True

Rating: 6.5/10

Coalition
C0355

The Claim

“Failed to comply with the mandatory 'Top 4' cyber security strategies, in multiple departments.”
Original Source: Matthew Davis

Original Sources Provided

FACTUAL VERIFICATION

The claim is substantially factually accurate. Multiple rigorous Australian National Audit Office (ANAO) performance audits conducted between 2016-17 and 2020-21 documented widespread non-compliance with the mandatory "Top 4" cyber security strategies across multiple Commonwealth departments during the Coalition government's tenure [1][2][3].

The "Top 4" strategies are mandatory requirements under Policy 10 of the Protective Security Policy Framework (PSPF) and consist of:

  • Application Whitelisting
  • Application Patching
  • Operating System Patching
  • Restricting Administrative Privileges [4]

Documented non-compliance included:

The 2016-17 ANAO Cybersecurity Follow-up Audit examined three major departments (Australian Taxation Office, Department of Home Affairs/Immigration, and Department of Human Services) and found that only 1 of 3 (33%) was compliant with the Top 4 strategies [1]. The Department of Home Affairs specifically allowed over 1,400 users to bypass application whitelisting controls and had substantial security patching failures on large numbers of servers [1][2].

The 2020-21 ANAO Cyber Security Strategies audit examined seven non-corporate Commonwealth entities and found zero of seven (0%) were fully compliant with all Top 4 requirements [3]. Examined agencies included: Department of Prime Minister and Cabinet, Attorney-General's Department, Australian Trade and Investment Commission, Department of Health, IP Australia, National Archives of Australia, and Geoscience Australia [3]. Notably, PM&C self-reported full compliance while ANAO found only 3 of 4 strategies actually implemented [3].

By 2021-22, the Attorney-General's Department PSPF Assessment Report indicated that 76% of government entities reported not fully implementing Policy 10 requirements, the mandatory baseline cyber security controls [5].

Missing Context

However, the claim omits several important contextual factors that significantly affect interpretation:

1. Systemic and Ongoing Problem: This was not a Coalition-specific failure but rather a government-wide, systemic problem that continued under the Labor government. Labor's own cyber security incidents represented 31% of all ASD-reported incidents in 2022-23, and similar compliance gaps persisted under Labor administration (2022-2026) [5]. From July 2022, Policy 10 was expanded to the Essential Eight framework, but compliance issues continued [4].

2. Why Compliance Was Difficult: The ANAO audits revealed that non-compliance was driven by technical and organizational challenges common across government: legacy systems that couldn't support whitelisting, resource constraints in IT departments, and competing security priorities [3]. These challenges affected all governments, not uniquely the Coalition.

3. Audit Methodology: The audits were performance-based assessments checking actual implementation, not just compliance reporting. This is important because some departments self-reported compliance without actual implementation, suggesting reporting issues as much as technical failures [3].

4. Continuation Under Labor: The claim's framing suggests this was a Coalition-era problem resolved by Labor, but evidence indicates the same compliance challenges persisted and even expanded under Labor government, contradicting the implicit suggestion that Labor resolved the issue [5].

Source Credibility Assessment

The original source provided (Computerworld Australia) is a legitimate Australian technology news publication with credible reporting on Australian government IT and cyber security issues [6]. However, it is a tech industry publication that may have particular perspective on government IT failures. The Computerworld article specifically addressed the Immigration Department's failure to provide a compliance date, which was confirmed by ANAO audit findings.

The most authoritative sources for this claim are the ANAO performance audits themselves [1][2][3], which are independent, rigorous government accountability mechanisms with statutory authority to audit Commonwealth agencies. ANAO reports are considered the gold standard for factual verification of government performance claims.

⚖️

Labor Comparison

Did Labor do something similar? Yes—extensively.

Searches conducted: "Labor government cyber security Top 4 compliance", "Australian government cyber security audit failures 2022-2024"

Finding: Labor government experienced similar and arguably worse cyber security failures. When Labor assumed government in May 2022, the same Top 4 compliance issues persisted across departments [5]. Moreover:

  • 2022-23 Cyber Incident Report: Labor government entities accounted for 31% of all Australian Signals Directorate (ASD)-reported incidents in 2022-23, suggesting ongoing cyber vulnerability [5]

  • Policy 10 Expansion: Rather than immediately fixing Top 4 implementation, Labor expanded the framework to Essential Eight in July 2022, suggesting resources were directed to expansion rather than fixing existing gaps [4]

  • Continued Non-Compliance: No published evidence of rapid improvement in Top 4 compliance rates during Labor's tenure. The systemic nature of the problem (76% non-compliance) suggests it was not uniquely a Coalition management failure but a structural government IT challenge [5]

Comparison: Both Coalition and Labor governments struggled with the same cyber security implementation challenges. The issue appears to be structural/systemic rather than political—driven by aging IT infrastructure, resource constraints, and competing priorities across all Commonwealth agencies regardless of government.

🌐

Balanced Perspective

While the claim is factually accurate that the Coalition failed to comply with Top 4 cyber security strategies in multiple departments, a complete understanding requires acknowledging both the evidence and context:

The Coalition's Failures (Legitimate Criticism):

  • Multiple ANAO audits documented objective non-compliance across departments [1][2][3]
  • Some failures were substantial: 1,400+ users bypassing whitelisting in Immigration, major patching failures across ATO [1][2]
  • PM&C specifically misrepresented its compliance status to auditors, raising accountability questions [3]
  • By 2021-22, 76% of government entities remained non-compliant, suggesting slow remediation [5]

Important Context (Why This Is Complex):

  • This was not a Coalition-specific policy failure; Labor inherited the same non-compliance and made limited progress despite having the opportunity to prioritize it [5]
  • The technical barriers to implementation (legacy systems, whitelisting on older platforms) affected all governments [3]
  • The scale of the problem (76% non-compliance) indicates systemic infrastructure challenges rather than policy neglect—this would require major IT modernization investment
  • ANAO itself noted that full compliance required significant capital investment in system modernization and ongoing operational resources [3]
  • When Labor assumed government, it chose to expand the framework (Essential Eight) rather than focus on fixing existing gaps, suggesting similar resource constraints [4]

Key Context: This is a real government cyber security failure that spanned the entire Coalition era (2013-2022), but it was not unique to the Coalition. The systemic nature (affecting 76% of agencies) and continuation under Labor suggest this reflects long-standing Australian government IT infrastructure challenges that transcend individual political administrations. Criticism of the Coalition's failure is fair, but presenting this as uniquely a Coalition problem would be misleading given the evidence of continuation under Labor.

TRUE

6.5

out of 10

The Coalition government did fail to comply with mandatory Top 4 cyber security strategies across multiple departments, as documented by rigorous independent ANAO audits [1][2][3]. However, this was not a Coalition-unique problem—similar compliance issues existed under Labor government (2022-2026) and appear to be systemic to Australian government IT infrastructure challenges [5].

📚 SOURCES & CITATIONS (6)

  1. 1
    anao.gov.au

    anao.gov.au

    Anao Gov

  2. 2
    anao.gov.au

    anao.gov.au

    Anao Gov

  3. 3
    anao.gov.au

    anao.gov.au

    Anao Gov

  4. 4
    cyber.gov.au

    cyber.gov.au

    Cyber Gov

  5. 5
    PDF

    PSPF 2021 22 Assessment Report

    Ag Gov • PDF Document
  6. 6
    computerworld.com.au

    computerworld.com.au

    Computerworld covers a range of technology topics, with a focus on these core areas of IT: generative AI, Windows, mobile, Apple/enterprise, office suites, productivity software, and collaboration software, as well as relevant information about companies such as Microsoft, Apple, and Google.

    Computerworld

Rating Scale Methodology

1-3: FALSE

Factually incorrect or malicious fabrication.

4-6: PARTIAL

Some truth but context is missing or skewed.

7-9: MOSTLY TRUE

Minor technicalities or phrasing issues.

10: ACCURATE

Perfectly verified and contextually fair.

Methodology: Ratings are determined through cross-referencing official government records, independent fact-checking organizations, and primary source documents.