APRA Prudential Standard CPS 234 OUTSOURCING GUIDANCE
The Australian Prudential Regulation Authority (“APRA”) has issued APRA Prudential Standard CPS 234 Information Security (“CPS 234”) to ensure that APRA-regulated entities – including superannuation funds, banks, and insurance companies – meet certain minimum standards to develop and maintain their information security capabilities. CPS 234 requires APRA-regulated entities to
- clearly define information security related roles and responsibilities
- maintain an information security capability commensurate with the size and extent of threats to their information assets
- implement controls to protect information assets and undertake regular testing and assurance of the effectiveness of controls; and
- promptly notify APRA of material information security incidents.
CPS 234 also describes certain due diligence obligations for an APRA-regulated entity where the entity is outsourcing the management of its information assets to a third party. This page describes each of the relevant CPS 234 regulatory obligations and provides commentary to help APRA-regulated entities assess and evaluate each CPS 234 requirement in the context of Atlassian’s Cloud Products and ensure they are complying with their obligations under CPS 234.
| Framework reference | Atlassian Commentary | |
---|---|---|---|
1. | Framework reference Information security capability | ||
2. | Framework reference 15. An APRA-regulated entity must maintain an information security capability commensurate with the size and extent of threats to its information assets, which enables the continued sound operation of the entity | Atlassian Commentary This is a customer consideration. Please see row 3 for information on Atlassian’s security capabilities. | |
3. | Framework reference 16. Where information assets are managed by a related party or third party, the APRA-regulated entity must assess the information security capability of that party, commensurate with the potential consequences of an information security incident affecting those assets. | Atlassian Commentary As a provider of Cloud Products to APRA-regulated entities, Atlassian maintains a robust information security program commensurate with the size and extent of the threats we face. We have made available several resources that provide details regarding the design, implementation, and operation of Atlassian's information security capability. Ultimately, it is up to APRA-regulated entities to use this information to make an assessment of whether Atlassian's product(s) meet their requirements:
An in-depth description of how we’ve built this can be found on our Atlassian Cloud architecture and the operational practices page. Additionally, as noted in our Atlassian Cloud Security Shared Responsibilities white paper, customers may review our Cloud Security Alliance (CSA) STAR questionnaire, which includes answers to more than 300 questions included in the Consensus Assessments Initiative Questionnaire (CAIQ).An in-depth description of how we detect and respond to security vulnerabilities can be found in Our Approach to Vulnerability Management. Atlassian follows the vulnerability management processes outlined in ISO 27001 and the Cloud Security Alliance (CSA). When assessing vulnerabilities, we use the Common Vulnerability Scoring System, which helps communicate the severity of vulnerabilities to our customers. Among other processes, Atlassian:
APRA-regulated entities can use this information to evaluate our information security capabilities in line with their information assets stored in Atlassian's products and platforms. | |
4. | Framework reference 17. An APRA-regulated entity must actively maintain its information security capability with respect to changes in vulnerabilities and threats, including those resulting from changes to information assets or its business environment. | Atlassian Commentary APRA-regulated entities can use the resources and information in row 3 to evaluate our information security capabilities in line with their information assets stored in Atlassian's products and platforms. | |
5. | Framework reference Policy framework | ||
6. | Framework reference 18. An APRA-regulated entity must maintain an information security policy framework commensurate with its exposures to vulnerabilities and threats. | Atlassian Commentary This is a customer consideration. For its part, Atlassian has documented an information security policy framework that has been structured to cover the domains included in both the ISO27001 standard as well as the Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM). | |
7. | Framework reference 19. An APRA-regulated entity’s information security policy framework must provide direction on the responsibilities of all parties who have an obligation to maintain information security. | Atlassian Commentary Our Personnel Security policy sets out the general principles and guidelines for personnel security at Atlassian. It highlights that security responsibilities will be outlined in job definitions. Furthermore, each policy in our security policy suite covers more detailed aspects of responsibilities that apply to particular job functions or teams. | |
8. | Framework reference Information asset identification and classification | ||
9. | Framework reference 20. An APRA-regulated entity must classify its information assets, including those managed by related parties and third parties, by criticality and sensitivity. This classification must reflect the degree to which an information security incident affecting an information asset has the potential to affect, financially or non-financially, the entity or the interests of depositors, policyholders, beneficiaries, or other customers. | Atlassian Commentary As Customers are responsible for determining which Atlassian Products to utilize and for what purposes, it is a Customer's responsibility to determine which information assets are managed by Atlassian and classify any such information assets. For its part, Atlassian handles information classification as follows and described in our Data Classification Standard:
| |
10. | Framework reference Implementation of controls | ||
11. | Framework reference 21. An APRA-regulated entity must have information security controls to protect its information assets, including those managed by related parties and third parties, that are implemented in a timely manner and that are commensurate with: (a) vulnerabilities and threats to the information assets; (b) the criticality and sensitivity of the information assets; (c) the stage at which the information assets are within their life cycle; and (d) the potential consequences of an information security incident | Atlassian Commentary Our security practices describe Atlassian's approach to security. We provide details on our approach by:
| |
12. | Framework reference 22. Where an APRA-regulated entity’s information assets are managed by a related party or third party, the APRA-regulated entity must evaluate the design of that party’s information security controls that protects the information assets of the APRA-regulated entity. | Atlassian Commentary Our Vulnerability Management Program, describes Atlassian's approach to detecting and handling security vulnerabilities in our products, including key controls we have in place to protect our customers' information. | |
13. | Framework reference Incident management | ||
14. | Framework reference 23. An APRA-regulated entity must have robust mechanisms in place to detect and respond to information security incidents in a timely manner. | Atlassian Commentary While the obligations in CPS 234 regarding managing security incidents are imposed on APRA-regulated entities, Atlassian recognizes that, where such an entity uses Atlassian products with respect to some or all of its information assets, Atlassian's approach to security incident management is also an important consideration.
Atlassian has a strong track record of timely and proactive notification of security incidents and working with our customers on any necessary mitigations. In our DPA, we commit to informing a customer of any security incident without undue delay and to providing timely information relating to the security incident as it becomes known or as is reasonably requested by the customers to allow them to fulfill their data breach reporting obligations under Applicable Data Protection Law (as defined in the DPA). To the extent customers need this notification for compliance purposes, we encourage them to sign and submit the DPA located here. | |
15. | Framework reference 24. An APRA-regulated entity must maintain plans to respond to information security incidents that the entity considers could plausibly occur (information security response plans). | ||
16. | Framework reference 25. An APRA-regulated entity’s information security response plans must include the mechanisms in place for (a) managing all relevant stages of an incident, from detection to post-incident review; and (b) escalation and reporting of information security incidents to the Board, other governing bodies and individuals responsible for information security incident management and oversight, as appropriate. | ||
17. | Framework reference 26. An APRA-regulated entity must annually review and test its information security response plans to ensure they remain effective and fit for purpose. | ||
18. | Framework reference Testing control effectiveness and internal audit | ||
19. | Framework reference 27. An APRA-regulated entity must test the effectiveness of its information security controls through a systematic testing program. The nature and frequency of the systematic testing must be commensurate with: (a) the rate at which the vulnerabilities and threats change; (b) the criticality and sensitivity of the information asset; (c) the consequences of an information security incident; (d) the risks associated with exposure to environments where the APRA-regulated entity is unable to enforce its information security policies; and (e) the materiality and frequency of change to information assets | Atlassian Commentary The effectiveness of our security controls are tested through multiple external audits and verifications that we undertake. While each Customer is responsible for testing the effectiveness of its own information security controls and escalating any security control deficiencies it discovers in its internal review, Atlassian provides several resources with respect to Atlassian’s own testing program to aid Customers in determining whether their CPS 234 obligations are satisfied. | |
20. | Framework reference 28. Where an APRA-regulated entity’s information assets are managed by a related party or a third party, and the APRA-regulated entity is reliant on that party’s information security control testing, the APRA-regulated entity must assess whether the nature and frequency of testing of controls in respect of those information assets is commensurate with paragraphs 27(a) to 27(e) of this Prudential Standard. | ||
21. | Framework reference 29. An APRA-regulated entity must escalate and report to the Board or senior management any testing results that identify information security control deficiencies that cannot be remediated in a timely manner. | ||
22. | Framework reference 30. An APRA-regulated entity must ensure that testing is conducted by appropriately skilled and functionally independent specialists. | ||
23. | Framework reference 31. An APRA-regulated entity must review the sufficiency of the testing program at least annually or when there is a material change to information assets or the business environment. | ||
24. | Framework reference 32. An APRA-regulated entity’s internal audit activities must include a review of the design and operating effectiveness of information security controls, including those maintained by related parties and third parties (information security control assurance). | ||
25. | Framework reference 33. An APRA-regulated entity must ensure that the information security control assurance is provided by personnel appropriately skilled in providing such assurance | ||
26. | Framework reference 34. An APRA-regulated entity’s internal audit function must assess the information security control assurance provided by a related party or third party where: (a) an information security incident affecting the information assets has the potential to materially affect, financially or non-financially, the entity or the interests of depositors, policyholders, beneficiaries or other customers; and (b) internal audit intends to rely on the information security control assurance provided by the related party or third party. | ||
27. | Framework reference APRA notification | ||
28. | Framework reference 35. An APRA-regulated entity must notify APRA as soon as possible and, in any case, no later than 72 hours, after becoming aware of an information security incident that: (a) materially affected, or had the potential to materially affect, financially or non-financially, the entity or the interests of depositors, policyholders, beneficiaries or other customers; or (b) has been notified to other regulators, either in Australia or other jurisdictions. | Atlassian Commentary Atlassian understands how important it is for you to be notified promptly of any data breach. That is why Atlassian has built out an extensive cross-functional team and process to handle security incidents as described on our Security Incident Management page. | |
29. | Framework reference 36. An APRA-regulated entity must notify APRA as soon as possible and, in any case, no later than 10 business days, after it becomes aware of a material information security control weakness that the entity expects it will not be able to remediate in a timely manner. |