Critical and Emerging Technologies
ICT Procurement Standards
These are the key standards that, when conformed to, can support sellers to meet common technical specifications in ICT procurement requirements.
Information Security
![](https://cdn.prod.website-files.com/641b85d1ba8e6f8425e1960c/6465ada9dd8cbdcadc5587d9_information-icon.png)
ISO 27001 provides guidance for maintaining and implementing an information security management system (ISMS)- a framework of policies and procedures that includes all legal, physical and technical controls involved in an organisation's information risk management processes.
Benefits: prevent key cybersecurity risks- ransom, fines, increased insurance premiums, reputational damage or security breaches, with an average cost of $1 million per breach.
Certification: first party (self-declaration), second party or third party (external). Third party certification is often required.
Privacy
![](https://cdn.prod.website-files.com/641b85d1ba8e6f8425e1960c/6465ae86c8c8fa3969694daf_privacy-ict-icon.png)
AS 27701 provides guidance for implementing and maintaining a Privacy Information Management System (PIMS)- a framework for processing and controlling Personally Identifiable Information (PII)
Benefits: allows an organisation to adapt to, and report on, varied international privacy requirements, protect customer data and report to stakeholders.
Certification: first party (self-declaration), second party or third party (external).
Risk Management
![](https://cdn.prod.website-files.com/641b85d1ba8e6f8425e1960c/6465aed8df60830cc7fd5fbf_risk-icon.png)
ISO 31000 provides principles, a framework and a process for managing risk. It can be used by any organization regardless of its size, activity or sector.
Benefits: can help organisations increase the likelihood of achieving objectives, improve the identification of opportunities and threats and effectively allocate and use resources for risk treatment.
Certification: first party (self-declaration), second party or third party (external).
Cybersecurity Automation and Control Systems
![](https://cdn.prod.website-files.com/641b85d1ba8e6f8425e1960c/6465af4241014418977df4ab_systems-icon.png)
ISA/IEC 62443 series addresses cybersecurity for operational technology in automation and control systems.
Benefits: prevent key cybersecurity risks- ransom, fines, increased insurance premiums, reputational damage or security breaches, with an average cost of $1 million per breach.
Certification: first party (self-declaration), second party or third party (external).
Cloud Security
![](https://cdn.prod.website-files.com/641b85d1ba8e6f8425e1960c/6465afb4497e81dbe9fc13e6_cloud-icon.png)
ISO/IEC 27017 gives guidelines for information security controls applicable to the provision and use of cloud services for cloud service providers and customers.
Benefits: build trust in your organisation, create competititve advantage , ensure interoperability and secure cloud data.
Certification: first party (self-declaration), second party or third party (external).
Cybersecurity
![](https://cdn.prod.website-files.com/641b85d1ba8e6f8425e1960c/6465b0018baeb9c8eb84d4f6_cybersecurity-icon.png)
ISO/IEC 27017 gives guidelines for information security controls applicable to the provision and use of cloud services for cloud service providers and customers.
Benefits: build trust in your organisation, create competititve advantage , ensure interoperability and secure cloud data.
Certification: first party (self-declaration), second party or third party (external).
For further enquiries, please contact SI@standards.org.au