Fill in the form below and we will contact you shortly to organised your personalised demonstration of the Noggin platform.
An integrated resilience workspace that seamlessly integrates 10 core solutions into one, easy-to-use software platform.
The world's leading integrated resilience workspace for risk and business continuity management, operational resilience, incident & crisis management, and security & safety operations.
Explore Noggin's integrated resilience software, purpose-built for any industry.
Resilience Management Software
Updated July 4, 2025
On October 1, 2018, the Department of Home Affairs within the Australian Government commenced the Protective Security Policy Framework (PSPF), a series of reforms intended to clarify, streamline, and encourage a “strengthened security culture across government agencies.” At its launch, the PSPF was described as a living document that would be updated as needed to address emerging security issues, new security best practices, and changes to Government security policies.
Since 2018, numerous policies within the PSPF have been amended, rewritten, or otherwise updated in this fashion, often with the advisement or guidance of relevant groups within various departments across the Government as well as feedback from the private sector. To date, this process has operated in accordance with the PSPF’s initial design and demonstrates the value of collaborative cooperation with groups both within and outside the Government.
Additionally, since 2018, the Attorney-General’s Department has issued an annual PSPF Assessment Report (formerly PSPF Compliance Report). These reports consolidate reporting by non-corporate Commonwealth entities to assure both the Government and the Australian public of entities’ adherence to PSPF requirements, and by proxy, their implementation of risk-appropriate security measures and degree of achievement for intended security outcomes.
Last year, the Australian Government launched the first in a new series of annual iterations of the PSPF, appropriately titled PSPF Release 2024. By consolidating all PSPF policy changes into yearly updates, the Government has created a predictable cadence by which affected entities can anticipate potential policy updates and prepare to update their own processes to remain compliant with all its requirements and stay as protected as possible by doing so.
Since PSPF Release 2024 is the framework’s consolidated update for last year, there’s been some significant policy changes and expansions that affected entities need to know about. To help your organisation stay compliant in the area of operational resilience, we’ll review the purpose and scope of the PSPF, touch on new requirements in Release 2024, and discuss how advanced digital tools can help you to efficiently keep compliant going forward.
The PSPF is a document composed of consolidated security policy requirements that was drawn with the intention to clarify what Australian Government entities and other affected organisations must do to “protect their people, information, and resources, both domestically and internationally.”
To achieve this, the PSPF comprises a five-tiered structure:
The top-line imperative which defines the framework’s overall objective, and under which all other tiers live.
Simply put, it is:
“The Protective Security Policy Framework (PSPF) sets out Australian Government policy across six security domains and prescribes what Australian Government entities must do to protect their people, information and assets, both domestically and internationally.”
Six fundamental concepts which define the approach to the Minister’s Directive.
They are:
Six spheres of influence within which Government policy and PSPF guidelines can meaningfully support the application of security principles.
They are:
Iterations of the PSPF itself, instructions for compliance with each iteration, and existing policies, security standards, and technical manuals from which the mandatory compliance requirements are drawn and assembled into the bulk of the PSPF.
The text of all mandatory compliance requirements by which all affected entities must abide, complete with in-depth explainers clearly outlining the details of each one’s application.
Additionally, it’s important to define exactly for whom and for which entities the PSPF provides direction and guidance. According to the PSPF website, the PSPF is designed for:
A series of changes to the PSPF were delivered through Release 2024, such as expanding Protective Security Domains to separate Risk from Technology and clarifying guidance in areas where either reporting data suggested lower levels of guideline adherence or feedback from affected entities suggested that guidelines were not explicitly clear as written.
There were also more tangible changes to the document itself, such as layout and design updates to improve its accessibility and the clarity of its structure. Additionally, to enable more valuable analysis of security vulnerabilities, the Department of Home Affairs shifted from a maturity reporting model to a compliance reporting model to improve the accuracy of reporting data.
While these updates are highly relevant to the functional administration, comprehensibility, and evaluation of the efficacy of the PSPF, some of the most substantive updates to the PSPF in Release 2024 are the incorporation of new compliance requirements in the area of operational resilience, specifically:
As these areas weren’t previously seen as fertile ground for growing security threats or risks to operational resilience, earlier iterations of the PSPF didn’t include specific elements of Government policy or other guidelines to address them directly.
However, more recently, operational resilience has emerged as a highly critical area of focus, as reflected in Government policy and strategic planning. This is best exemplified by the passage of the Security of Critical Infrastructure Act 2018 (SOCI), and the adoption of the 2023–2030 Australian Cyber Security Strategy, within which the PSPF is noted as a source of security best practices to enable the successful achievement of the goals of multiple “Shields.”
According to PSPF Release 2024, every affected entity must develop, implement, and maintain a business continuity plan to minimise the impacts of significant business disruptions to both their critical services and assets and to their other services and assets when a threat or security risk assessment indicates that it’s needed.
The business continuity plan must:
To aid the development of an entity’s business continuity plan, the PSPF recommends a number of globally and locally recognised business continuity standards and guidance, specifically:
Finally, the PSPF recommends that when an entity develops their business continuity plan, they do so in such a way that it complements their overall security plan and other policies and procedures rather than by itself. This is to ensure that the business continuity plan doesn’t run afoul of existing protocols, and that the entity considers it as essential as any other established security directive.
PSPF Release 2024 points up the incalculable importance of preparedness when recognising and responding to a potential emergency. This is why it mandates that within the business continuity plan, the entity must also have plans prepared to initiate in the event of any of a wide range of different emergencies in order to protect the entity’s personnel, information, and resources.
Emergencies for which plans should be prepared include but aren’t limited to:
In addition to development and maintenance of emergency management plans, the PSPF specifies that emergency response teams should run security awareness trainings, exercises, and rehearsals of those plans to guarantee their efficacy and confirm the readiness of key personnel to execute an emergency management plan as the situation demands.
In addition to prepared plans for business continuity and emergency management, PSPF Release 2024 affirms that affected entities must issue incident notifications that match the scope and nature of the incident in question and includes all relevant authorities or regulatory agencies. For example, if the incident presents an immediate threat to public safety, it’s advised that the entity disseminate appropriate warnings to all potentially affected parties.
For the reporting of incidents to supervisory authorities, the entity should rely on existing reporting practices as specified by each such authority in their oversight capacity. This includes the Attorney-General’s Department (AGD) in the case of a legal matter, or ASD in the case of a cyber crime or other cybersecurity matter.
Many organisations who have developed, implemented, and maintained key operational resilience tools like business continuity and emergency management plans have historically relied on antiquated or legacy tools such as spreadsheets, Word documents, or other isolated systems to do so. The use of tools like these introduces a number of challenges, including:
All of these challenges can not only delay response efforts, thus increasing the magnitude of any potential damage or loss of services, but can also increase the risk of a compliance failure, which is the opposite of their intended objectives.
Luckily, advanced digital solutions like integrated resilience management software can help your organisation to centralise the creation, management, testing, and should the need arise, activation of your business continuity plans, emergency management plans, and incident notification. Integrated resilience software also makes it easy to update plans as changes in your risk landscape demand and track performance to drive continuous improvement.
When looking for a digital solution to help your organisation comply with PSPF Release 2024’s operational resilience requirements, choose integrated resilience management software that lets your team:
Since the PSPF has shifted to annual iterations instead of ad hoc policy updates, it will be much easier for your organisation to make any necessary procedural changes to stay compliant with new policies or guidance. But to optimize both your PSPF compliance efforts and your overall resilience posture — which is, after all, the goal of all operational resilience guidance — no solution is more flexible, more scalable, or easier to use than integrated resilience management software.
To see how integrated resilience management software can help your organisation keep compliance a top priority, request a demo of Noggin today.