Select Page

Audit: Queensland Audit Office’s State Entities 2022 reports deficiencies in information systems

Audit: Queensland Audit Office’s State Entities 2022 reports deficiencies in information systems

Queensland Audit Report 16 March 2023

Queensland Audit Office’s State Entities 2022 reports deficiencies in information systems

Only 33 per cent of departments have an effective system managing information security risks

Queensland Audit Office Report: State entities 2022

Read more Queensland Audit Office reports and Queensland incidents.

QAO Entities 2022 1

This report summarises the audit results of 253 Queensland state government entities, including the 20 core government departments. It also analyses the consolidated financial performance of the Queensland Government, which we previously reported in our annual state finances report.

Cyber threats continue to intensify in frequency and sophistication. The internet gateway (which monitors the computer traffic to and from the internet) for Queensland Government departments indicates that the number of security attempts has doubled during the year – from 750 million attempts in 2020–21 to 1.5 billion in 2021–22.

While the ISMS maturity of the Queensland Government shows evidence of improvement, the improvement needs to occur at a faster pace. In 2020–21, only 33 per cent of departments reported an operating level ISMS (where risks are identified, managed, and continuously improved) versus the target of 100 per cent set by the Queensland Government Customer and Digital Group.

COMMON WEAKNESSES IN INFORMATION SYSTEMS THAT NEED TO BE ADDRESSED

Managing privileged (system administration) access

Access to system administration allows users to make significant changes to system configuration, bypass security settings, or access sensitive information. The Australian Cyber Security Centre identifies the restricting of system administration access as one of the most effective strategies to mitigate against cyber security incidents.

We reported issues in relation to:

  • default accounts (well known accounts that come as part of system installation) or generic accounts, with system administration access not being secured to prevent them from unauthorised use. Using generic accounts limits a department’s ability to know who has used the accounts and the activities or transactions that the user performed in the system. As a result, the department will not be able to hold the user accountable for their actions in the system. In addition, these accounts are often targets for those intending to breach or gain unauthorised access to the systems
  • limited monitoring to alert departments when their users or external service providers perform high-risk activities with their system administration access
  • system administration access not being restricted to authorised personnel in line with their job roles.

Configuring security

Departments need to update their assessment of security risks and practices as technology advances and security loopholes are discovered. We identified the following common weaknesses during the year:

  • security configurations were not updated in line with departments’ latest security policies, vendor recommendations, or better practices for managing security
  • logging (of use) and monitoring capabilities in the systems were not implemented or improved to collect relevant data for security review or to confirm that the activities of users were appropriate.

Managing user access

The security of information systems relies on departments providing access to the systems only to users who need it to perform their job roles. We continue to observe:

  • departments not removing access to the system in a timely way when staff are terminated
  • users continuing to have system access even though they have not used the access for an extended period
  • departments not regularly reviewing who can access their systems and what they can do in the systems.

 


About The Author

Steven Kirby

I provide independent and practical consultancy services through raising awareness and fostering the energy for change that delivers improved business management of information security governance, risk and compliance.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Please follow the Source link to the original article to support the content owner. We only provide a brief summary with metadata to assist in categorisation.

More Australian News

Exclusive: Prime Properties listed as breach victim by M3rx ransomware

Hackers are alleged to have stolen more than 80,000 documents totalling 100 gigabytes of data from a Sydney-based property investment firm. • Fri, 01 … [...]

Alert! Wave of fake toll, parking scams impacting countries worldwide, including Australia and New Zealand

Scammers observed impersonating Aussie toll operator Linkt and the New Zealand Police and Ministry of Justice. • Wed, 29 Apr 2026 • … [...]

NZ council cyber attack leads to ID and financial data being exposed

A cyber attack impacting a New Zealand city council has compromised the data of hundreds of people. • Wed, 29 Apr 2026 • Security *]:clear-none … [...]

Exclusive: NSW-based Strata Republic allegedly breached by Kairos ransomware group

Hackers claim to have stolen 441 gigabytes of data, including internal correspondence, driver’s licence scans and revealing Christmas party photos. • … [...]

Exclusive: Gelatissimo confirms unauthorised access, investigates DragonForce hack claims

Major Australian ice-cream retailer Gelatissimo has launched an investigation into claims made by hackers that the company was breached in a … [...]

Most Australians leaving data open to cybercriminals

Two-thirds of Australians are sharing key information that makes them easy targets for scammers and cyber criminals. The new research from the Department of Home Affairs also found more than [...]

NSW Treasury staffer charged over major data breach | 7NEWS

A 45-year-old New South Wales Treasury employee has been arrested and charged with accessing and downloading over 5,500 sensitive government documents containing confidential, commercial and financial information across multiple NSW [...]

Warning Anthropic's Mythos could pose cyber risk to banks and critical infrastructure | The Business

Australian banks, power providers and infrastructure firms do not have access to test their systems against a powerful new AI cybersecurity risk, Anthropic's Mythos. Anthropic has claimed Claude Mythos is [...]

Australian Army research paper advocates for Australian national cyber reserve force, volunteer cyber organisations

A newly published Australian Army Research Centre paper has highlighted the need for Australia to establish an Australian national cyber reserve … [...]

Generation Life informs customers of ‘cyber incident’ as owner shares incident with ASX

Australian investment firm Generation Life says there is no evidence of any unauthorised transaction, but is investigating a potential data breach. • … [...]

PAW 2026

On this page Privacy Awareness Week 2026 Trust is built here. In every privacy complaint. In every resolution. Privacy Awareness Week (PAW) is an annual … [...]

RentTech platforms must stop unfair and excessive personal information collection, says Privacy Commissioner

A determination issued today by the Privacy Commissioner finds that the 2Apply rental technology platform, operated by InspectRealEstate (IRE), … [...]

Shares
Share This

Discover more from Australian Cyber Aware

Subscribe now to keep reading and get access to the full archive.

Continue reading