Service Providers
Certified Service Providers are a vital part to protecting Australian Government data.
Certification under the Hosting Certification Framework ensures Service Providers are offering Australian Government customers secure hosting services.
The Framework applies to all Service Providers that deliver hosting services for Australian Government customers, including the facilities that host government data, their systems and supply chains.
The Hosting Certification Framework currently only applies to:
- Data Centre Providers; and
- Cloud Service Providers.
If you are a prospective Certified Service Provider or already certified, all the latest information and steps you need to take are below.
How we will work with you
The Hosting team will collaborate closely with Service Providers to determine the appropriate certification level for each organisation on a case-by-case basis.
Throughout the certification process, the Certification’s team will coordinate and collect evidence from your organisation, which may consist of documentation, physical site inspections and collaborative workshops (in-person and via video conference).
Through ongoing communication and support, the Certification’s team will provide guidance and resources to help Service Providers achieve and maintain certification.
Certification levels
The Hosting Certification Framework has three levels - Strategic, Assured and Uncertified.
Cybercrime remains one of the most prevalent risks facing the world today. It represents a current and emerging threat to national security and the digital economy as opportunistic cybercriminals take advantage of the systemic global instability caused by the COVID-19 pandemic.
Uplifting the protections for government data is of the utmost importance. It is therefore anticipated that most Australian Government entities may seek hosting services at the Certified Strategic level.
Strategic
Strategic Certification represents the highest level of assurance to Australian Government customers and offers the most secure storage solutions for government held data.
Certified Strategic Service Providers allow the Australian Government to specify ownership and control conditions.
Assured
Assured Certification provides Australian Government customers safeguards through financial penalties, against a Service Provider undertaking significant changes to their ownership, controls and operations, which may increase the risk profile of their government customers.
Compared to Strategic Certification, Assured Certification has:
- lower financial penalties for transition costs should the Service Provider breach Certification
- fewer reporting requirements to the Certifying Authority.
Government customers with a low-risk profile and data which has been deemed by the government customer as not requiring additional security protections may seek the services of a Certified Assured Service Provider.
Uncertified
Uncertified offers minimal protections to Australian Government customers. No application is needed for this third tier.
Government customers may use the services of an Uncertified Service Provider to host non-sensitive data, or where their internal risk assessment determines it appropriate to do so.
HCF Application and Readiness Guide
The HCF Application and Readiness Guide outlines the requirements for applying and achieving certification as a HCF Certified Service Provider. This guide provides a comprehensive summary of the certification requirements and what the Certifications team will be looking for during an assessment. By understanding the requirements in advance, Service Providers can prepare themselves before registering for certification.
The HCF Application and Readiness Guide is not an official assessment matrix or self-assessment tool.
Application Guide
Eligibility to apply for HCF Certification
The Hosting Certification Framework currently only applies to Data Centre Providers and Cloud Service Providers that provide hosting services directly to Australian government customers. To be eligible to apply for HCF Certification:
Data Centre Service Providers must be able to demonstrate:
- the entire data centre facility is constructed according to the appropriate zone specifications defined in the Protective Security Policy Framework (PSPF); or
- the data centre includes an area (enclave) used for the delivery of Government services that is constructed to to the appropriate zone specifications defined in the PSPF and has a discernible perimeter that separates it from the remainder of the data centre.
Cloud Service Providers must be able to demonstrate they only use data centre facilities, or enclaves that are either:
- certified under the HCF; or
- have been fully assessed and considered to satisfy the certification requirements.
Applying for HCF Certification
To register your interest to become certified under the Australian Government’s Hosting Certification Framework, please complete the Register your interest form on the Hosting Certification Framework website.
Contract arrangements with Government customers
Service providers that have registered their interest to apply for HCF Certification are able to respond to a market approach or enter contract negotiations for solutions that involve a hosting service component with Australian government customers at the certification level they have registered interest.
Readiness Guide
Category | Requirements |
Customer Due Diligence | An approach to due diligence that demonstrates how data is kept separate and secure when housing government and non- government data in the same building. Security arrangements and processes ensure separation of customers areas and restricted access across the facility. |
Security Vetting |
Assurance that personnel with access to secure areas within the facility and/or government data have relevant security clearances. Security clearance requirements depend on the type of role performed by different personnel.
The Certification’s team supports providers to understand how your personnel align with the requirements above. |
Ownership | Demonstrate that the majority of the company is owned by low-risk entities. Describe the structure of the company and how parties that control the organisation will exercise decisions consistent with the Commonwealth’s interests. |
Control, Strategy, and Direction | The company is structured and controlled by individuals and parties that exercise strategic and direction-setting decisions that consistent with the Commonwealth’s interests. |
Buildings, Land, and Infrastructure Ownership and Control | Communicate any risks associated with the ownership and control of the buildings, land and core infrastructure that support the facility. |
Physical Access Security | Demonstrate how the entire facility, or data halls within facilities that are in scope for certification, are constructed according to the appropriate zone specifications defined in the Protective Security Policy Framework (PSPF). Show how Government data is kept separate from non-government data. |
Monitoring Systems | Demonstrate that systems are used to monitor the security and availability of facility operations. An assessment of the risks associated with entities that own monitoring systems. |
Supply Chain Risk Management | Assurance that foreign entities within your supply chain do not pose risks to the Commonwealth. This includes the supply of critical services such as water, gas, and back-up power. Illustrate how risks are managed in practice through registers and processes. |
Highly Secure and Redundant Communications | Demonstrate how the facility manages secure backup systems and business continuity processes in the event of a disaster. |
Highly Secure and Suitable Certainty of Supply | Demonstrate how critical infrastructure and services, including water, fuel, gas, and Heating, Ventilation, and Air Conditioning (HVAC), remain resilient in the event of a disaster. |
Ancillary Services | Demonstrate that ancillary service providers are owned and controlled by low-risk entities. These services include facility security, cleaning, and technical maintenance are supplied by entities and personnel that do not pose risks to the Commonwealth. Illustrate that personnel provide these services for the minimum time required with restricted access to fulfil their duties. |
Remote Support Arrangements | Demonstrate how access and control is managed for remote support workers within and outside of Australia. |
Ongoing Compliance | Demonstrate how your company will undertake ongoing compliance with the framework and provide the Commonwealth with continuous assurance through monitoring and reporting. |
Relationship to Government | Commitment from the organisation that significant changes, including but not limited to, company ownership, the facility, services, and personnel, will be disclosed in a timely manner. |
Exclusive use of Certified Facilities by Cloud Service Providers | Cloud services are hosted in data centre facilities, or zones within a discernible perimeter, that are certified under the framework to the appropriate level. |
Data Protection | Demonstrate how data is protected at rest, during processing, and in transit. |
Quick references
The HCF forms a part of the Australian Government’s broader security policy ecosystem. The information sources below may assist providers in understanding the relationship between the HCF and other policies and frameworks.
Resource | Policy Owner | Relationship |
Protective Security Policy Framework (PSPF) | Attorney Generals Department | Policy 11 of the PSPF: Robust Information and Communication Technology (ICT) Systems, provides the mandate for the HCF. |
Information Security Manual (ISM) | Australian Signals Directorate | The ISM is a cyber security framework that agencies can apply, using their risk management framework, to protect their systems and data from cyber threats. |
Trusted Information Sharing Network (TISN) | Home Affairs - Cyber and Infrastructure Security Centre | TISN sectors enable critical infrastructure owners and operators to share information on threats and vulnerabilities. The sectors collaborate on appropriate measures to mitigate risk and boost resilience. |
Security of Critical Infrastructure (SOCI) and Systems of National Significance (SONS) | Home Affairs | The Security of Critical Infrastructure Act 2018 was amended in April 2022 to include enhanced cyber security obligations for systems of national significance. The Act includes a category for providers that deliver Data Storage of Processing services as defined under s12F. The definition encompasses assets that are critical to maintaining the supply and availability of data and cloud services located in Australia. To meet the requirements of the Act, providers must develop and maintain a Risk Management Program (RMP). However, providers that are HCF Strategic Certified are exempt from the RMP and are deemed to have fulfilled this requirement through the certification process. |
Defence Industry Security Program (DISP) | Defence Information Security Office (DISO) | DISP supports Australian businesses to understand and meet their security obligations. Membership provides the ability for an organisation to sponsor its own security clearances (not available for Entry Level membership). Although the program is primarily for Defence contracts, the Hosting team can liaise with DISO if exceptions are required. |
National Data Security Framework (NDSF) | Home Affairs | The framework sets out a long-term vision to create a national ecosystem of data that is accessible, reliable and relevant. It has three main tenets – maximising the value of data, trust and protection, and enabling data use. |
The Information Security Registered Assessors Program (IRAP) | Australian Cyber Security Centre | The Information Security Registered Assessors Program (IRAP) produces accredited assessors that conduct independent assessments of a system’s cyber security posture. The IRAP risk report can be used as evidence for HCF assessments. |
Security Construction and Equipment Committee (SCEC) | Attorney Generals Department | The Security Construction and Equipment Committee (SCEC) is a standing inter-departmental committee responsible for the evaluation of security equipment for use by government agencies. SCEC is also responsible for the SCEC Security Zone Consultant scheme. SCEC reports produced by accredited assessors are required for certification to ensure physical security requirements have been met. |
T4 Protective Security | Australian Security Intelligence Organisation (ASIO) | ASIO-T4 provides an ongoing advisory service for government clients and business enterprises. Advice may relate to perimeter security, access control measures, Closed-Circuit Television (CCTV), alarm systems, locks and other door hardware, advice on the construction of new buildings, security zone construction, guarding arrangements, security audits and administrative and personnel security. |
Privacy Act | Office of the Australian Information Commissioner | The Privacy Act 1988 (Privacy Act) was introduced to promote and protect the privacy of individuals and to regulate how Australian Government agencies and organisations with an annual turnover of more than $3 million, and some other organisations, handle personal information. The Privacy Act includes 13 Australian Privacy Principles (APPs), which apply to some private sector organisations, as well as most Australian Government agencies. |
Data Availability and Transparency Act 2022 | Office of the National Data Commissioner | The Data Availability and Transparency Act 2022 establishes the DATA Scheme under which Commonwealth bodies are authorised to share their public sector data with Accredited Users. Accredited Users are authorised to collect and use the data, where the requirements of the Act are met. The Act enables the sharing of public sector data consistently and use of appropriate security safeguards. |
Department of Foreign Affairs and Trade (DFAT Sanctions List) | Department of Foreign Affairs and Trade | The Consolidated Sanctions List contains all persons and entities listed under Australian sanctions laws. Listed persons and entities are subject to targeted financial sanctions. To meet the “Customer Due Diligence” requirement, Service Providers are required to demonstrate that entities on this list do not have access to facilities. |
Hosting Certification steps
-
1. Review the HCF Readiness Guide
Service Providers review the HCF Readiness Guide to ensure they are ready to undertake assessment under Hosting Certification Framework.
-
2. Register interest
Service Providers register their interest to be certified under the Hosting Certification Framework.
-
3. Complete assessment pack
Service Providers submit a series of forms to complete the application process.
-
4. Formal assessment
Applicants undergo the Certification Assessment process, which on average can take 3 to 6 months.
-
5. Outcome notification
Applicants are notified of the Certification Assessment outcome and if successful are provided with Certification ID/s.
-
6. Maintain Certification
Certified Service Providers comply with ongoing reporting requirements to maintain Certification.
Service Providers frequently asked questions
-
The Hosting Certification steps can be found here.
-
Assessments may take on average between 3 to 6 months to complete.
The length of time to complete the Certification Assessment process will differ according to each Service Provider’s circumstance. For example:
- size and number of third parties
- cooperation with the process and ability to provide the relevant documentation.
-
The Certifying Authority publishes a list of Service Providers who have achieved Strategic or Assured Certification for their nominated service(s). This can be found here.
-
Certifications require ongoing maintenance. To maintain Certification, a Service Provider must:
- report on any potential or up-coming Relevant Change that may adversely affect the Commonwealth
- complete a Service Provider Contract form biannually
- undertake a Certification review annually
- maintain compliance with the Hosting Certification Frameworks minimum mandatory requirements.
-
HCF requirements apply to new contracts and extensions to existing contracts for hosting services from 30 June 2022. Extensions to contracts with service providers awaiting certification are restricted to a maximum of 1 year, with the option of a 1 year extension.
Where certification of a service provider is pending, government customers may apply for an exemption.
Uncertified Service Providers may continue to supply services to government customers that do not require the provision of certified services.
Service Providers wishing to be Certified can register their interest to be certified at any time using the Registration of Interest Form.