ASD's Blueprint for Secure Cloud

Overview

This page provides a template and guidance to assist organisations in preparing an Overview for their SSP describing system(s) built on ASD's Blueprint for Secure Cloud.

Estimated reading time: 4 minutes

System information

System Name<SYSTEM-NAME>
System Classification<SYSTEM-CLASSIFICATION>
Operational Status<UNDER DEVELOPMENT / IN OPERATION>

<INSERT ADDITIONAL INFORMATION AS APPROPRIATE>

System purpose

<SYSTEM-NAME> aims to provide a scalable, multi-classified, multi-vendor platform that enables trusted external suppliers, partners, and staff to collaboratively develop and enhance our services more rapidly.

The objectives of the <SYSTEM-NAME> are to:

  • Scale resources faster​
  • Support the development of more innovative solutions​
  • Provide faster on boarding for new staff
  • Improve workplace and partner collaboration
  • Assist with greater community engagement
  • Enable scalable service continuity

<INSERT ADDITIONAL INFORMATION AS APPROPRIATE>

System overview

<SYSTEM-NAME> is <ORGANISATION-NAME>’s implementation of a range of cloud services and applications focused on driving productivity and business outcomes and enabling <ORGANISATION-NAME>’s workforce to securely work and collaborate from the office, while travelling or from home.

<SYSTEM-NAME> includes the following components that will improve the security posture of <ORGANISATION-NAME>:

  • Identity including:
  • Microsoft Entra ID (previously known as Azure Active Directory)
  • Multi-Factor Authentication (MFA)
  • Conditional Access
  • Privileged Identity Management
  • Microsoft 365 including:
  • Exchange Online & Exchange Online Protection
  • SharePoint Online
  • OneDrive for Business
  • Power Platform** (Power Automate and Power Apps)
  • Microsoft Teams
  • Office 365 Applications
  • Device management (Intune) including:
  • Windows 10
  • Windows 11
  • iOS
  • Connectivity
  • Cloud to cloud
  • Endpoints
  • Point to site
  • Government to Government (GovLINK)
  • Security and Compliance Services including:
  • Microsoft Defender:
  • Microsoft Defender for Cloud Apps
  • Microsoft Defender for Endpoints
  • Microsoft Defender for Identity
  • Microsoft Defender for Office 365
  • Microsoft Defender Vulnerability Management (MDVM)
  • Microsoft Information Protection
  • Microsoft Purview
  • Log Analytics
  • Automation including:
  • Desired State Configuration (DSC)
  • Microsoft Graph
  • PowerShell
  • Support

<INSERT ADDITIONAL INFORMATION AS APPROPRIATE>

System boundary

The <SYSTEM-NAME> boundary consists of:

  • Physical Boundaries — comprising the perimeter security measures of <ORGANISATION-NAME>’s office locations and service provider datacentre locations, network infrastructure and physical endpoints, and
  • Virtual boundaries — comprising <SYSTEM-NAME>’s network segments, its information holdings, system access controls, internet gateway boundaries, inter-office connectivity and connectivity with partner services and Software as a Service (SaaS) applications.

<INSERT ADDITIONAL INFORMATION AS APPROPRIATE>

Diagram

<INSERT SYSTEM-BOUNDARY-DIAGRAM>

Out of scope

The following systems and components are out of the scope of this SSP as they are either addressed elsewhere or are not in-scope of <SYSTEM-NAME>:

  • <SYSTEM/COMPONENT-1>
  • <SYSTEM/COMPONENT-2>
  • <SYSTEM/COMPONENT-3>

The above systems and components will have separate SSP(s) produced for them.

<INSERT ADDITIONAL INFORMATION AS APPROPRIATE>

Risk assessment

The results of the threat and risk assessment undertaken for <SYSTEM-NAME> are documented in the Security Risk Management Plan (SRMP). This document describes the reduction in risk to the confidentiality, integrity and availability of system components and information processed and stored by <SYSTEM-NAME> by the implementation of security controls and mitigations.

<INSERT ADDITIONAL INFORMATION AS APPROPRIATE>

System delivery

The initial project to design, configure and deploy <SYSTEM-NAME> is being managed by <ORGANISATION-NAME>’s <SECTION/TEAM NAME> team as part of the <PROJECT-NAME> project. As this is a significant system build, this project has a variety of stakeholders, including:

  • <STAKEHOLDER-1>
  • <STAKEHOLDER-2>
  • <STAKEHOLDER-3>

The design, configuration and deployment of <SYSTEM-NAME> will also leverage managed services from <MSP1-NAME> and <MSP2-NAME> respectively as described in the Procurement and Outsourcing section of this SSP. Similarly, as the build of <SYSTEM-NAME> primarily pertains to the use of Microsoft Cloud Services, the project team will liaise regularly with Microsoft in developing, improving and maintaining the system.

<INSERT ADDITIONAL INFORMATION AS APPROPRIATE>

Do you have a suggestion on how the above page could be improved? Get in touch! ASD's Blueprint for Secure Cloud is an open source project, and we would love to get your input. Submit an issue on our GitHub, or send us an email at blueprint@asd.gov.au

Acknowledgement of Country icon

Acknowledgement of Country
We acknowledge the Traditional Owners and Custodians of Country throughout Australia and their continuing connections to land, sea and communities. We pay our respects to them, their cultures and their Elders; past, present and emerging. We also recognise Australia's First Peoples' enduring contribution to Australia's national security.

Authorised by the Australian Government, Canberra