Search
Unsure of what you're looking for? Go to How to use or contact us.
Search results
Ref:
DES23The Blueprint for Secure Cloud (previously known as the Protected Utility Blueprint) is an online tool to support the design, configuration and deployment of collaborative and secure cloud and…
Ref:
DES107The Cloud Assessment and Authorisation publication is intended for cloud service providers, Infosec Registered Assessors Program (IRAP) assessors and Non-Corporate Commonwealth Entities who…
Ref:
DES15The Cloud Marketplace is a digital sourcing arrangement for cloud computing offerings to government, as managed by the Digital Transformation Agency. The marketplace operates as a cooperative…
Ref:
DES151This publication summarises the meaning of ‘legacy’ information and communications technology (ICT), why it is important to manage the risks associated with it and how to empower ICT teams to…
Ref:
DES150Legacy information communications technology (ICT) presents significant and enduring risks to the cyber security posture of Australian Government entities and organisations. This publication…
Ref:
CAP47IT Service Management refers to monitoring and managing the quality of IT products and services being delivered.
ObjectiveAn objective for this space…
Ref:
CAP32Case Management is the ability to manage the workflow of events to their resolution to meet the needs of individuals or business. This may involve engagement, assessment, planning…
Ref:
CAP25Collaboration and Sharing relates to a set of systems and processes that allow government agency staff to effectively share information and collaborate on…
Ref:
DES154The Australian Privacy Principles guidelines (APP guidelines) outline the mandatory requirements in the Australian Privacy Principles (APPs), the Information Commissioner’s…
Ref:
DES152The Office of the Australian Information Commissioner has developed a Privacy Officer Toolkit to help privacy officers to understand and perform their functions under the Australian…