Guarding the Grid: How the AESCSF is Enhancing the Cybersecurity of Australia’s Energy Sector
State of the sector and the importance of uplifting cybersecurity
The energy sector plays a fundamental role in the functioning of society. When energy infrastructure is compromised, the world stops; purchases cannot be made, surgeries cannot be performed, and transportation is brought to a halt. Cyber-attacks on the energy sector are on the rise, with threat actors increasingly capitalising on exploitable security vulnerabilities within the industry – which raises the question: What’s fuelling these attacks and what makes the energy sector such a shiny target?
Utility organisations are currently in the midst of a perfect storm, with rapid digitisation of Operational Technology (OT) assets opening the floodgates for malicious actors to infiltrate these critical organisations. With thousands of devices constantly connecting to OT assets via the Internet of Things (IoT), and the blurring of traditional IT with OT devices, the potential for attacks on the power grid increases daily, with a recent report from the Australian Signals Directorate (ASD) drawing attention to a cluster of strikes on energy companies and infrastructure in 2022. Whilst there are a number of reasons that could be fuelling these attacks -profit, terrorism, and geopolitical reasons amongst them – mass disruption is at the root of these attackers’ agendas.
One of the key factors driving this fascination with the energy sector is the widespread attack surface and plethora of possible targets. Attacks on these utilities have the potential to impact the entire value chain, from generation and transmission, through to distribution and networks; regularly resulting in operational disruption, power failures, property and environmental damage, and in some cases, physical injury.
The sector presents a challenging operational landscape as the electricity and gas sector possess unique interdependencies between physical and cyber infrastructure. Unfortunately, many OT systems still rely on legacy technology that host inherent vulnerabilities and just aren’t built with cybersecurity in mind. These systems are also only serviceable by a couple of Vendors whose priority is functionality over security, thus inadvertently introducing attack vectors into the digital ecosystem. As such, these attributes amplify organisations’ vulnerability to exploitation, and raises significant concerns surrounding the security of these critical assets.
A spokesperson from the Department of Home Affairs (DHA) has made it abundantly clear that “we cannot afford for our electricity grid to be riddled with exploitable cyber security vulnerabilities”. Thus, we arrive at the Australian Energy Sector Cyber Security Framework (AESCSF), and how it can be applied to proactively safeguard your data.
What is the AESCSF framework and who does it apply to?
The Australian Energy Sector Cyber Security Framework (AESCSF) was developed explicitly for the Australian energy sector in response to the heightened cyberthreat that continues to taunt the industry. Since its first release in 2018, the Framework has been refined to better cater for organisations of varying maturity and criticality, and closely maps to a number of international and Australian Cybersecurity standards, including the NIST CSF, ISO 27000 series, IEC 62443 series, and the Privacy Act 1988 (Cth).
Serving as both a cybersecurity framework and an annual assessment program, the AESCSF provides a standardised approach for organisations to assess their current state of security capabilities and maturity, and ensure they are well equipped and prepared should a cyber-attack eventuate. Moreover, the framework allows organisations to benchmark themselves against other organisations in the energy sector. Whilst the assessment is still voluntary, we strongly recommend that all organisations within the energy sector complete it to gain visibility of their current cyber security posture ensure appropriate controls are in place to prevent any future attacks.
The assessment itself consists of two components. The first is performed using a Criticality Assessment Tool (CAT) which determines your organisation’s criticality within the energy sector. Whether you are an electricity, gas or liquid fuels organisation, there is a specific CAT that aligns to your needs (keep in mind that if you operate in more than one energy sub-sector (you have both electricity and gas assets, for example) the respective criticality assessment must be done for each sub-sector). The overall criticality of your organisation is subsequently determined by which sub-sector scored the highest. Finally, each criticality rating is aligned to a respective Security Profile (SP) rating, from 1 (lowest) to 3 (highest).
The second component of the AESCSF is a maturity assessment which examines the security practices in place across 11 domains, and assesses their maturity using a progressive approach. The respective domains are:
- Risk Management
- Cybersecurity Program Management
- Workforce Management
- Identity and Access Management
- Asset, Change and Configuration Management
- Event and Incident Response, Continuity of Operations
- Situational Awareness
- Threat and Vulnerability Management
- Australian Privacy Management (Australian Specific)
- Cybersecurity Architecture
- Supply Chain and External Dependencies Management.
The AESCSF has three different maturity assessments, however, the model selected for the organisation is dependent on the results from the CAT assessment. Each assessment model consists of a pre-determined number of practices which must be in place, as well as anti-patterns (‘bad’ activities which undermine the effectiveness of cyber security capabilities) which must not exist. Conducting this assessment gives you visibility of the percentage of practices your organisation meets for each domain, thus enabling you to determine your cyber security maturity level, and establish a plan to address the identified gaps.
Conducting an AESCSF assessment annually provides organisations with a better understanding of their current state, pinpointing where controls are deficient, where further uplift may be required, and where cybersecurity controls are in place and operating effectively. From these findings, a remediation process can be established, leaving the organisation better equipped to prevent and address possible cyberattacks.
Threat actors are getting smarter by the minute, frequently targeting the weakest link when setting out on their destructive rampage against critical assets. More than ever before, entities in the energy sector must have comprehensive awareness of their operating environment, and a proactive approach to cyber security.
How can we help?
Unfortunately for under-resourced and over-capacity cyber teams, the AESCSF shouldn’t be considered an optional or ‘one and done’ kind of assessment; organisations should be looking to embed the AESCSF as an annual component of their existing security program, to ensure visibility of their cyber threat landscape is gained and cyber security resilience is established.
That’s where RightSec comes in – our specialist team provides high-quality cyber security services to organisations of all sizes. With extensive knowledge surrounding the international standards that have shaped this framework, and experience in performing AESCSF assessments, we can help you understand your AESCSF needs, and support you on your AESCSF alignment journey.
Contact us today to learn more about how we can help you protect your organisation and become a security champion for Australia’s energy sector.
Want to learn more?
Find out how RightSec can help your organisation enhance their security posture with our Cyber Strategy and Consulting services.

Ellaina Kriketos - Author
CYBER SECURITY ADVISOR
References
The energy sector threat: How to address cybersecurity vulnerabilities | McKinsey
IT and OT cybersecurity: A holistic approach (securityintelligence.com)
How energy sector CISOs can show cybersecurity’s value | EY – US
Cybersecurity: Don’t be a sitting duck for energy sector hackers | Enlit World
Bowen seeks $14 million to help AEMO fight cyber crime on grid | RenewEconomy


