Skip to content

The GRC buyer’s guide for 2025: Building resilience with AI-powered, federated solutions

Discover the ultimate GRC buyer's guide for 2025! Uncover how AI-powered, federated solutions transform compliance and security management for industries like government, aerospace, banking, and more. Learn about centralized control, continuous compliance, and advanced cyber GRC capabilities. Download now!

Group 193 (1)-1

The GRC buyer’s guide for 2025: Building resilience with AI-powered, federated solutions


Yes, the Protective Security Policy Framework (PSPF) is mandatory for non-corporate Commonwealth entities. The PSPF outlines the minimum security requirements for the protection of Commonwealth assets, personnel, information and systems. The PSPF is developed and maintained by the Attorney-General's Department and applies to all non-corporate Commonwealth entities.

It is mandatory for all non-corporate Commonwealth entities to comply with the PSPF in order to protect Commonwealth assets, personnel, information and systems. The PSPF is supported by the Australian Government Security Vetting Agency, which provides security clearances to personnel within the Commonwealth and provides advice and guidance on the implementation of the PSPF.

In addition to the PSPF, non-corporate Commonwealth entities must also report to their portfolio minister and the Attorney-General's Department each financial year on security. This is to ensure that the security of Commonwealth assets, personnel, information and systems is maintained and that any breaches of the PSPF are reported and addressed.

General thought leadership and news

Top 7 risk management challenges in 2025 and how to overcome them

Top 7 risk management challenges in 2025 and how to overcome them

In 2025, risk is no longer just a compliance issue. It's a core element of business strategy, affecting everything from revenue to reputation. For...

Essential foundations: Key objectives of information security your business must know

Essential foundations: Key objectives of information security your business must know

Information security isn’t just about firewalls and access controls anymore. For modern enterprises, it’s about enabling growth, protecting digital...

Mastering risk management: Essential strategies for effective risk identification

Mastering risk management: Essential strategies for effective risk identification

With today's advanced threat landscape, identifying risks early is more than just a compliance requirement. It's a crucial step in establishing a...

Unlocking savings: How to manage compliance costs without sacrificing quality

Unlocking savings: How to manage compliance costs without sacrificing quality

Compliance costs are climbing; driven by a steady stream of new regulations, mounting audit demands, and shrinking internal capacity. For...

Breaking down GRC silos: Strategies for integrated governance, risk, and compliance

Breaking down GRC silos: Strategies for integrated governance, risk, and compliance

Managing governance, risk, and compliance (GRC) across multiple entities, business units, or regions often creates fragmented operations — each with...

Structure at each step: Introducing entry requirements in risk workflows

Structure at each step: Introducing entry requirements in risk workflows

Effective risk management starts with a well-defined process. That means setting clear requirements and expectations at every stage of the risk...