Requirements for Microsoft 365 capability mapping for Australian Government compliance with PSPF

This article is a key component of the Australian Government Information Protection Guide. It lists Protective Security Policy Framework, Information Security Manual (ISM), andAustralian Government Recordkeeping Metadata Standard (AGRkMS) requirements. It also provides advice on how Microsoft Purview and other Microsoft 365 capabilities can meet the stated requirements and provides links to other sections of the guide where these capabilities are further discussed. The article also provides guidance on state government frameworks, such as the Victorian Government Victorian Protective Data Security Framework (VPDSF).

Protective Security Policy Framework

The Protective Security Policy Framework (PSPF) is a set of policies designed to support Australian Government entities to protect their people, information, and assets. The PSPF outlines the requirements for entities to achieve the Government's desired protective security outcomes.

More information about PSPF, see Protective Security Policy Framework.

The PSPF policies that relate closely to Microsoft Purview Information Protection configurations are:

Key to understanding PSPF application to email services is PSPF Policy 8 Annex F: Australian Government Email Protective Marking Standard, which is referenced in this document.

PSPF includes a reporting mechanism that allows organizations to report on their level of maturity across the various PSPF policies. The intent is that this guide allows organizations with low levels of maturity to improve their PSPF Policy 8 and Policy 9 maturity to 'Managing' or 'Embedded' levels with reduced effort. For more information on PSPF maturity levels, see: Protective Security Policy Framework Assessment Report 2022-23

PSPF Policy 8: sensitive and classified information

Requirements are based on PSPF Policy 8 requirements V2018.8 (updated August 30 2023).

PSPF Policy 8 details how entities correctly assess the sensitivity or security classification of their information and adopt marking, handling, storage, and disposal arrangements that guard against information compromise.

This policy is split into core and supporting requirements. Comments on Microsoft 365 capabilities that align with the requirements and links to the relevant guidance on this site are provided in the following table. The policy can also be read in full at PSPF policy 8: Sensitive and classified information.

Core requirement A and supporting requirement 1: Identifying information holdings

Solution capability Section
Require users to identify the sensitivity of items (Files and Emails) via sensitivity labels. Labeling client experience

Mandatory labeling

Sensitivity labeling PDF integration
Apply protective markings to locations (Sites and Teams) and apply protections to marked locations. Sensitivity label groups and sites configuration
Define the sensitivity of meetings and implement associated operational controls. Sensitivity labeling for calendar items and teams meetings
Require users to identify the sensitivity of Power BI workspaces via sensitivity labels. Power BI and data integration
Apply labels to sensitive information residing in database systems. Schematized data assets
Apply email headers, which can be used to identify the sensitivity of incoming items and apply appropriate controls. Labeling of email during transport

Core requirement B and supporting requirement 2: Assessing sensitive and security classified information

Solution capability Section
Provide users an opportunity to assess the value, importance, and sensitivity of items when selecting a sensitivity label. Mandatory labeling
Guide users in the assessment of item sensitivity through label pop-up dialogue boxes containing label descriptions, visible during label selection. Label description for users
Provides the ability to configure an organization specific Learn more link that is accessible from label selection menu and can provide users with further advice regarding appropriate labels for types of information. Custom help page
Assists users in the assessment of information holdings by detecting under-classified items and recommending reevaluation where appropriate. Recommending labels based on sensitive content detection
Assists with the assessment of information by identifying sensitive data that is taken from or exists within database applications or similar platforms. Exact Data Match Sensitive Information Types
Assist with the assessment of information by utilizing machine learning to identify items that would typically be regarded as sensitive. Trainable classifiers
Assist users in the assessment of information holdings by recommending labels that align with markings applied by external organizations. Recommendations based on external agency markings
Assist users in the assessment of information holdings by recommending labels that align with historical markings. Recommendations based on historical markings

Auto-labeling Items with historical security classifications
Assist users in the assessment of information holdings by recommending labels that align with markings that have been applied by non-Microsoft classification solutions. Recommendations based on markings applied by non-Microsoft tools
Assisting with the assessment of information by providing visual notifications to users via DLP Policy Tip when sensitive information is detected in an item. DLP policy tips ahead of violation
Identify sensitive information residing within database systems, label the information in place and allow for the label to be inherited on downstream systems. Power BI and Azure Purview

Microsoft Purview Data Map

Core Requirement C: Implement operational controls for these information holdings proportional to their value, importance, and sensitivity

Solution capability Section
Prevent the inappropriate distribution of security classified information by using Data Loss Prevention (DLP) policies based on sensitivity labels. Protecting classified information
Prevent the inappropriate distribution of sensitive information by using Data Loss Prevention (DLP) policies targeting sensitive content. Protecting sensitive information
Provide visual markings on individual items that reflect the security classification applied to information within the item. Sensitivity label content marking
Provide visual markings that reflect the highest level of sensitivity that should exist within a location (site or team). Sharepoint location and item sensitivity
Configure location privacy settings based on the sensitivity applied to the location. Label privacy settings
Enable or disable guest access to a location and to items within a location based on the locations applied label. Guest access configuration
Control Microsoft 365 sharing configuration for a SharePoint based location (site or Team) depending on the label applied to the location. Label sharing configuration
Provide user notification and alerting for highly sensitive items located in lower sensitivity locations. Data out of place alerting
Configure other requirements for access to highly sensitive locations (sites or Teams). For example, from unmanaged devices, unsafe devices, or unknown locations. Conditional access

Authentication context

Protecting classified information

Controlling sharing through adaptive protection
Encrypt highly sensitive items to prevent access by unauthorized users, regardless of an item’s location. Sensitivity label encryption
Configure access and usage restrictions for groups of internal users or guests. Allocating label encryption permissions
Restrict the movement of security classified items and/or their contained information to locations where access or further distribution of their enclosed information can't be controlled. Preventing download or print of security classified items

Preventing upload of security classified items to unmanaged locations

Supporting requirements

Requirement 1: Identifying information holdings

There are no extra supporting requirements beyond the core requirements.

Requirement 2: Assessing sensitive and security classified information

There are no extra supporting requirements beyond the core requirements.

Requirement 3: Declassification

Solution capability Section
Record an auditable trail of all label related activities, including the removal or lowering of applied sensitivity labels.

Record label change activities including the user who made the change and their justification for doing so.
Label change justification

Audit log
Apply encryption to items that restrict internal or guests ability to modify items, preserving the item and applied marking/classification. Allocating label encryption permissions
Locking items in place to prevent any item changes, including the ability to change the applied sensitivity label. Label 'lock' approach
Report on users who are undertaking activities deemed to be risky to information security, including label downgrade and exfiltration sequences. User-risk based approach

Monitoring Sharing through Insider Risk Management

Controlling sharing through adaptive protection
Implement DLP policies to detect protective markings within items alert if the currently applied label is lower than the identified marking. Implications to malicious label downgrade

Requirement 4: Marking information

Solution capability Section
Office clients provide clear identification of an item’s sensitivity via client-based label markings. Labeling client experience
Apply text-based protective markings to mark sensitive and security classified information. Sensitivity label content marking

Information marking strategies
Apply colour-coded markings to assist users with sensitivity identification. Label color
Apply protective markings via email metadata (x-headers). Applying x-protective-marking headers via DLP policy
Apply protective markings via email subject. Applying subject-based email markings
Apply markings to locations, such as sites or Teams. These markings identify the highest level of item sensitivity that should exist at the location/container. Data out-of-place alerting
Clearly identify item sensitivity to users when working in SharePoint-based directories (sites, Teams, or OneDrive). SharePoint location and item sensitivity

Requirement 5: Using metadata to mark information

Solution capability Section
Index Security Classification and Security Caveat and Dissemination Limiting Marker properties via SharePoint search, aligning with AGRkMS requirements. Managing classification and caveat metadata
Apply X-Protective-Marking x-headers to meet email metadata requirements as per PSPF Policy 8 Annex F. Applying x-protective-marking headers via DLP policy
Apply metadata to database columns containing sensitive information in connected database systems. Power BI and data integration

Requirement 6: Caveats and accountable material

Solution capability Section
Mark caveated information and associated Dissemination Limiting Markers (DLMs) or classification via sensitivity label structure. Required sensitivity label taxonomy
Mark caveats on associated items via text. Sensitivity label content marking

Subject-based markings
Record all incoming and outgoing material transfer. Audit log
Apply Caveat distribution and/or access restrictions. Limiting distribution of sensitive information

Sensitivity label encryption

Requirement 7: Minimum protections and handling requirements

Solution capability Section
Information stored in Microsoft 365 datacenters is encrypted at rest via BitLocker encryption. Encryption overview
Require TLS encryption for email-based transmission of sensitive items, ensuring that they're encrypted when transferred via public networks. Requiring TLS encryption for sensitive email transmission
Configure granular access control to marked locations (sites or Teams) and block users, devices, or locations who don't meet access requirements or clearance. Unmanaged device restrictions

Authentication context
Maintain need-to-know principles by restricting sharing, guest access, and controlling the privacy configuration of marked locations. Sensitivity label groups and sites configuration
Apply DLP policies to help ensure need-to-know and restrict the distribution of items to unauthorized or uncleared internal users and external organizations. Limiting distribution of sensitive information
Encrypt sensitive or security classified items, providing access control and ensuring that only authorized users have access to the contained information, regardless of the item’s location. Sensitivity label encryption
Apply protections, including encryption, sharing, and DLP related controls to exports or PDFs generated from labeled source systems. Power BI and data integration
Identify items marked with historical security classifications and either autoalign with modern markings or maintain the historical label along with required controls. Recommendations based on historical markings

Requirement 8: Disposal

Solution capability
Implement retention policies, retention labeling, data life cycle and records management configurations, including disposition review, to support archive and records requirements.
Align security marking, retention label/policy, and associated disposition where required (noting that security and archive seldom align).
Implement retention policies that either permanently remove information once item retention requirements are met, or provide records management teams with disposition review capability that allow for the screening of items before their permanent deletion.

These articles relate to Microsoft Purview Data Lifecycle Management then Information Protection and are outside scope of this guidance. For guidance on Microsoft Purview Data Lifecycle Management, see lifecycle management.

Requirement 9: Sensitive and security classified discussions

Solution capability Section
Apply protective markings to Teams meeting invitations and Outlook calendar items.

Apply controls to calendar items, such as encryption of meeting attachments.
Labeling of calendar items
Apply protective markings to Teams meetings and configure advanced controls to protect classified conversations, including advanced encryption techniques and meeting watermarks.

End-to-end encryption of Teams conversations, providing users with assurance that sensitive or security classified discussions can't be intercepted.
Teams Premium label configuration

PSPF Policy 9: Access to information

Access to information is based on PSPF Policy 9 requirements V2018.6 (updated August 16 2022).

PSPF Policy 9 is concerned with the access of timely, reliable, and appropriate access to official information.

As with Policy 8, Policy 9 is split into core and supporting requirements.

Comments on Microsoft 365 capabilities that align with the requirements and links to the relevant sections in this document are provided in the following table.

For information on the PSPF policy source, see: PSPF policy 9: Access to information.

Core Requirement A: Enable appropriate access when sharing information within the entity and with other relevant stakeholders
Solution capability Section
Restrict sharing, privacy and/or guest access based on the sensitivity label applied to a Team or SharePoint location. Sensitivity label groups and sites configuration
Restrict sharing or caution users when they attempt to share labeled content with unauthorized internal or external groups. Preventing inappropriate distribution of security classified information

Limiting distribution of sensitive information
Prevent delivery of labeled emails or email attachments to unauthorized recipients. Preventing email distribution of classified information to unauthorized organizations

Preventing email distribution of classified information to unauthorized users
Restrict the upload of labeled content to nonapproved cloud services or locations where it can be further distributed or accessed by unauthorized users. Preventing the upload of security classified items to unmanaged locations
Prevent access to labeled items (files or emails) by unauthorized users in situations where they have been shared inappropriately. Sensitivity label encryption
Prevent labeled items from being uploaded to nonapproved cloud services. Prevent them from being printed, copied to USB, transferred via Bluetooth or unallowed app. Preventing sharing of security classified information

Preventing the download or printing of security classified items
Core Requirement B: Ensure that individuals who access sensitive, or security classified information have appropriate security clearance and need to know that information
Solution capability Sections
Restrict access to locations that contain sensitive or classified information to only users that are authorized. Authentication context
Integrate sensitivity labeling and DLP. Policies can be constructed to prevent the sharing (via email or share action) of items with certain markings with unauthorized users. Preventing email distribution of classified information to unauthorized organizations

Preventing email distribution of classified information to unauthorized users

Preventing sharing of security classified information
Provide DLP policy tips, which warn users against sharing information ahead of policy violation, reducing the likelihood of information disclosure due to situations like mistaken identity. DLP policy tips ahead of violation
Monitor, alert and/or block attempts to share or email labeled items to users who don't have appropriate security clearance. DLP event management
Configure Privacy options for sites or Teams based on a location’s marking. This helps to prevent open access to locations for users who don't have need-to-know and puts Team or location owners in control of access to these locations. It also helps to meet Supporting Requirement 2 by not automatically providing access based on status, rank, or convenience. Label privacy settings
Configure Sharing Restrictions for a site or Team, which ensures that items in marked locations can only be shared with internal users. Label sharing configuration
Use label encryption to control access to labeled content, ensuring that only authorized users have the ability to access it. Enabling label encryption
Alert on security classified or marked information from being moved to lower sensitivity locations where they're more easily accessed by unauthorized users. Data out-of-place alerting
Core Requirement C: Controlling access (including remote access) to supporting ICT systems, networks, infrastructure, devices, and applications
Solution capability Sections
Allows the use of Conditional Access (CA) to restrict access to the Microsoft 365 application to approved users, devices, and locations, only when appropriate authentication requirements are met. Conditional access
Provide granular access control to sensitive or security classified labeled locations. Authentication context
Assess user authentication and authorization at time of access to encrypted items (files or email). Sensitivity label encryption

Supporting requirements

Supporting Requirement 1: Formalized agreements for sharing information and resources
Solution capability Sections
Configure Terms of Use as part of a Conditional Access policy, so that guests are required to agree to terms before access to items is permitted. This complements written agreements between organizations. Microsoft Entra Business to Business (B2B) configuration is out of scope of this guide1. The concepts are introduced under conditional access.
Implement restrictions to prevent the sharing of not only security marked or classified information, but also other types of sensitive information with external organizations. Exceptions can be applied to these policies so that sharing is allowed to an approved list of organizations for which formal agreements are established. Limiting distribution of sensitive information
Configure encryption to restrict access to information (files or email) to guests except for users or organizations for which permissions are configured. Sensitivity label encryption
Configure guest access to permit collaboration activities (including sharing, coedit, chat, and Teams membership) only with approved organizations that formal agreements exist with. Microsoft Entra B2B configuration is out of scope of this guide1. The concepts or restricting guest access to labeled items are introduced under guest access configuration
Audit guest access and membership, prompting resource owners to remove guests when no longer required and recommending removal when resources aren't being accessed. Microsoft Entra B2B configuration is out of scope of this guide1, 2.

Note

1 For more information about Microsoft Entra B2B configuration, see Microsoft Cloud Settings for B2B collaboration.

2 For more information on access reviews, see access reviews

Supporting Requirement 2: Limiting access to sensitive and classified information and resources

There are no extra requirements beyond Core Requirement B.

Supporting Requirement 3: Ongoing access security classified information and resources
Solution capability Sections
Configure DLP policies to prevent the distribution of security classified information to users who aren't cleared to the appropriate level. Preventing email distribution of classified information to unauthorized organizations
Limit access to locations containing security classified (or caveated) information to individuals who are cleared to the appropriate level. Authentication context
Help prevent security classified or marked information from being moved to lower sensitivity locations where they're easily accessed by unauthorized users. Data out-of-place alerting
Configure encryption to ensure users who leave the organization no longer have access to sensitive material. Sensitivity label encryption
Supporting Requirement 4: Temporary access to classified information and resources
Solution capability Sections
Configure label encryption to grant temporary access to sensitive items and revoke the access after a period of time, making the items unreadable by their recipient. Content access expiry
Supporting Requirement 5: Managing access to information systems
Solution capability Sections
Configure Conditional Access (CA) policies to require user identification, authentication, including other 'modern authentication' factors, such as MFA, managed device or known location, before granting access to services. Conditional access
Apply other conditional access requirements to users when they access locations, which are marked with certain labels. Authentication context
Configure label encryption, which confirms identity, authentication and authorization each time an encrypted item is accessed by a user. Sensitivity label encryption

Information Security Manual (ISM)

The purpose of the Information Security Manual (ISM) is to outline a cyber security framework that organizations can apply, using their risk management framework, to protect their information and systems from threats. The manual contains controls that Government organizations, and others who work under the PSPF for Australian Federal, State, and Local governments should implement, and at the appropriate level associated with the classification of data that they're managing.

The intent of this Microsoft Purview Information Protection guide isn't to replace any detailed work that organizations should be doing to assess their alignment with the ISM. It's intended to guide organizations on Microsoft 365 configuration that align with ISM controls.

For broader guidance on appropriate Microsoft 365 configuration, we recommend ASD's Blueprint for Secure Cloud.

The ISM requirements discussed in this section refer to ISM version - March 2023.

The following ISM requirements are relevant to a Government organizations Microsoft Purview Information Protection configuration:

ISM-0270: Protective markings are applied to emails and reflect the highest sensitivity or classification of the subject, body, and attachments

Solution capability Sections
Label inheritance ensures that an email is marked according to the highest sensitivity that is applied to the item or attachment. Label inheritance
Identify sensitive information and recommend a marking of higher sensitivity is applied if an item is under classified. Client-based auto-labeling

Identifying sensitive information

ISM-0271: Protective marking tools don't automatically insert protective markings into emails

Solution capability Sections
Require users to select an appropriate sensitivity label for each item (file or email) and ask them for a label if they haven't applied one. Mandatory labeling
Configure label recommendations to suggest that a label is applied following the detection of sensitive content, while leaving determination up to the user. Client-based auto-labeling recommendations

ISM-0272: Protective marking tools don't allow users to select protective markings that a system isn't authorized to process, store or communicate

Solution capability Sections
Users are only able to select and apply sensitivity labels to items that are published to them via a labeling policy. Sensitivity label policies

Labels for information beyond protected level

Blocking transmission of nonpermitted classifications

ISM-1089: Protective marking tools don't allow users replying to or forwarding emails to select protective markings lower than previously used

Solution capability Sections
Noting differences between this control and Microsoft 365 approach, Purview can be configured to require business justification in order to remove or lower a sensitivity label. This information is retained in the audit log, displayed through data classification portals and can be exported via Security Information and Event Management (SIEM) solutions such as Sentinel. This information is also factored into Insider Risk Management (IRM) metrics, which can be used to identify risky users and prevent them from undertaking nefarious activities. Controlling email of marked information via DLP

Implications to malicious label downgrade

Label change justification

Audit Log

Preventing sharing of security classified information
Configure label-based encryption and rights management to prevent changes to labeled items for users that don't have sufficient permissions, preventing label changes. Sensitivity label encryption

ISM-0565: Email servers are configured to block, log, and report emails with inappropriate protective markings

Solution capability Sections
Implement DLP policies to prevent the receipt and further distribution of items with classifications that aren't permitted in the platform. Blocking transmission of nonpermitted classifications
Configure DLP policies or Exchange Mail Flow Rules to block, log, and report emails with missing markings. Mandatory labeling

Blocking transmission of unlabeled email

ISM-1023: The intended recipients of blocked inbound emails, and the senders of blocked outbound emails, are notified

Solution capability Sections
Configure DLP policies or Exchange Mail flow rules with different notification options based on recipient. Blocking transmission of unlabeled email

ISM-0572: Opportunistic TLS encryption is enabled on email servers that make incoming or outgoing email connections over public network infrastructure

Solution capability Sections
Opportunistic Transport Layer Security (TLS) is configured by default in Exchange Online.

Configure email connectors to set TLS encryption as mandatory for the transmission of sensitive emails, without the need to enforce these requirements on lower-sensitivity items.
Requiring TLS encryption for sensitive email transmission

ISM-1405: A centralized event logging facility is implemented and systems are configured to save event logs to the facility as soon as possible after each event occurs

Solution capability Sections
The unified audit log provides centralized event logging for all Microsoft 365 services. Audit log

ISM-0859: Event logs, excluding those for Domain Name System services and web proxies, are retained for at least seven years

Solution capability Sections
Audit logs can be retained for up to 10 years via audit log retention policies. This period can be further extended via integration of Microsoft 365 with a SIEM solution such as Sentinel. Audit log

ISM-0585: For each event logged, the date and time of the event, the relevant user or process, the relevant filename, the event description, and the ICT equipment involved are recorded

Solution capability Sections
Microsoft 365 audit log captures user and administrative event details. For each event relevant details such as item, user, activity completed, and event time are all recorded.

Audit logs capture events for label-related activities such as label application and changes.
Audit log

ISM-0133: When a data spill occurs, data owners are advised and access to the data is restricted

Solution capability Sections
Configure DLP policies to detect data spills, and notify appropriate parties upon detection. Blocking transmission of nonpermitted classifications

Australian Government Recordkeeping Metadata Standard

The version of the AGRkMS requirements referred to in this guide is AGRkMS V2.2 (June 2015).

The Australian Government Recordkeeping Metadata Standard (AGRkMS) and the accompanying AGRkMS guide sets out the type of metadata that Australian Government agencies should include in their business systems and specifies the minimum mandatory requirements.

Among these requirements are metadata properties for 'Security Classification' and 'Security Caveat,' which align to the PSPF Policy 8.

The standard includes a statement of purpose for the inclusion of these metadata properties. As with the requirements mentioned in the previous sections, the intent of these AGRkMS’s inclusion of these properties in this standard aligns with capabilities provided by Microsoft Purview Information Protection and associated Microsoft 365 tools:

Requirement Sections
1. To facilitate or restrict access to records, or to particular business functions, activities or transactions, by agency staff or the public (Classification and Caveat).
2. To prevent access to records, or to particular business functions, activities, or transactions, by users with insufficient security permissions (Classification).
3. To enable restriction of access to records by those with insufficient security permissions (Caveat).
Preventing inappropriate distribution of security classified information

Label guest access settings

Label sharing configuration

Authentication context

Data out of place alerting
4. To enable records, business functions, activities or transactions, and mandates with security sensitivities to be appropriately identified and managed (Classification and Caveat). Labeling client experience

Label content marking
SharePoint location and item sensitivity
5. To alert users to security restrictions on access to records and mandates (Classification and Caveat). Preventing email distribution of classified information to unauthorized organizations

Preventing sharing of security classified information
6. To prevent discovery of the nature of the information or activity covered by particular security compartments (Classification and Caveat). Compliance boundaries

These metadata requirements can be met on the Microsoft 365 platform without any advanced metadata manipulation. However, Government organizations aspiring to make use of Microsoft 365 for in-place records management and who want to meet AGRkMS requirements in their entirety should consider the advice provided in the managing classification and caveat metadata section of this guide.

State Government requirements

The following section provides references to State Government requirements and some high-level notes on how their frameworks differ from Federal Government.

Australian Capital Territory

The Australian Capital Territory (ACT) government makes use of the ACT Government Protective Security Policy Framework (PSPF), which is similar to the Federal Government standard in intent, required labels, and Information Management Markers (IMMs). Therefore, the advice in this guide is directly applicable to ACT Government.

New South Wales

New South Wales State (NSW) government uses the NSW Government Information Classification, Labeling and Handling Guidelines.

These requirements align with the Federal PSPF standard at a high level as both sets of requirements make use of UNOFFICIAL to PROTECTED labels. However, the NSW standard makes use of a different set of Dissemination Limiting Markers (DLMs) that don't align with the Federal labels:

"The OFFICIAL: Sensitive label is applied by the Australian Government, and other states and territories. The NSW Government won't apply this label to its information because the six DLMs used in NSW with the OFFICIAL: Sensitive prefix allows for the specificity required in NSW. This means that information labeled OFFICIAL: Sensitive is deemed to have originated from outside of NSW Government."

This means that sensitive NSW Government information isn't marked with federal labels, but is treated separately. For example, the label of 'OFFICIAL Sensitive - NSW Government' has no PSPF equivalent so translation to a PSPF label isn't appropriate.

There are a three options that Federal Government organizations who collaborate with NSW Government should consider when designing their MPIP configuration:

  • Use of hidden labels where the admin implements a set of labels that aren't published to users, but available to the auto-labeling service. Hidden labels allow for information generated by State Government organizations to receive similar protections to internal information without the need to relabel items with PSPF markings. For more information, see labels for organizations with differing label taxonomies.
  • Use of Sensitive Information Types (SIT) where organizations implement a set of SITs, which identify information marked with NSW Government labels. These SITs are used in DLP and other policy types to ensure that the information is treated appropriately. For more information, see custom sensitive information types.
  • Use of NSW aligned labels where organizations opt to apply labels to information received that most closely align with NSW Government markings. This can be manually actioned by users, potentially with the assistance of auto-labeling to suggest the most appropriate (OFFICIAL: Sensitive in most cases). Using this approach, NSW visual marking still apply to items and are complemented with Federal equivalents on reply emails. This would help to ensure that the information is protected in line with tenant configurations while it resides in the environment. For more information, see recommendations based on external agency markings.

These options are also relevant to NSW Government organizations who are considering how best to handle information that is received with Federal PSPF markings, or markings applied by other State’s Governments.

Northern Territory

The Northern Territory (NT) government makes use of the Northern Territory Government Public Sector Organization (NTG PSO): Security Classification System.

This system has partial alignment with Federal PSPF as UNCLASSIFIED and PROTECTED labels exist in the framework. However, it also makes use of CONFIDENTIAL and PUBLIC labels, meaning that organizations collaborating with the NT Government should consider methods for label translation or identification of NT Government CONFIDENTIAL information via the methods mentioned previously in the NSW government section in order to ensure that the information is secured while it resides in Federal Government Microsoft 365 environments.

NT Government organizations should consider the advice in this document but add a PUBLIC label and substitute OFFICIAL: Sensitive for CONFIDENTIAL labels. The above points around protecting information from other jurisdictions are also relevant, so NT should implement Sensitive Information Types, unpublished labels, or client-based labeling recommendations as discussed in the NSW section.

Queensland

Queensland Government organizations are required to adhere to the Queensland Government Information Security Classification Framework (QGISCF)

Like NSW and NT, the Queensland government requirements differ from PSPF - but QGISCF does make use of a similar topology of OFFICIAL, SENSITIVE, and PROTECTED labels and information provided in this document is relevant.

The QGISCF is intended to be compatible with the Australian Government Protective Security Policy Framework and Australian Government Information Security Manual. Because of this, Federal Government organizations should use auto-labeling to translate the information they receive from Queensland Government organizations into equivalent PSPF labels (SENSITIVE to OFFICIAL: Sensitive for example) to ensure that such information is within the scope of DLP and other protections while it resides in Federal Government Microsoft 365 environments. The reverse is applicable to Queensland Government organizations receiving Federal Government information.

South Australia

The South Australian (SA) Protective Security Framework (SAPSF) includes a policy named 'INFOCEC1: Protecting Official Information.' This policy aligns with the federal standard at a high level, noting some variations in terms of information management markers and caveats (for example, SA CABINET and Medical in Confidence). Due to this alignment, Federal Government organizations should be able to identify and protect sensitive SA Government items without significant variation to their configurations. The advice provided in this document is relevant to SA Government without significant need for translation into local markings.

Federal Government organizations receiving information from SA Government agencies should consider how SA Government information is protected within their environments. Establishment of SITs or nonpublished sensitivity labels to capture SA specific markings and DLP policies to apply appropriate protections (as covered under labels for organizations with differing label taxonomies), as appropriate.

SA Government organizations using this guide should consider that the SAPSF framework doesn't specify email metadata requirements such as X-Headers. This is a gap as without the specification, SA Government organizations may have difficulty maintaining classifications and associated protections as information is passed between organizations. Use of the Federal PSPF standard for this is appropriate for achieving email label translation (as covered in labeling of email during transport).

The approach used in PSPF X-Protective-Marking headers can be adapted to cover SA specific labels such as SA CABINET and Medical in Confidence. Some SA Government organizations have implemented PSPF style metadata regardless of it not being included in SAPSF. An example of this would be setting an X-Protective-Marking header of “VER=2018.6, NS=sa.gov.au, SEC=OFFICIAL”. This approach mitigates risks associated with sharing information between SA government organizations and providing a marking that other states and Federal organizations can use to determine the enclosed information’s required protections.

Tasmania

The Information Security Classification Standard for the Tasmanian (TAS) Government is a draft and under review.

For information on markings currently in use by TAS Government, see TAS Information Security Classification

Federal Government organizations wanting to ensure that they protect information received from TAS Government should utilize controls that are in place to help protect legacy information under the previous version of the PSPF. For more information, see Recommendations based on historical markings.

Victoria

The Victorian (VIC) State Government framework is the Victorian Protective Data Security Framework (VPDSF) is similar to SA but still closely aligns with the Federal PSPF.

Victorian State Government organizations should consider the advice provided in this guide as relevant to their own environments.

For the VIC framework, the difference to the markings applied via email x-headers for domain and version values. Victorian Government Cabinet markings also differ to that of Federal Government, so Victorian Government organizations should note a special handling x-header of 'SH:CABINET-IN-CONFIDENCE' is required in place of the 'SH:NATIONAL-CABINET.' For more information on special handling, see applying x-protective-marking headers via DLP policy.

Western Australia

The Western Australian (WA) Government has an Information Classification Policy, makes use of UNOFFICIAL, OFFICIAL, and OFFICIAL: Sensitive labels, which align closely with Federal Government PSPF classifications. However, access and other requirements differ.

The policy states "For the protection of Commonwealth security classified information, agencies are required to comply with the provisions of the relevant inter-jurisdictional agreement(s)." This means Federal Government requirements are required to be considered by WA Government Agencies.

WA Government customers should consider the advice provided in this document for its relevance to their own configurations.

For Federal Government organizations receiving information from WA Government organizations, as WA approach aligns with Federal, the auto-labeling and other configurations covered in this guide help to ensure that such information is protected while it resides in Federal Microsoft 365 environments.