Friday, November 20, 2020

Should Australian Government websites be taking more steps to protect privacy and security?

 

JobMaker is nowhere near bold enough. Here are four ways to expand it (The Conversation Nov 10, 2020)

The government has targeted its JobMaker Hiring Credit too narrowly.

Continue reading 


Should Australian Government websites be taking more steps to protect privacy and security?

Dr Nik Thompson and Dr Anna Bunn CURTIN UNIVERSITY

E-government continues to be embraced by the global community as more public services transition online. Advances in information and communications technology (ICT) have enabled the delivery of new types of government services, through a variety of digital channels such as email, smartphones, tablets and smart cards. Central to e-government is the ability to deliver government information and services to support business and the wider community, while also saving time and reducing cost.1


However, the expectation for e-government systems to connect to the internet brings with it many cyber security challenges. According to the Australian Cyber Security Centre (ACSC), 427 security incidents affecting Commonwealth Government entities occurred in 2019, many of which were “high-profile and complex” and “had the potential to affect the ability of the Australian Government to effectively serve the public and keep their trust”.2 State government entities have also experienced cyber incidents: in 2020, for example, Service NSW, the State’s official portal for various government services, reported that the personal information of 186,000 customers and staff had been exposed following a cyber-attack.3 Despite the increased adoption of digital services by Australian Government entities, it is clear from the Commonwealth Government’s investigations that the cyber maturity of federal government agencies needs to be improved.


The United Nations E-Government Development Index ranks Australia fifth out of 193 countries in the world.4 Alarmingly, Australia is also the most targeted country in the Asia-Pacific region for cybersecurity attacks5 and in June 2020 the Australian Prime Minister revealed that Australia was subject to an increasing level of sophisticated cyber-attacks across all sectors, including every level of government.6 Given the Australian Government’s goals of making all government services digitally accessible by 2025 and earning public trust through being “strong custodians” of data,7 there is a clear need for appropriate security measures within e-government.

W


Though this is a topic of widespread interest and relevance, actual data from security audits are scarce. Members of the public have a reasonable expectation that their private data will be protected, but in reality, this expectation is not always met.8 The following sections of this paper report on an audit of Hypertext Transfer Protocol Secure (HTTPS) (website) security in a sample of government websites in Australia.

Website encryption


HTTPS is an extension of the protocol used by browsers when accessing and loading web pages over the internet. Though the name may be unfamiliar, users may recognise the padlock symbol typically displayed in their web browser to indicate that the connection can be considered secure. Originally developed in 1994, this is a mature technology and is compatible with all modern web browsers and smartphone devices. The use of HTTPS provides protection against two major classes of security vulnerability when transacting on the web: eavesdropping and impersonation.


Eavesdropping attacks are possible on the internet due to its open nature and the mechanism whereby user data is passed through many intermediaries en route to its destination. Without the encryption provided by HTTPS, any one of these intermediaries can eavesdrop on the communications that are taking place.


Impersonation can occur when a convincing forgery of a website is placed online by an attacker. Users may mistake this website for a genuine service, and unwittingly share their personal or financial details with the attacker. HTTPS can also protect this class of attack through the deployment of website certificates. These certificates provide a chain of trust, enabling a trusted certification authority to vouch for the authenticity of a website.


Sites using Hypertext Transfer Protocol (HTTP) as opposed to the encrypted HTTPS standard are therefore considered a security risk due to the possibility of exposing sensitive data.9 Unencrypted connections can be vulnerable to eavesdropping and website impersonation, thereby allowing unauthorised access to user data such as “browser identity, website content, search terms, and other user-submitted information”.10

Survey of Australian Government sites


Twenty Australian federal and state government websites were selected at random and audited during 2019 to catalogue the presence of privacy policies and the use of encryption. Interested readers may also find a more detailed security audit linked in the footnote.11


All sites generally fared well in terms of policy coverage, with every site containing a privacy policy, and all but three sites also containing an additional security policy. Privacy policies uniformly covered the main topics around the collection of personal information, the reasons for collecting information and the use of cookies. They also provided further information on how to access personal information held by the relevant department, and how to seek the correction of that information. As expected, these policies align with the requirements of the Australian Privacy Principles (APPs) as set out in the Privacy Act 1988 (Cth). Universal uptake of privacy policies indicates that this is a well-understood requirement and is standard fare for a government website.


Website encryption, on the other hand, was alarmingly under-utilised, as only half of the tested Australian Government sites forced the use of encryption in the form of HTTPS (in other words, these sites allow only encrypted communications). Some sites provided optional encryption by running both HTTP and HTTPS accessible sites, leaving room for what are known as “downgrade attacks” in which attackers simply target the least secure protocol available.12 Further investigation also revealed technical deficiencies in the form of misconfiguration. Five websites which did not force encryption provided it as an option, yet these contained misconfigurations such as expired or invalid certificates leading to a browser error.

Implications for practice


The results of this survey of HTTPS encryption are cause for concern, as they suggest that this fundamental and easily implemented form of security protection is not widely adopted. The fact that only half of Australian Government services sites forced the use of HTTPS contrasts with figures from the US, where there is 74% adoption of HTTPS across federal government.13 The US position can be attributed to a combination of legislation in the form of the HTTPS-Only Standard14 and transparency, as compliance of federal government websites is publicly displayed.


In terms of the Australian legislative framework, all federal government agencies are bound by the Privacy Act. State government agencies are subject to state-based privacy frameworks, some (but not all) of which contain principles similar to those of the APPs. APP 11 relates to the security of information and provides that a relevant entity that holds personal information “must take such steps as are reasonable in the circumstances to protect the information … (a) from misuse, interference and loss; and (b) from unauthorised access, modification or disclosure”. In determining what protective measures are reasonable in any given case, the Office of the Australian Information Commissioner advises that consideration must be given, among other things, to the nature of the entity holding the information, including:

• its size, available resources and complexity of operations

• the amount and type of information held and

• the “practical implications of implementing the security measure, including time and cost involved”.15

Given that HTTPS encryption is supported on all modern computers and mobile devices and that the forcing of HTTPS is a measure that is both easily and cheaply implemented, it would seem that the use of HTTPS for all government websites is a reasonable step to secure personal information.


Additionally, federal government agencies must be governed in a way that is “not inconsistent with the policies of the Australian Government”.16 Relevantly, these include the Attorney-General’s Department’s Protective Security Policy Framework (PSPF) and the Australian Signals Directorate’s Australian Government Information Security Manual.


The PSPF sets out four core requirements for information security, two of which are relevant here: namely the requirement to safeguard information from cyber-attacks, and the requirement to ensure robust ICT systems. In terms of the first of these requirements, federal agencies must, as a minimum, implement certain strategies to mitigate cyber security incidents.17


In terms of the need to ensure robust ICT systems, government agencies must apply the Australian Government Information Security Manual’s cyber security principles. These principles include those that are designed to reduce security risks through the implementation of security controls (the protect principles). The protect principles require, among other things, that systems and applications are “configured to reduce their attack surface” and “administered in a secure … manner”. They also require measures to be taken to identify and mitigate security vulnerabilities and to ensure that information is “encrypted at rest and in transit between different systems”. The use of HTTPS encryption for government services websites therefore appears to be a necessary, albeit insufficient, condition for demonstrating adherence to the principles. More specifically, guidelines issued by the Australian Signals Directorate in relation to web application development recommend that: “All web application content is offered exclusively using HTTPS.”


Although our security audit revealed some concerning findings with the security of government websites, the Australian Government’s recent launch of its 2020 Cyber Security Strategy will hopefully drive continued improvements in the extent to which personal information is protected across all levels of government. There is some evidence that the forcing of HTTPS by government websites has already improved since the audit reported here was undertaken.


The near ubiquity of modern internet and communications media will continue to drive further adoption of e-government web platforms. However, it is probably also fair to say that the level of public trust in the security of information provided to such sites could be improved. Thus, the focus for the public sector must evolve from solving technical questions of how to deliver services online (which questions have, for the most part, already been resolved) into how to assure that these online services are the most effective, usable and safe for citizens.


After all, as observed in a recent report prepared by the Australian Cyber Security Growth Network:


The growing economic dependency on the digital domain has an intrinsic relationship with the trust users and consumers have in it and therefore the security, privacy and resilience of the infrastructure and data.18

 

Dr Nik Thompson

 
 

Senior Lecturer, Faculty of Business and Law

 
 

Curtin University

 
 

nik.thompson@curtin.edu.au

 
 

www.curtin.edu.au

 
 

https://nikthompson.com

 
   
 

Dr Anna Bunn

 
 

Senior Lecturer, Faculty of Business and Law

 
 

Curtin University

 
 

Anna.Bunn@curtin.edu.au

 
 

www.curtin.edu.au

 

1 F Bélanger and L Carter “Trust and risk in e-government adoption” (2008) 17(2) The Journal of Strategic Information Systems 165.

2 The Commonwealth Cyber Security Posture in 2019: Report to Parliament (2020) 3 www.cyber.gov.au/sites/default/files/2020-04/Commonwealth-Cyber-Security-Posture-2019.pdf .

3 M Bungard “Data of 186,000 customers leaked in Service NSW cyber attack” The Sydney Morning Herald 7 September 2020 www.smh.com.au/national/nsw/data-of-186-000-customers-leaked-in-service-nsw-cyber-attack-20200907-p55t7g.html .

4 United Nations, UN E-Government Knowledgebase, accessed 16 October 2020, https://publicadministration.un.org/egovkb/en-us/data/compare-countries .

5 Cisco Systems Cisco 2018 Asia Pacific Security Capabilities Benchmark Study: Regional Breach Readiness (2018) www.cisco.com/c/dam/global/en_au/products/pdfs/cisco_2018_asia_pacific_security_capabilities_benchmark_study.pdf .

6 The Hon S Morrison “Statement on Malicious Cyber Activity Against Australian Networks” media release (19 June 2020) www.pm.gov.au/media/statement-malicious-cyber-activity-against-australian-networks .

7 Digital Transformation Agency Vision 2025: We Will Deliver World-Leading Digital Services for the Benefit of All Australians (2018) www.dta.gov.au/digital-transformation-strategy/digital-transformation-strategy-2018-2025 .

8 N Thompson, R Ravindran and S Nicosia “Government data does not mean data governance: Lessons learned from a public sector application audit” (2015) 32(3) Government Information Quarterly 316.

9 J Franks and others “HTTP Authentication: Basic and Digest Access Authentication” (1999) https://pdfs.semanticscholar.org/f747/e8a413a8375fa8663b9680a9f7f7a7736580.pdf?_ga=2.101671233.178064011.1602809539-217975968.1602809539 .

10 United States Government, The HTTPS-Only Standard, https://https.cio.gov/ .

11 N Thompson, A Mullins and T Chongsutakawewong “Does high e-government adoption assure stronger security? A cross-country analysis of Australia and Thailand” (2019) 37(1) Government Information Quarterly 101408.

12 E Alashwali and K Rasmussen What’s in a Downgrade? A Taxonomy of Downgrade Attacks in the TLS Protocol and Application Protocols Using TLS (paper presented at the International Conference on Security and Privacy in Communication Networks, Singapore, 2018).

13 United States Government, Digital Dashboard, 5 October 2020, https://digitaldashboard.gov/ .

14 Above n 10.

15 Office of the Australian Information Commissioner Australian Privacy Principles Guidelines: Privacy Act 1988 (2019) para 11.7 www.oaic.gov.au/assets/privacy/app-guidelines/app-guidelines-july-2019.pdf .

16 Public Governance, Performance and Accountability Act 2013 (Cth), s 21.

17 Attorney-General’s Department (Cth), The Protective Security Policy Framework, 28 July 2020, www.protectivesecurity.gov.au/ .

18 Australian Government, Australian Cyber Security Growth Network Australia’s Digital Trust Report 2020 (July 2020) ii www.austcyber.com/resource/digitaltrustreport2020 .