Back to Resources
CPS 234 Information Security Checklist — visual preview
Checklist

CPS 234 Information Security Checklist

Australian Prudential Regulation (APRA) Framework

Overview

APRA Prudential Standard CPS 234 (Information Security) is a legally binding prudential standard issued by the Australian Prudential Regulation Authority. Effective since July 2019, it requires APRA-regulated entities to maintain an information security capability commensurate with the size and extent of threats to their information assets. CPS 234 applies to all APRA-regulated entities including authorized deposit-taking institutions (banks, credit unions, building societies), general and life insurance companies, private health insurers, and registrable superannuation entities.

Key Requirements

RequirementCPS 234 ReferenceDescription
Board ResponsibilityPara 15Board is ultimately responsible for information security
Information Security CapabilityPara 16-17Maintain capability commensurate with threats, including resources and funding
Policy FrameworkPara 18Maintain an information security policy framework aligned to exposures
Information Asset ClassificationPara 19-20Classify and maintain a register of information assets by criticality and sensitivity
Security ControlsPara 21-25Implement controls proportionate to asset criticality, regularly review and test effectiveness
Incident ManagementPara 26-28Detect, report, and respond to information security incidents
Third-Party SecurityPara 29-34Evaluate third-party information security capability and monitor ongoing compliance
Internal AuditPara 35-36Ensure internal audit reviews the effectiveness of information security controls
APRA NotificationPara 28Notify APRA of material information security incidents within 72 hours

Information Security Capability

CPS 234 requires that your information security capability is commensurate with the size and extent of threats to your information assets. This means your security function must scale with your risk profile. APRA looks for adequately skilled and experienced personnel, sufficient resources and funding approved by the Board, clearly defined roles and responsibilities with appropriate segregation of duties, and a governance structure that enables effective oversight. The Board must be actively involved and must approve the entity's information security policy and evaluate the overall effectiveness of the program at least annually.

Implementation Checklist

  • Establish Board oversight of information security with annual policy review and approval
  • Classify all information assets based on criticality and sensitivity with a maintained asset register
  • Implement security controls proportionate to the criticality and sensitivity of each information asset class
  • Conduct security control testing through an independent testing program at least annually
  • Establish a comprehensive incident detection, escalation, and response framework
  • Notify APRA of material information security incidents within 72 hours
  • Evaluate information security capability of all third parties managing critical or sensitive information assets
  • Ensure service provider contracts include security requirements, audit rights, and breach notification obligations
  • Maintain adequate segregation of duties between information security management and IT operations
  • Ensure internal audit provides independent assurance on information security effectiveness
  • Review and update the information security policy framework when there are material changes in risk

Third-Party Risk Management

CPS 234 places strong emphasis on third-party information security. Before engaging a third party to manage information assets, entities must evaluate the provider's information security capability and conduct ongoing monitoring. Where information assets are managed by a related party or third party, the entity must assess whether the controls in place are consistent with CPS 234 requirements. The entity retains full accountability for information security even when activities are outsourced. Internal audit coverage must extend to third-party arrangements.

APRA Examination Focus Areas

  • Based on APRA's published insights from CPS 234 reviews, common areas of concern include:
  • Insufficient Board and senior management engagement with information security matters
  • Incomplete information asset registers, particularly around unstructured data and cloud environments
  • Security control testing programs that lack independence or adequate scope
  • Third-party security assessments conducted only at onboarding without ongoing monitoring
  • Incident response plans that have not been tested through realistic simulation exercises
  • Inadequate information security resourcing relative to the entity's size and threat profile

Frequently Asked Questions

How does CPS 234 differ from the Essential Eight?
CPS 234 is a principles-based prudential standard focused on governance, capability, and accountability for APRA-regulated entities. The Essential Eight is a prescriptive set of technical controls from ASD. APRA expects entities to consider ASD guidance (including the Essential Eight) when implementing CPS 234, but CPS 234 itself is broader, covering governance, third-party risk, and incident management beyond technical controls.
What is the APRA notification timeline for incidents?
APRA must be notified of material information security incidents within 72 hours. Additionally, APRA must be notified within 10 business days after becoming aware of a material information security control weakness that could not be remediated in a timely manner.
Can we use external auditors for security control testing?
Yes. CPS 234 requires that security control testing be performed by appropriately skilled and functionally independent specialists. This can include qualified internal audit staff or external security assessors, provided they are independent from the teams responsible for implementing the controls.
Does CPS 234 apply to cloud services?
Yes. Cloud service providers managing information assets on behalf of an APRA-regulated entity are subject to the third-party provisions of CPS 234. APRA has published additional guidance (CPG 234 and the Information Security Cloud Guidance) that sets expectations for cloud security assessments and monitoring.
What are the penalties for non-compliance?
As a prudential standard, non-compliance with CPS 234 can result in APRA taking supervisory action including increased reporting requirements, on-site reviews, directions to remediate, restrictions on business activities, and in extreme cases, license conditions. APRA can also impose financial penalties under the Banking Act and Insurance Act.

Ready to use this resource?

Download it now or schedule a demo to see how Hunto AI can automate your security workflows.

Book a Demo