities are well identified, understood and addressed.<\/p>\n

The government\u2019s 2020 defence strategic update<\/a> made clear that Australia\u2019s defence organisation needs to be prepared for conflict in the increasingly contested Indo-Pacific and cannot rely on the luxury of a 10-year warning period. The development of defence capabilities and critical national infrastructure in the north reflects this thinking. Earlier this year, the government announced<\/a> an additional $2 billion in funding for the Northern Australia Infrastructure Facility, on top of the $5 billion already committed. The increased support is aimed at bolstering the government\u2019s targeted growth plan<\/a> for the north, which recognises that investment in critical national infrastructure is necessary in the protection of Australia\u2019s national security.<\/p>\n

The investment reflects the findings of the government\u2019s 2015 audit<\/a> of infrastructure in northern Australia, which identified substantial gaps in infrastructure to support sustained regional growth, provide adequate service standards and achieve cost-effective practices\u2014all of which weaken Australia\u2019s overall northern defence posture.<\/p>\n

The supply-chain implications of a cyberattack on a critical infrastructure provider are acknowledged in the amendments to the Security of Critical Infrastructure Act 2018 <\/em>(SOCI Act) enacted in December 2021 and March 2022. The first tranche of amendments identifies 11 critical infrastructure sectors<\/a> that, if subject to a cybersecurity incident, could threaten national security due to relationships with other capabilities critical to national defence.<\/p>\n

Northern Australia is home to only 5.6% of Australia\u2019s population, but it is a significant contributor to major critical national infrastructure industries. Around 70% of the nation\u2019s known resources<\/a> of iron ore, zinc and lead are located in the region, as well as 64% of the nation\u2019s beef cattle herd and approximately 94% of both banana and mango crops. Infrastructure in northern Australia is therefore vital to the nation\u2019s overall economic performance and food security, as well as key in supporting the immediate needs of local communities and defence facilities in the region.<\/p>\n

Last year\u2019s cyberattack on meat-processing company JBS Foods<\/a> demonstrated the supply-chain consequences of a cyberattack on an Australian-based critical national infrastructure provider. The five-day attack disrupted food supply operations across all JBS Foods\u2019 global locations, including Australia, despite the attack occurring offshore. If a similar attack were to occur on northern critical national infrastructure, such as gas providers or water- and sewage-processing plants, the flow-on effects for defence bases reliant on their services could create significant disruption.<\/p>\n

While cybersecurity is clearly a necessary protection for northern critical infrastructure providers, challenges exist in its implementation. The amendments to the SOCI Act represent an important attempt to define industries relevant to national security and implement cyber reporting standards. However, private-sector industry providers have expressed concerns<\/a> about the level of interference the government can exercise. Under the amendments, the government has the power to install its own security software and \u2018access, add, restore, copy, alter or delete data\u2019 at its discretion.<\/p>\n

Aside from privacy concerns, the SOCI amendments reflect an attempt at a one-size-fits-all approach to cybersecurity for critical national infrastructure. This aspect arguably helps to manage the hard reality that critical infrastructure providers, particularly in northern Australia, face significant skills shortages<\/a> and a lack of experienced specialists to handle sophisticated cyberattacks.<\/p>\n

However, the legislation fundamentally fails to recognise the cyber complexities and nuanced characteristics of different industries, as well as the diversity of cyberattacks they might experience. This remains true despite the announcement<\/a> of the Security Legislation Amendment (Critical Infrastructure Protection) Bill in April. The proposed legislation builds on the SOCI Act by implementing a risk management program and imposing new cybersecurity obligations for \u2018systems of national significance\u2019 in recognition of their critical importance to national security and the unique cyber threats they face.<\/p>\n

While these proposed changes are a promising step towards the implementation of cyber threat intelligence and preparedness against known risks to critical infrastructure providers, their effectiveness is unproven. It\u2019s highly likely that further policy action will be required, and opportunities for policy tailored to the unique role of northern Australia\u2019s critical national infrastructure should be sought.<\/p>\n

Critical infrastructure providers such as water- and sewage-processing plants, gas supply facilities and electricity providers typically use supervisory control and data acquisition, or SCADA, systems, which were not originally designed to be connected to the internet. However, as technology has evolved, these systems have been integrated with advanced communication technology that enables remote operation and monitoring; essentially, they are no longer closed-circuit systems and are vulnerable to a wide range of cyberattacks.<\/p>\n

The process of patching vulnerabilities in these systems is difficult and, if possible, avoided due to the difficulties associated with switching to back-up systems and the risk of disrupting their activities.<\/p>\n

The uniqueness of each critical infrastructure provider in both its internal functioning and its relationship with the broader defence system is therefore a considerable challenge when implementing a national cybersecurity strategy. In this light, there are benefits in encouraging the adoption of a \u2018security convergent\u2019 approach within each provider. Security convergence is an approach that holistically considers all security domains and creates greater internal awareness about how vulnerabilities are related. Logical integration of security functions, processes and objectives across traditionally separate domains will better protect critical infrastructure supply-chain relationships, thus strengthening Australia\u2019s national security.<\/p>\n

With these challenges in mind, the government should seek to incorporate convergent and cybersecurity development, training and practices into its northern infrastructure investment activities. The opportunity to ensure the security standards necessary to protect northern Australia\u2019s critical national infrastructure should not be overlooked, particularly as the increased development efforts create a similar opportunity to understand and review unique relationships between critical infrastructure and Australia\u2019s defence capabilities.<\/p>\n

Cyberattacks are likely sources of aggression that could have major physical consequences if not properly accounted for in the development of critical infrastructure in northern Australia. Patchwork security arrangements are not adequate in supporting national defence; however, neither is the carte blanche cybersecurity response in the new legislation. Instead, a hybrid and convergent approach that considers the security network at large is required and deserves further discussion.<\/p>\n","protected":false},"excerpt":{"rendered":"

The strategic importance of northern Australia within the broader defence and national security framework has been well articulated and widely acknowledged. Related to this is the significant role critical national infrastructure plays in supporting defence …<\/p>\n","protected":false},"author":1549,"featured_media":72403,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[1395,391,713,1005],"class_list":["post-72402","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-critical-infrastructure","tag-cyber","tag-cyberattack","tag-northern-australia","dinkus-north-of-26-south"],"acf":[],"yoast_head":"\nSecuring northern Australia\u2019s critical infrastructure against cyberattacks | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/securing-northern-australias-critical-infrastructure-against-cyberattacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Securing northern Australia\u2019s critical infrastructure against cyberattacks | The Strategist\" \/>\n<meta property=\"og:description\" content=\"The strategic importance of northern Australia within the broader defence and national security framework has been well articulated and widely acknowledged. Related to this is the significant role critical national infrastructure plays in supporting defence ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/securing-northern-australias-critical-infrastructure-against-cyberattacks\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-05T23:00:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-07-11T07:02:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2022\/05\/cyber050522.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"802\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Bronte Munro\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bronte Munro\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/securing-northern-australias-critical-infrastructure-against-cyberattacks\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2022\/05\/cyber050522.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2022\/05\/cyber050522.jpg\",\"width\":1200,\"height\":802},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/securing-northern-australias-critical-infrastructure-against-cyberattacks\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/securing-northern-australias-critical-infrastructure-against-cyberattacks\/\",\"name\":\"Securing northern Australia\u2019s critical infrastructure against cyberattacks | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/securing-northern-australias-critical-infrastructure-against-cyberattacks\/#primaryimage\"},\"datePublished\":\"2022-05-05T23:00:04+00:00\",\"dateModified\":\"2022-07-11T07:02:12+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/9df9030fda28522230f2dd82435595a2\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/securing-northern-australias-critical-infrastructure-against-cyberattacks\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/securing-northern-australias-critical-infrastructure-against-cyberattacks\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/securing-northern-australias-critical-infrastructure-against-cyberattacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Securing northern Australia\u2019s critical infrastructure against cyberattacks\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/9df9030fda28522230f2dd82435595a2\",\"name\":\"Bronte Munro\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f84f65209d19f66d47e769a5d2acacb1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f84f65209d19f66d47e769a5d2acacb1?s=96&d=mm&r=g\",\"caption\":\"Bronte Munro\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/bronte-munro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Securing northern Australia\u2019s critical infrastructure against cyberattacks | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/securing-northern-australias-critical-infrastructure-against-cyberattacks\/","og_locale":"en_US","og_type":"article","og_title":"Securing northern Australia\u2019s critical infrastructure against cyberattacks | The Strategist","og_description":"The strategic importance of northern Australia within the broader defence and national security framework has been well articulated and widely acknowledged. Related to this is the significant role critical national infrastructure plays in supporting defence ...","og_url":"https:\/\/www.aspistrategist.ru\/securing-northern-australias-critical-infrastructure-against-cyberattacks\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2022-05-05T23:00:04+00:00","article_modified_time":"2022-07-11T07:02:12+00:00","og_image":[{"width":1200,"height":802,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2022\/05\/cyber050522.jpg","type":"image\/jpeg"}],"author":"Bronte Munro","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Bronte Munro","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/securing-northern-australias-critical-infrastructure-against-cyberattacks\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2022\/05\/cyber050522.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2022\/05\/cyber050522.jpg","width":1200,"height":802},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/securing-northern-australias-critical-infrastructure-against-cyberattacks\/","url":"https:\/\/www.aspistrategist.ru\/securing-northern-australias-critical-infrastructure-against-cyberattacks\/","name":"Securing northern Australia\u2019s critical infrastructure against cyberattacks | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/securing-northern-australias-critical-infrastructure-against-cyberattacks\/#primaryimage"},"datePublished":"2022-05-05T23:00:04+00:00","dateModified":"2022-07-11T07:02:12+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/9df9030fda28522230f2dd82435595a2"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/securing-northern-australias-critical-infrastructure-against-cyberattacks\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/securing-northern-australias-critical-infrastructure-against-cyberattacks\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/securing-northern-australias-critical-infrastructure-against-cyberattacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Securing northern Australia\u2019s critical infrastructure against cyberattacks"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/9df9030fda28522230f2dd82435595a2","name":"Bronte Munro","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f84f65209d19f66d47e769a5d2acacb1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f84f65209d19f66d47e769a5d2acacb1?s=96&d=mm&r=g","caption":"Bronte Munro"},"url":"https:\/\/www.aspistrategist.ru\/author\/bronte-munro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/72402"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/1549"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=72402"}],"version-history":[{"count":4,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/72402\/revisions"}],"predecessor-version":[{"id":73756,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/72402\/revisions\/73756"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/72403"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=72402"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=72402"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=72402"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}