{"id":75204,"date":"2022-09-16T14:15:25","date_gmt":"2022-09-16T04:15:25","guid":{"rendered":"https:\/\/www.aspistrategist.ru\/?p=75204"},"modified":"2022-09-16T13:52:23","modified_gmt":"2022-09-16T03:52:23","slug":"enhancing-cyber-capabilities-through-aukus","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/enhancing-cyber-capabilities-through-aukus\/","title":{"rendered":"Enhancing cyber capabilities through AUKUS"},"content":{"rendered":"
<\/figure>\n

The AUKUS pact is an important piece of regional architecture that has the potential to operate as a technology accelerator<\/a> to strengthen security and stability in the Indo-Pacific. It seeks to do this by enhancing joint technical capabilities and interoperability among Australia, the UK and the US. \u2018Advanced capabilities\u2019 is a secondary focus of AUKUS after nuclear-powered submarines, but it is an equally important part of this new partnership to develop a technological edge<\/a>.<\/p>\n

Australia, the UK and the US are like-minded countries whose relationship is underpinned by a strong security partnership, shared values and a long history of trust. This gives AUKUS particular advantages to be able to achieve outcomes that might be more difficult for other and larger groupings, even strong intelligence-sharing alliances such as the Five Eyes. But for AUKUS to bring about greater collaboration and deeper interoperability, its three members will need to bring their similar (though not necessarily interoperable) people, processes and technology into alignment where it is appropriate and safe to do so.<\/p>\n

\u2018Advanced cyber\u2019\u2014one of AUKUS\u2019s technology priorities<\/a>\u2014is a focus area that presents short- and medium-term opportunities to build connections and lay the groundwork for some of the longer-term AUKUS technology objectives. This work can and should be carried out simultaneously while the submarines component of AUKUS progresses. But what\u2019s missing are practical proposals for harnessing these opportunities.<\/p>\n

Having common cyber-related standards among the AUKUS members, for example, is a relatively low-cost, high-value way to contribute to AUKUS technology objectives and provide a pathway to greater interoperability and efficiency, especially if it builds on existing programs. One low-risk initiative that would enhance capability and interoperability and improve cyber resilience in the digital supply chain is aligning digital skills training. Another is harmonising cybersecurity accreditations. A medium-term opportunity that would benefit both the digital and physical supply chains would be defining a set of \u2018AUKUS-assured capabilities\u2019. Fourth, a long-term project could be to use the AUKUS partnership as a vehicle to foster technology relationships in the Indo-Pacific.<\/p>\n

AUKUS is understandably defence focused\u2014a narrow scope that will allow it to better carry out its objectives. But cyber, like many of the other critical technologies, isn\u2019t confined to the military and intelligence domains. The expertise and support needed for both offensive cyber actions and the defence of digital assets and equities will require the involvement of industry, academia and citizens. Outcomes that benefit these entities will therefore also support and contribute to AUKUS\u2019s technology objectives.<\/p>\n

A digital skills uplift could leverage defence force training and private-sector expertise to improve not only the cyber skills of defence personnel but also the cyber resilience of the defence digital supply chain\u2014the third parties that service and support the defence organisation, such as defence industry, defence suppliers and critical infrastructure providers.<\/p>\n

The harmonisation of similar cybersecurity protection standards and assurance practices among AUKUS countries\u2014such as between Australia\u2019s IRAP<\/a> (Infosec Registered Assessors Program) and the US\u2019s FedRAMP<\/a> (Federal Risk and Authorization Management Program) systems\u2014would open up greater and more timely choices for the public sector. AUKUS suppliers would also benefit from the resulting cost and resource efficiencies and a deepening of markets.<\/p>\n

Markets thrive on certainty. AUKUS should look to define a set of assured capabilities to bolster critical supply chains. These would be capabilities or components of mutual benefit that could be unilaterally or jointly developed by AUKUS partners, but with assured availability to all AUKUS countries. Because the development of such capabilities would likely involve the private sector, clarity about which cyber capabilities (products, services, components, and so on) are critical and of national significance will help provide guidance on the direction of private investment in research, development and commercialisation efforts, as well as viable international collaboration partners.<\/p>\n

Finally, a collective of countries beyond the AUKUS partners will be needed to meet the modern technology and security challenges in the Indo-Pacific now and in the future. While it might not be an immediate priority, down the track AUKUS could be used as a vehicle to foster some of these relationships. One way in which AUKUS could gain legitimacy and credibility among Southeast Asian nations over the coming years would be to provide both digital and non-digital public goods<\/a> that help improve regional prosperity and security. Such efforts could include technology knowledge diffusion, ensuring the benefits of technology reach across entire economies.<\/p>\n

The AUKUS countries have much they can learn from and share with the region in cyber and critical technologies, from e-safety and digital inclusion to next-generation mobile wireless and artificial intelligence. Cultivation of these relationships will, however, often require an individualised approach, including different investments in different countries.<\/p>\n

The region\u2019s nations are a diverse group, with different priorities and views on cyber norms, standards and regulations. But as a group, AUKUS members will be better positioned to support the region as it seeks to make a post-Covid-19 technology step-up.<\/p>\n","protected":false},"excerpt":{"rendered":"

The AUKUS pact is an important piece of regional architecture that has the potential to operate as a technology accelerator to strengthen security and stability in the Indo-Pacific. It seeks to do this by enhancing …<\/p>\n","protected":false},"author":1100,"featured_media":75206,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[3111,1395,391,332],"class_list":["post-75204","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-aukus","tag-critical-infrastructure","tag-cyber","tag-technology"],"acf":[],"yoast_head":"\nEnhancing cyber capabilities through AUKUS | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/enhancing-cyber-capabilities-through-aukus\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Enhancing cyber capabilities through AUKUS | The Strategist\" \/>\n<meta property=\"og:description\" content=\"The AUKUS pact is an important piece of regional architecture that has the potential to operate as a technology accelerator to strengthen security and stability in the Indo-Pacific. It seeks to do this by enhancing ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/enhancing-cyber-capabilities-through-aukus\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-16T04:15:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-09-16T03:52:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2022\/09\/cyber160922.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"801\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jocelinn Kang\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jocelinn Kang\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/enhancing-cyber-capabilities-through-aukus\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2022\/09\/cyber160922.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2022\/09\/cyber160922.jpg\",\"width\":1200,\"height\":801},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/enhancing-cyber-capabilities-through-aukus\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/enhancing-cyber-capabilities-through-aukus\/\",\"name\":\"Enhancing cyber capabilities through AUKUS | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/enhancing-cyber-capabilities-through-aukus\/#primaryimage\"},\"datePublished\":\"2022-09-16T04:15:25+00:00\",\"dateModified\":\"2022-09-16T03:52:23+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/341d1ce2f1a835c9ebcb1d13a21e21e2\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/enhancing-cyber-capabilities-through-aukus\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/enhancing-cyber-capabilities-through-aukus\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/enhancing-cyber-capabilities-through-aukus\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Enhancing cyber capabilities through AUKUS\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/341d1ce2f1a835c9ebcb1d13a21e21e2\",\"name\":\"Jocelinn Kang\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e65b9e7b0bdec9c4f3380d2709fbd30f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e65b9e7b0bdec9c4f3380d2709fbd30f?s=96&d=mm&r=g\",\"caption\":\"Jocelinn Kang\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/jocelinn-kang\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Enhancing cyber capabilities through AUKUS | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/enhancing-cyber-capabilities-through-aukus\/","og_locale":"en_US","og_type":"article","og_title":"Enhancing cyber capabilities through AUKUS | The Strategist","og_description":"The AUKUS pact is an important piece of regional architecture that has the potential to operate as a technology accelerator to strengthen security and stability in the Indo-Pacific. It seeks to do this by enhancing ...","og_url":"https:\/\/www.aspistrategist.ru\/enhancing-cyber-capabilities-through-aukus\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2022-09-16T04:15:25+00:00","article_modified_time":"2022-09-16T03:52:23+00:00","og_image":[{"width":1200,"height":801,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2022\/09\/cyber160922.jpg","type":"image\/jpeg"}],"author":"Jocelinn Kang","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Jocelinn Kang","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/enhancing-cyber-capabilities-through-aukus\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2022\/09\/cyber160922.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2022\/09\/cyber160922.jpg","width":1200,"height":801},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/enhancing-cyber-capabilities-through-aukus\/","url":"https:\/\/www.aspistrategist.ru\/enhancing-cyber-capabilities-through-aukus\/","name":"Enhancing cyber capabilities through AUKUS | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/enhancing-cyber-capabilities-through-aukus\/#primaryimage"},"datePublished":"2022-09-16T04:15:25+00:00","dateModified":"2022-09-16T03:52:23+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/341d1ce2f1a835c9ebcb1d13a21e21e2"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/enhancing-cyber-capabilities-through-aukus\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/enhancing-cyber-capabilities-through-aukus\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/enhancing-cyber-capabilities-through-aukus\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Enhancing cyber capabilities through AUKUS"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/341d1ce2f1a835c9ebcb1d13a21e21e2","name":"Jocelinn Kang","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e65b9e7b0bdec9c4f3380d2709fbd30f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e65b9e7b0bdec9c4f3380d2709fbd30f?s=96&d=mm&r=g","caption":"Jocelinn Kang"},"url":"https:\/\/www.aspistrategist.ru\/author\/jocelinn-kang\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/75204"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/1100"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=75204"}],"version-history":[{"count":5,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/75204\/revisions"}],"predecessor-version":[{"id":75220,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/75204\/revisions\/75220"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/75206"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=75204"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=75204"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=75204"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}