Category
Guidance Document
Type
Standard
Access
Open
Status
Active
Created
March 2012
Updated
October 2021
Malicious actors regularly target Australian Government information held by contractors, both classified and unclassified, in an attempt to gain an economic or strategic advantage. This publication aims to help contractors to appropriately secure Australian Government information on their systems. It includes links to more detailed information.
Main sections:
- Contractors hold valuable information
- Essential mitigation strategies (Essential Eight)
- Additional mitigation strategies
- Further information
Main sections:
- Contractors hold valuable information
- Essential mitigation strategies (Essential Eight)
- Additional mitigation strategies
- Further information
Access Cyber Security for Contractors
By accessing this content, you are leaving this website. The Agency takes no responsibility for the accuracy of content on the destination page.