ITI:2022-2023 年全球网络安全事件报告政策指数(2023)

VIP文档

ID:69382

大小:0.20 MB

页数:7页

时间:2024-02-06

金币:10

上传者:战必胜
www.itic.orgPromoting Innovation Worldwide 1
MEMO
To: Interested Parties
From: Information Technology Industry Council (ITI)
Re: 2022-2023 Global Cybersecurity Incident Reporting Policy Index
Over the past several years, governments around the world have taken steps to improve visibility into
cyber incidents through developing new cyber incident reporting requirements and updating existing
ones. To inform policy eorts around the world, ITI developed and released its own set of Global Incident
Reporting Policy Principles, which summarize ITI’s consensus position on what we believe makes good
cyber incident reporting policy. With this backdrop in mind, this index summarizes the latest requirements
put forth globally.
The index includes incident reporting policies from eight countries and covers key information such as the
scope of covered entities, threshold for reporting, timeline to report, enforcement mechanisms, among
other areas. It seeks to help further inform incident reporting eorts across the globe, particularly in
preventing fragmentation of approaches across borders. Because several of these eorts remain in ux,
particularly in Canada, the United States, and the United Kingdom, ITI will be closely tracking how these
proposals unfold over the next year.
Australia
1 Relevant impact: the impact (whether direct or indirect) of the incident on a) the availability, integrity, reliability
of the asset, b) the condentiality of (i) information about the asset; or (ii) if information is stored in the asset—the
information; or (iii) if the asset is computer data—the computer data.
Security Legislation Amendment (Critical
Infrastructure) Bill 2021
To strengthen existing critical infrastructure risk
management strategies, mainly against cyber-
related threats, the Australian government
amended the 2018 Security of Critical
Infrastructure Act. The Security Legislation
Amendment (Critical Infrastructure) Bill 2021
came into eect in 2021 and expanded the scope
of covered entities to 11 sectors, with the notable
inclusion of the Data Storage and Processing
sector, and their critical assets. The bill introduced
cybersecurity incident reporting obligations for
incidents that aect critical infrastructure assets.
The bill denes incidents as “unauthorized
access or modication to computer data or a
computer program or unauthorized impairment
of electronic communication.” More specically,
it dierentiates incidents between “relevant”
and “signicant” impacts
1
. Entities have 72 hours
to report an incident with relevant impact, and
12 hours to report one with signicant impact.
The bill also provides the option for entities to
initially provide an oral report in lieu of a written
submission, but those who do must provide a
written record shortly afterwards (48 hours after
an incident with relevant impact, 84 hours after
one with signicant impact). Failure to meet these
requirements will result in a monetary penalty. The
bill also grants the Australian government more
authority over private companies operating critical
infrastructure assets. When an entity is deemed
unwilling or unable to respond, the government
has the option to intervene, including gathering
information, ordering the operator to take specic
actions, or taking over operation of the asset.
October 2022
资源描述:

当前文档最多预览五页,下载文档查看全文

此文档下载收益归作者所有

当前文档最多预览五页,下载文档查看全文
温馨提示:
1. 部分包含数学公式或PPT动画的文件,查看预览时可能会显示错乱或异常,文件下载后无此问题,请放心下载。
2. 本文档由用户上传,版权归属用户,天天文库负责整理代发布。如果您对本文档版权有争议请及时联系客服。
3. 下载前请仔细阅读文档内容,确认文档内容符合您的需求后进行下载,若出现内容与标题不符可向本站投诉处理。
4. 下载文档时可能由于网络波动等原因无法下载或下载错误,付费完成后未能成功下载的用户请联系客服处理。
关闭