The CISO Online IRAP assessment service serves as a strategic initiative to assist organisations in achieving compliance with Australian government standards and regulations pertaining to information security. For organisations handling government data, compliance with Australian Government security standards is not optional – it’s a critical requirement.
An IRAP Assessment serves as your gateway to achieving compliance, demonstrating your commitment to robust security practices and ensuring that your systems are fortified against potential breaches. Beyond mere compliance, IRAP Assessments help organisations build trust and confidence among clients, partners, and stakeholders. By undergoing a thorough assessment of your security measures, you show a dedication to safeguarding sensitive information and protecting the interests of all parties involved.
CISO Online’s approach to IRAP assessments is characterised by thoroughness, expertise, and a client-centric focus. Leveraging a team of highly skilled cybersecurity professionals with extensive experience in conducting assessments and audits, the company offers a comprehensive suite of services tailored to the specific needs and requirements of each client. The process typically begins with a detailed consultation to understand the organisation’s objectives, existing security infrastructure, and regulatory obligations.
Failing to enlist the IRAP assessment services offered by CISO Online could expose an organisation to a multitude of harmful threats, leaving them vulnerable to significant cybersecurity risks and regulatory non-compliance.
Without undergoing IRAP assessments, your organisation may lack a comprehensive understanding of its cybersecurity vulnerabilities and weaknesses. This leaves you susceptible to a wide range of cyber threats. By failing to identify and mitigate these risks, you put your critical assets, reputation, and operations in jeopardy.
An IRAP assessment is an independent assessment of the implementation, appropriateness and effectiveness of a system’s security controls.
IRAP assessment outcomes are documented within a security assessment report (commonly referred to as an IRAP report), which is used by consumers to conduct their own assessment and authorisation of a system’s suitability for their security needs and risk appetite.
While the approach taken to conducting an IRAP assessment may depend on the size and complexity of a system, there are foundational assessment stages and principles which are applied to each assessment.
The IRAP assessment process contains four key stages:
Plan and prepare
Define the scope of the assessment
Assess the security controls
Produce the security assessment report
The plan and prepare phase consists of the following activities:
The IRAP assessor conducting engagement planning activities. These activities require the assessor to determine in consultation with the client organisation the:
The IRAP assessor conducting engagement planning activities. These activities require the assessor to determine in consultation with the client organisation the:
1. Assessment start date, duration and milestones 2. Access to resources required to undertake the assessment including documentation, systems, tools, personnel and facilities
3. System and control testing activities
4. Evidence collection process and evidence protection
5. Approach to stakeholder engagement and consultation
6. Version of the ISM that will be used for the assessment
7. Appropriate use and marketing of the security assessment report
8. Availability of the security assessment report and evidence to ASD for quality assurance purposes.
IRAP assessors may develop a security assessment plan to document this information and share it with the client organisation. Risk Associates will secure an Independent IRAP Assessor and coordinate with the IRAP Assessor during this engagement.
The scope of an IRAP assessment includes both the authorisation boundary of the system under assessment, as well as the security controls applicable to the assessment of that system. The scope of an IRAP assessment will be defined early in the assessment by the IRAP assessor coming to an agreement with the System Owner on:
• The system version and environment under assessment (e.g. PROD or TEST, and the implications of the latter).
• The intended security classification of the data stored, processed or communicated by the system.
• The authorisation boundary of the system (i.e., the system components under assessment as well as the people, processes, technologies and facilities that the system relies on or impact its security posture).
The client organisation may already have a view of the scope of an assessment, however, it is the IRAP assessor’s responsibility to validate the accuracy of the scope. To help define the scope of an assessment, IRAP assessors can:
1. Gain an understanding of the system including its function, processes, data, users, architecture and technology stack.
2. Identify the parties (including suppliers) involved in delivering or maintaining the system and its security controls. This includes identifying the shared responsibility model and security control inheritance.
3. Use the system security plan annex and logical system diagrams to identify the security controls in scope for the system.
The scope of the assessment will be clearly articulated within the security assessment report. Any system components or environments deemed out-of-scope will also be documented and accompanied by a justification for its exclusion from the assessment.
In this phase, the IRAP assessor reviews evidence provided by the client organisation to determine the implementation status of security controls. Security control review activities are typically divided into two categories:
1. Design effectiveness review:
• The assessor reviews the documented system (i.e., system architecture, security policies, procedures, plans, etc.) and determines whether relevant controls have been scoped for the system and unique risks to the system have been addressed.
• Personnel interviews may also be required at this stage to confirm the accuracy of documentation and/or fill gaps in poor documentation.
• The design effectiveness review provides the assessor with an understanding of the system and its security controls and provides the foundation for further control validation activities.
2. Operational effectiveness review:
• The assessor conducts control validation activities to determine whether the documented security controls have been implemented and are operating effectively. The determination of operational effectiveness requires a combination of personnel interviews, live demonstrations of systems and security controls, system testing and site inspections (if applicable).
• Operational effectiveness review provides a higher level of assurance on the implementation of a security control and whether it can be assessed as effective.
The IRAP assessor will consider the quality of evidence provided during an assessment and its impact on assessment outcomes. The goal is to review evidence that provides a high level of assurance on the implementation of a security control. If an IRAP assessor cannot obtain sufficient evidence during an assessment, this limitation will be documented within the security assessment report.
Produce the security assessment report and security controls matrix Upon the completion of the assessment, the assessor produces a security assessment report to document the outcomes of the assessment. At a high-level, a security assessment report describes:
• The scope of the security assessment.
• The effectiveness of the implementation of security controls.
• Security risks associated with the operation of the system.
• Any recommended remediation actions.
IRAP assessors are not required to undertake a risk assessment of ineffective controls, only identify security risks and risk mitigating controls so that the consumer of the report can undertake their own assessment of those risks.
IRAP assessors will only describe identified risks and will not rate risks on behalf of report consumers. It is up to the consumer of the report to determine the level of risk exposure within their environment.
In addition to the security assessment report, the IRAP assessor documents the security controls matrix (SCM) or cloud SCM (CSCM). The SCM contains assessment observations against each ISM control.
IRAP deliverables are required to follow the guidance provided by ACSC on ACSC IRAP Resources. The guidance covers deliverable content requirements and the appropriate language for describing security control implementations.
It is important that IRAP assessors do not include any marketing materials, biased or misleading statements within IRAP deliverables. This includes language that states or implies that the IRAP assessment provides certification, accreditation, endorsement, approval or authorisation to operate for a system.
The plan and prepare phase consists of the following activities:
The IRAP assessor conducting engagement planning activities. These activities require the assessor to determine in consultation with the client organisation the:
The IRAP assessor conducting engagement planning activities. These activities require the assessor to determine in consultation with the client organisation the:
1. Assessment start date, duration and milestones 2. Access to resources required to undertake the assessment including documentation, systems, tools, personnel and facilities
3. System and control testing activities
4. Evidence collection process and evidence protection
5. Approach to stakeholder engagement and consultation
6. Version of the ISM that will be used for the assessment
7. Appropriate use and marketing of the security assessment report
8. Availability of the security assessment report and evidence to ASD for quality assurance purposes.
IRAP assessors may develop a security assessment plan to document this information and share it with the client organisation. Risk Associates will secure an Independent IRAP Assessor and coordinate with the IRAP Assessor during this engagement.
The scope of an IRAP assessment includes both the authorisation boundary of the system under assessment, as well as the security controls applicable to the assessment of that system. The scope of an IRAP assessment will be defined early in the assessment by the IRAP assessor coming to an agreement with the System Owner on:
• The system version and environment under assessment (e.g. PROD or TEST, and the implications of the latter).
• The intended security classification of the data stored, processed or communicated by the system.
• The authorisation boundary of the system (i.e., the system components under assessment as well as the people, processes, technologies and facilities that the system relies on or impact its security posture).
The client organisation may already have a view of the scope of an assessment, however, it is the IRAP assessor’s responsibility to validate the accuracy of the scope. To help define the scope of an assessment, IRAP assessors can:
1. Gain an understanding of the system including its function, processes, data, users, architecture and technology stack.
2. Identify the parties (including suppliers) involved in delivering or maintaining the system and its security controls. This includes identifying the shared responsibility model and security control inheritance.
3. Use the system security plan annex and logical system diagrams to identify the security controls in scope for the system.
The scope of the assessment will be clearly articulated within the security assessment report. Any system components or environments deemed out-of-scope will also be documented and accompanied by a justification for its exclusion from the assessment.
In this phase, the IRAP assessor reviews evidence provided by the client organisation to determine the implementation status of security controls. Security control review activities are typically divided into two categories:
1. Design effectiveness review:
• The assessor reviews the documented system (i.e., system architecture, security policies, procedures, plans, etc.) and determines whether relevant controls have been scoped for the system and unique risks to the system have been addressed.
• Personnel interviews may also be required at this stage to confirm the accuracy of documentation and/or fill gaps in poor documentation.
• The design effectiveness review provides the assessor with an understanding of the system and its security controls and provides the foundation for further control validation activities.
2. Operational effectiveness review:
• The assessor conducts control validation activities to determine whether the documented security controls have been implemented and are operating effectively. The determination of operational effectiveness requires a combination of personnel interviews, live demonstrations of systems and security controls, system testing and site inspections (if applicable).
• Operational effectiveness review provides a higher level of assurance on the implementation of a security control and whether it can be assessed as effective.
The IRAP assessor will consider the quality of evidence provided during an assessment and its impact on assessment outcomes. The goal is to review evidence that provides a high level of assurance on the implementation of a security control. If an IRAP assessor cannot obtain sufficient evidence during an assessment, this limitation will be documented within the security assessment report.
Produce the security assessment report and security controls matrix Upon the completion of the assessment, the assessor produces a security assessment report to document the outcomes of the assessment. At a high-level, a security assessment report describes:
• The scope of the security assessment.
• The effectiveness of the implementation of security controls.
• Security risks associated with the operation of the system.
• Any recommended remediation actions.
IRAP assessors are not required to undertake a risk assessment of ineffective controls, only identify security risks and risk mitigating controls so that the consumer of the report can undertake their own assessment of those risks.
IRAP assessors will only describe identified risks and will not rate risks on behalf of report consumers. It is up to the consumer of the report to determine the level of risk exposure within their environment.
In addition to the security assessment report, the IRAP assessor documents the security controls matrix (SCM) or cloud SCM (CSCM). The SCM contains assessment observations against each ISM control.
IRAP deliverables are required to follow the guidance provided by ACSC on ACSC IRAP Resources. The guidance covers deliverable content requirements and the appropriate language for describing security control implementations.
It is important that IRAP assessors do not include any marketing materials, biased or misleading statements within IRAP deliverables. This includes language that states or implies that the IRAP assessment provides certification, accreditation, endorsement, approval or authorisation to operate for a system.
The Infosec Registered Assessors Program (IRAP) is an Australian government initiative that provides a framework for assessing the security of government information and communication technology (ICT) systems. It is administered by the Australian Cyber Security Centre (ACSC) and aims to ensure that ICT products and services used by the Australian government meet specified security requirements.
IRAP was established to enhance the security of Australian government ICT systems by providing a standardised approach to assessing the security posture of vendors and their products. It helps ensure that government agencies can confidently select and use ICT products and services that meet stringent security standards.
The primary participants in IRAP are assessors who are accredited by the ACSC to conduct security assessments of ICT products and services. Additionally, vendors of ICT products and services seeking to supply to the Australian government may engage with IRAP assessors to obtain certification.
The key objectives of the IRAP include:
Providing assurance to government agencies that ICT products and services meet specified security requirements.
Enhancing the security posture of government ICT systems by identifying and mitigating security risks.
Promoting trust and confidence in the security of ICT products and services used by the Australian government.
IRAP assessments encompass various types, including:
Security assessments of cloud services, software, and infrastructure.
Certification of ICT systems for use with government data classified at different security levels (e.g., Unclassified, Protected, Secret).
Penetration testing and vulnerability assessments to identify and address security vulnerabilities.
Participation in IRAP can benefit vendors and service providers in several ways, including:
Demonstrating compliance with Australian government security requirements, enhancing marketability.
Accessing a streamlined process for security assessment and certification.
Building trust and confidence among government clients by obtaining an official endorsement from the ACSC.
IRAP assessors play a crucial role in conducting security assessments of ICT products and services. They are responsible for evaluating the security posture of vendors and their offerings, identifying vulnerabilities and risks, and providing recommendations for mitigation. Assessors must be accredited by the ACSC and adhere to established assessment methodologies.
Vendors and service providers seeking to engage with IRAP can do so by:
Contacting accredited IRAP assessors to initiate the assessment process.
Providing relevant documentation and access to systems for assessment purposes.
Collaborating with assessors to address identified security issues and implement recommended controls.
Obtaining certification from the ACSC upon successful completion of the assessment process.
IRAP assessments evaluate compliance with a range of security requirements, including:
Access control measures to protect against unauthorized access.
Data encryption and integrity controls to safeguard sensitive information.
Incident response and management procedures to address security incidents effectively.
Physical security measures to protect ICT infrastructure from unauthorized access or damage.
The duration of an IRAP assessment can vary depending on factors such as the complexity of the ICT system being assessed, the scope of the assessment, and the availability of documentation and resources. Assessments may range from several weeks to several months, with ongoing engagement between assessors and vendors/service providers.
The process for obtaining IRAP certification involves several steps, including:
Engagement with an accredited IRAP assessor to initiate the assessment.
Conducting a comprehensive security assessment of the ICT product or service.
Addressing identified security vulnerabilities and implementing recommended controls.
Submission of assessment reports and documentation to the ACSC for review and certification.
Issuance of an IRAP certification upon successful completion of the assessment process.
While IRAP certification is not mandatory for vendors supplying to the Australian government, it is often required or strongly recommended, especially for products and services handling sensitive government data. IRAP certification provides assurance that ICT offerings meet stringent security standards and can be trusted for government use.
IRAP aligns with various cybersecurity frameworks and standards, including the Australian Government Information Security Manual (ISM), the National Institute of Standards and Technology (NIST) Cybersecurity Framework, and ISO/IEC 27001. It incorporates principles and best practices from these frameworks to ensure comprehensive security assessments.
IRAP certification offers several benefits for government agencies, including:
Assurance that ICT products and services meet stringent security requirements.
Confidence in the security of systems and data used for government operations.
Alignment with government security policies and standards, such as the ISM.
Streamlined procurement processes for certified products and services.
Organisations can stay informed about IRAP updates and requirements by:
Monitoring announcements and guidance issued by the ACSC regarding IRAP.
Engaging with accredited IRAP assessors and staying informed about assessment methodologies and best practices.
Participating in industry forums, workshops, and training sessions related to IRAP and government cybersecurity initiatives.