Category
          Guidance Document
              Type
          Standard
              Access
              Open
          Status
              Active
          Created
              March 2012
          Updated
              October 2021
          
          Malicious actors regularly target Australian Government information held by contractors, both classified and unclassified, in an attempt to gain an economic or strategic advantage. This publication aims to help contractors to appropriately secure Australian Government information on their systems. It includes links to more detailed information.
Main sections:
- Contractors hold valuable information
- Essential mitigation strategies (Essential Eight)
- Additional mitigation strategies
- Further information
Main sections:
- Contractors hold valuable information
- Essential mitigation strategies (Essential Eight)
- Additional mitigation strategies
- Further information
Access Cyber Security for Contractors
By accessing this content, you are leaving this website. The Agency takes no responsibility for the accuracy of content on the destination page.