Processes, and supporting procedures, are developed, implemented and maintained to prevent AUSTEO, AGAO and REL data in textual and non-textual formats from being exported to unsuitable foreign systems.
Topic
Data transfer processes and procedures
Applicable to
Secret, Top Secret
History
Priority
Must
Jun 2024
Processes, and supporting procedures, are developed, implemented and maintained to prevent AUSTEO, AGAO and REL data in textual and non-textual formats from being exported to unsuitable foreign systems.
Minor grammar edits were made to controls without changing their intent.
Dec 2022
Processes, and supporting procedures, are developed, implemented and maintained to prevent AUSTEO, AGAO and REL data in both textual and non-textual formats from being exported to unsuitable foreign systems.
Existing controls relating to the development and implementation of cyber security documentation were amended to ensure documentation is maintained throughout its lifetime.
Mar 2022
Processes, and supporting procedures, are developed and implemented to prevent AUSTEO, AGAO and REL data in both textual and non-textual formats from being exported to unsuitable foreign systems.
The existing recommendation to conduct keyword searches on all textual data when exporting AUSTEO or AGAO data from a system (ISM-0678) was merged into the overarching recommendation to establish processes and procedures to prevent AUSTEO and AGAO data in both textual and non-textual forms from being exported to foreign systems (ISM-1535). In addition, the recommended to prevent the export of REL data has also been included to prevent export to specific foreign systems that it is not authorised to be exported to.
Dec 2021
Processes, and supporting procedures, are developed and implemented to prevent AUSTEO and AGAO data in both textual and non-textual formats from being exported to foreign systems.
Miscellaneous changes were made to rationale and security controls throughout the publication. This included:
• A review from the Using the Information Security Manual chapter through to the Guidelines for Media chapter.
• Security controls suitable for all audiences have been identified with the ‘All’ applicability marking while additional security controls suitable for just government audiences have been identified with the O, P, S and TS applicability markings.
• Security controls suitable for specific classifications have been amended to include their classification(s) in the wording of the security controls to reduce the reliance on applicability markings to confer suitability.
• Tables in security controls have been converted into prose to allow for inclusion in the SSP annex template and the XML list of security controls.
• The use of ‘official’ and ‘highly classified’ terminology has been replaced with specific classifications to remove ambiguity.
• Security controls relating to high assurance ICT equipment have had their applicability narrowed to ‘S, TS’ reflecting that they are intended for the protection of SECRET and TOP SECRET systems and data.
Aug 2019
A process, and supporting procedures, is developed and implemented to prevent AUSTEO and AGAO data in both textual and non-textual formats from being exported to foreign systems.
Security control 1535 was modified to specify the development and implement of an appropriate process to prevent data spills of particularly important information onto foreign systems.
Jul 2019
Procedures are developed to prevent AUSTEO and AGAO data in both textual and non-textual formats from being exported to foreign systems.
Nov 2018
Procedures are developed to prevent AUSTEO and AGAO data in both textual and non-textual formats from being exported to foreign systems.
Added as a result of a split of security control 0678.