avatar

The Irrational Security Monologue

  Published by: Joffy, Category: Information Security, Views: 10, Date: 2013-06-02

ISM2013-04 In XML Completed

A bit slow on this one, but I have finished converting through the new ISM to XML, and it's rendering rather nicely in the browser. This time I updated the original XML tag-format to be more useful, check out an excerpt if you're interested:

<manual>
    <title>Australian Government Information Security Manual 2013</title>
    <part>
        <title>Introduction</title>
        <chapter>
            <title>Australian Government Information Security Manual 2013</title>
            <section>
                <misc>
                    <block>
                        <content>
                            <para>© Commonwealth of Australia 2013</para>
                            <para>
                                All material presented in this publication is provided under a Creative Commons Attribution 3.0 Australia licence. For the avoidance of doubt, this means this licence only applies to material as set out in this document.
                                The details of the relevant licence conditions are available on the Creative Commons website as is the full legal code for the CC BY 3.0 AU licence.
                                http://creativecommons.org/licenses/by/3.0/au/deed.en http://creativecommons.org/licenses/by/3.0/legalcode
                            </para>
                        </content>
                    </block>
                    <block>
                        <title>Use of the Coat of Arms</title>
                        <content>
                            <para>
                                The terms under which the Coat of Arms can be used are detailed on the Department of the Prime Minister and Cabinet's website.
                                http://www.dpmc.gov.au/guidelines/index.cfm
                            </para>
                        </content>
                    </block>
                    <block>
                        <title>Contact</title>
                        <content>
                            <para>Inquiries regarding the licence and any use of this document are welcome at: Defence Signals Directorate, PO Box 5076, Kingston, ACT, 2604, phone 1300 CYBER1 (1300 292 371), email [email protected].</para>
                        </content>
                    </block>
                </misc>
            </section>
            <section>
                <title>Foreword</title>
                <misc>
                    <block>
                        <content>
                            <para>Advances in information technology have greatly benefited the conduct of government and commercial business, and have become essential to everyday communication. Information technology is providing greater accessibility, mobility, convenience and, importantly, efficiency and productivity. Australia’s prosperity is dependent on taking full advantage of the digital revolution and all it offers.</para>
                            <para>But advances in information technology can be a double-edged sword. Australian networks, whether government, commercial or personal, are facing an unprecedented level of intrusion activities. Threats to information can come from a wide range of sources, including individuals, issue motivated groups, organised criminal syndicates and nation states.</para>
                            <para>It is important to know that things can be done to mitigate the security risks presented by this evolving threat environment. The Defence Signals Directorate supports agencies in embracing the latest technology by providing the information and tools which enable them to minimise the risks involved. Ultimately, technology will change faster than people’s behaviour around it. Helping people make better decisions about new technology will allow us to stay ahead of the curve.</para>
                            <para>The Australian Government Information Security Manual forms an important part of the Government’s strategy to enhance its information security capability. The Manual comprises three complementary documents designed to provide greater accessibility and understanding at all levels of government. The controls manual provides a set of detailed measures which can be implemented to help mitigate security risks to agencies’ information and systems.</para>
                            <para>I encourage you to apply the controls described here and to ensure you have effective security governance arrangements in place. Doing so will provide assurance that the information entrusted to you is properly protected.</para>
                            <para>Ian McKenzie, Director, Defence Signals Directorate</para>
                        </content>
                    </block>
                </misc>
            </section>
        </chapter>
    </part>
    <part>
        <title>About Information Security</title>
        <chapter>
            <title>Using This Manual</title>
            <section>
                <title></title>
                <objective>
                    <block>
                        <content>
                            <para>The Australian Government Information Security Manual (ISM) is used for the risk-based application of information security to information and systems.</para>
                        </content>
                    </block>
                </objective>
                <scope>
                    <block>
                        <content>
                            <para>This section describes how to interpret the content and layout of this manual.</para>
                        </content>
                    </block>
                </scope>
                <context>
                    <block>
                        <title>Purpose of the Australian Government Information Security Manual</title>
                        <content>
                            <para>The purpose of this manual is to assist Australian government agencies in applying a risk-based approach to protecting their information and systems. While there are other standards and guidelines designed to protect information systems, the advice in this manual is specifically based on activity observed by the Defence Signals Directorate (DSD) on Australian government networks. The security controls are therefore designed to mitigate the most significant threats to Australian government agencies.</para>
                        </content>
                    </block>
                </context>
            </section>
        </chapter>
    </part>
</manual>

You get the picture; I'm thinking of ditching the original DSD format and making my own, but that's a crazy amount of work; maybe the next revision


← Back to Blog Home