<!--The Official Report of Parliamentary Debates (Hansard) of the Legislative Council and the House of Assembly of the Parliament of South Australia are covered by parliamentary privilege. Republication by others is not afforded the same protection and may result in exposure to legal liability if the material is defamatory. You may copy and make use of excerpts of proceedings where (1) you attribute the Parliament as the source, (2) you assume the risk of liability if the manner of your use is defamatory, (3) you do not use the material for the purpose of advertising, satire or ridicule, or to misrepresent members of Parliament, and (4) your use of the extracts is fair, accurate and not misleading. Copyright in the Official Report of Parliamentary Debates is held by the Attorney-General of South Australia.-->
<hansard id="" tocId="" xml:lang="EN-AU" schemaVersion="4.0" xsi:noNamespaceSchemaLocation="hansard_1_0.xsd" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2007/XMLSchema-instance" xmlns:mml="http://www.w3.org/1998/Math/MathML">
  <name>Legislative Council</name>
  <date date="2023-02-07T14:15:00+10:30" />
  <sessionName>Fifty-Fifth Parliament, First Session (55-1)</sessionName>
  <parliamentNum>55</parliamentNum>
  <sessionNum>1</sessionNum>
  <parliamentName>Parliament of South Australia</parliamentName>
  <house>Legislative Council</house>
  <venue></venue>
  <reviewStage>published</reviewStage>
  <startPage num="1817" />
  <endPage num="1878" />
  <dateModified time="2023-07-06T09:44:30+09:30" />
  <proceeding continued="true">
    <name>Answers to Questions</name>
    <subject>
      <name>Auditor-General's Report</name>
      <text id="202302071479948a130d4d67a0001041">
        <inserted>
          <heading>Auditor-General's Report</heading>
        </inserted>
      </text>
      <talker role="member" id="4363" referenceid="93519aefc9814df9a5e20a43c35e142f" kind="question">
        <name>The Hon. T.A. FRANKS</name>
        <house>Legislative Council</house>
        <questions>
          <question date="2023-02-07T03:45:00+10:30">
            <name>Auditor-General's Report</name>
          </question>
        </questions>
        <text id="202302071479948a130d4d67a0001042">
          <inserted>In reply to <by role="member" id="4363" referenceid="93519aefc9814df9a5e20a43c35e142f">the Hon. T.A. FRANKS </by>().15 November 2022).  </inserted>
        </text>
      </talker>
      <talker role="member" id="4697" referenceid="c1607c57d2294390bdc2b07c15f35010" kind="answer">
        <name>The Hon. K.J. MAHER</name>
        <house>Legislative Council</house>
        <portfolios>
          <portfolio id="">
            <name>Minister for Aboriginal Affairs</name>
          </portfolio>
          <portfolio id="">
            <name>Attorney-General</name>
          </portfolio>
          <portfolio id="">
            <name>Minister for Industrial Relations and Public Sector</name>
          </portfolio>
        </portfolios>
        <questions>
          <question date="2023-02-07T03:45:00+10:30">
            <name>Auditor-General's Report</name>
          </question>
        </questions>
        <text id="202302071479948a130d4d67a0001043">
          <inserted>
            <by role="member" id="4697" referenceid="c1607c57d2294390bdc2b07c15f35010">The Hon. K.J. MAHER (Minister for Aboriginal Affairs, Attorney-General, Minister for Industrial Relations and Public Sector):</by>  I have been advised:</inserted>
        </text>
        <text id="202302071479948a130d4d67a0001044">
          <inserted>The South Australian Protective Security Framework (SAPSF) and the South Australian Cyber Security Framework (SACSF) state that government agencies must manage security risks to government information arising from external service suppliers by:</inserted>
        </text>
        <page num="1871" />
        <text id="202302071479948a130d4d67a0001045">
          <item sublevel="1" bullet="true">
            <inserted>Ensuring cybersecurity obligations addressing identified risks are included in all agreements with suppliers.</inserted>
          </item>
        </text>
        <text id="202302071479948a130d4d67a0001046">
          <item sublevel="1" bullet="true">
            <inserted>Obtaining assurance from suppliers that they are meeting their cybersecurity obligations upon contract award and periodically thereafter.</inserted>
          </item>
        </text>
        <text id="202302071479948a130d4d67a0001047">
          <inserted>Minimum requirements for the security of government data and compliance with these security frameworks are currently being incorporated into standard contract templates and clauses issued by the Department of Treasury and Finance.</inserted>
        </text>
        <text id="202302071479948a130d4d67a0001048">
          <inserted>Treasurer's Instruction 18 on procurement, and its supporting policies, are currently being updated to reflect the government's election commitments. As part of these changes, it will be made clear that chief executives are responsible for ensuring that internal agency processes meet whole-of-government policy requirements for procurement governance and contract management associated with cybersecurity.</inserted>
        </text>
        <text id="202302071479948a130d4d67a0001049">
          <inserted>There are varying resources and skills available across government to appropriately manage supplier cybersecurity risks in procurement and provide ongoing assurance of contractual requirements in accordance with policy. The Department of the Premier and Cabinet is developing a program to uplift supplier cyber security risk management across all levels of procurement in government. Additional resources will be aligned with existing processes, so that risk can be managed to a consistent standard.</inserted>
        </text>
      </talker>
    </subject>
  </proceeding>
</hansard>