Cyber Security

Luke Hally

Zero-Trust Culture I: Capstone Pitch

September 21, 2024
Categories:

Task

The capstone project was the twelfth and final course of my masters. Students with an average grade of over 65% and willing external stakeholders are eligible to submit a proposal for an Externally Directed Project – this means they can design and run a project of their own instead of completing the university aligned project. I chose this option to explore the zero-trust culture called for in The Australian 2023-2030 cyber security strategy.

  • A 250-word (+/- 10%) overview pitch outlining the key aims, and importance of your project.
  • A list of key deliverables of the project, and for each, word count, attributes and measures of success.

Pitch

Cybersecurity is often viewed as a technical problem in need of technical solutions, however as technology becomes more entwined with our lives, it is becoming apparent that it is socio-technical (Davis et al., 2014) in nature and in need of solutions that are both technical and non-technical (Dept Home Affairs, 2023a, p. 19). The 2023-2030 Australian Cyber Security Strategy calls for a “whole-of-government zero trust culture” (Dept Home Affairs, 2023b, p. 43), but does not describe what this culture is or provide guidance on how to achieve it. 

Organisational culture guides both our approach to work and how we interact with others (State Services Authority, 2013), with trust being critical to the latter. So when considering zero-trust culture, the focus of this project will be on the ‘approach to work’, or, operations. In their operations, organisations can have numerous insecure resources such as workflows, email or non-technical assets connected via processes to IT systems. These can affect one another, e.g.: a compromised IT system may impact decision making that is reliant on its data; conversely, data leaks outside of IT systems can compromise confidentiality, as evidenced by 68% of government notifiable data breaches being due to human error (OAIC, 2024). 

Exploring the concept of zero-trust culture, with the insight that it is relevant to our operations and that these can contain insecure resources, highlights the importance of security in our operational activities. This is known as operational security (opsec) (Space Operations Command, 2023) and I propose that by applying zero-trust principles to opsec, we can create a zero-trust culture.

List of deliverables

DeliverableAttributes/ word count / durationMeasures of success
Project outlinePresentation, 5 minutes
• Recorded for submission
• Presented to stakeholders
• Project outline (this document)
• Pitch, 250 words
• List of deliverables
• Project plan (schedule and tasks)
• Introduces the concepts of zero-trust, operational security and zero-trust culture.
• Makes a connection between the above concepts and Australia’s cyber security strategy.
•Contextualises the above concepts in relation to government organisations.
Presentation10 minute presentation
• Recorded for submission
• Presented to stakeholders
•Explain the information environment
• Outline threats to the information environment
• Explain how attack effects can affect operations
• Introduce opsec and outline its benefits
• Introduce zero-trust and look at how its principles could be applied to opsec
Report3000+ words• Provides detailed background on zero-trust and operational security.
• Demonstrates integration of of zero-trust principles to operational security
• Provides a clear explanation on the need to expand the scope of organisational information security and how the above point can assist.
Strategy proposal1000+ words• Makes a case for a change to how information security is handled at an organisational wide level
• Provides: 
• Strategy kernel 
•Vision statement
•Principles
Reflection600 words• Demonstrates an ability to synthesise learnings throughout the project
• Demonstrates an ability to critically assess project plans and performance
• Demonstrates an ability to synthesise research and develop the proposal into a well articulated and clear argument.

References

Davis, M. C., Challenger, R., Jayewardene, D. N. W., & Clegg, C. W. (2014). Advancing socio-technical systems thinking: A call for bravery. Applied Ergonomics, 45(2), 171–180. https://doi.org/10.1016/j.apergo.2013.02.009 

Dept Home Affairs. (2023a). 2023-2030 Australian cyber security strategy discussion paper. https://www.homeaffairs.gov.au/reports-and-pubs/files/2023-2030_australian_cyber_security_strategy_discussion_paper.pdf 

Dept Home Affairs. (2023b). 2023-2030 Australian cyber security strategy. https://www.homeaffairs.gov.au/cyber-security-subsite/files/2023-cyber-security-strategy.pdf 

OAIC. (2024, February 22). Notifiable data breaches report: July to december 2023. OAIC. https://www.oaic.gov.au/privacy/notifiable-data-breaches/notifiable-data-breaches-publications/notifiable-data-breaches-report-july-to-december-2023 

Space Operations Command. (2023, January 5). OPSEC history: From ancient origins to modern challenges. Space Operations Command (SpOC). https://www.spoc.spaceforce.mil/News/Article-Display/Article/3260002/opsec-history-from-ancient-origins-to-modern-challenges 

State Services Authority. (2013). Organisational  culture. https://vpsc.vic.gov.au/wp-content/uploads/2015/03/Organisational-Culture_Web.pdf 

Recent posts