This policy describes the requirements for entities planning digital investments involving application security considerations.
Applicability
Digital...
Permissions systems facilitate efficiency, consistency and a seamless workflow across entities responsible for secure access. Unique business needs...
The permissions policy is essential for evaluating and recording who can access specific government information, systems or resources, and enabling...
As a trusted custodian of sensitive information, the Australian Government is required to ensure the safety and security of its operations. The...
The information asset security policy provides whole-of-government guidance on safeguarding government information assets from unauthorised access,...
The gov.au domain administration system provides a framework, policies, and guidance on eligibility and allocation of gov.au domain names, how...
This standard applies to all uses of the gov.au domain for web resources, including third level domains at the Australian Government level (e.g....
FinOps Foundation Framework is a structured operational approach and cultural practice aimed at optimising the business benefits of cloud computing....
Direct link: https://help.tenders.gov.au/getting-started-with-austender/central-procurement-systems-enhancements/criis/Responsible agency:...
The framework aims to provide Aboriginal and Torres Strait Islander people greater agency over how their data are governed within the Australian...