Skip to main content
Australian Government Architecture
Search
Header menu
Home
Purpose of the AGA
Explore the AGA
How to use
Contact
Monitoring - Artificial Intelligence
Establish monitoring and reporting systems and processes to measure performance and other issues relating to the technologies
Governance and Risk Management
Ensure that there are appropriate Biometrics governance and risk management frameworks in place during the implementation phase of the technology...
Business Outcomes
Ensure application of the technologies business outcomes
Mainframe policy: Utilise the appropriate whole-of-government procurement contract
Utilise the appropriate whole-of-government procurement contract All mainframe infrastructure and services must be purchased under appropriate...
Best practice
Ensure best practices are applied in building digital services
Accredited Provider
Use accredited providers through the Services Australia Identity Exchange under the Trusted Digital Identity Framework (TDIF) when verifying identity
Best practice
Ensure best practices are applied in building digital services
Accredited Provider
Use accredited providers through the Services Australia Identity Exchange under the Trusted Digital Identity Framework (TDIF) when verifying identity
Best practice
Ensure best practices are applied in building digital and ICT services
Cloud Assessment and Authorisation
The Cloud Assessment and Authorisation publication is intended for cloud service providers, Infosec Registered Assessors Program (IRAP)...
Pagination
Previous page
‹‹
Page 19
Next page
››
Subscribe to Yes