WA Cyber Security Unit (Office of Digital Government)¶
This site contains technical information to support WA Government Cyber Security activities. Please propose updates directly via the edit link on each page or email cybersecurity@dpc.wa.gov.au with any feedback. The site is built with Material for MkDocs (reference) which includes several extensions to markdown for enhanced technical writing.
WA Security Operations Centre (WA SOC)¶
- Connecting to the WA SOC (Sentinel Guidance)
- Advisories (TLP:CLEAR)
- Incident Reporting User Guide (Jira)
- Threat Hunting (MITRE ATT&CK Tactics and Techniques)
- ACSC Essential Eight Assessment Process Guide
Baselines & Guidelines¶
Baselines are for use as self-assessment checklists, and guidelines are for general implementation guidance.
Baselines
- Security Operations Baseline - aligned with MITRE 11 Strategies of a World-Class Cybersecurity Operations Center and ACSC's Cyber Incident Response Plan Resource.
- Detection Coverage Baseline - telemetry collection and detection analytics aligned to the MITRE ATT&CK Framework.
- Vulnerability Management Baseline - focused on undertaking operational Identify and Protect capabilities.
Critical Infrastructure Entities and Operational Technology
The CISA Cross-Sector Cybersecurity Performance Goals are clear targeted recommendations focusing on most common and impactful threats, including cost, complexity and impact ratings against each recommendation. These are highly relevant targets for entities in scope of SOCI regulatory obligations.
Guidelines
- Supply Chain Risk Management Guideline - Implementation guidance for ACSC Cyber Supply Chain Risk Management.
- Guide to Securing Remote Access Software (CISA) - remote access software overview, including the malicious use of remote access software, detection methods, and recommendations for all organizations.
- #StopRansomware Guide (CISA) - one-stop resource to help organizations reduce the risk of ransomware incidents through best practices to detect, prevent, respond, and recover, including step-by-step approaches to address potential attacks.
- Microsoft Sentinel Guidance - Implementation guidance for using Sentinel for ACSC Guidelines for System Monitoring
- Network Management Guideline - Implementation guidance for ACSC Network gateway hardening.
- Patch Management Guideline - Implementation guidance for ACSC Assessing Security Vulnerabilities and Applying Patches.
Additional documentation¶
The below documents are for general use.
Technical Documentation
Recent Advisories¶
2025 January¶
- OpenVPN Critical Vulnerability - 20250110002
- GitLab Releases Critical Updates - 20250110001
- Palo Alto Vulnerability Scanner and Exploiter - 20250109002
- Ivanti Vulnerability Known Active Exploitation - 20250109001
- CISA Releases New ICS Advisories - 20250108003
- SolarWinds Web Help Desk Vulnerability Scanner and Exploiter - 20250108002
- Known Exploited Oracle WebLogic and Mitel Vulnerabilities - 20250108001
- PoC Exploit for Oracle WebLogic Vulnerability - 20250102001
2024 December
- PAN-OS Vulnerability Now Exploited in the Wild - 20241230001
- PoC Exploit for Windows Elevation of Privilege Vulnerability - 20241227001
- Adobe Updates ColdFusion Vulnerability with Proof-of-Concept - 20241224001
- Apache Tomcat Patches Critical RCE Vulnerability - 20241223003
- Sophos Firewall Addresses Multiple Vulnerabilities - 20241223002
- Fortinet Security Updates for FortiManager - 20241223001
- CISA Releases New ICS Advisories - 20241220003
- BeyondTrust Critical Vulnerability - 20241220002
- Active Exploitation of Existing Fortinet Vulnerability - 20241220001
- CISA Releases New ICS Advisories - 20241219002
- Apache Tomcat Critical Vulnerability - 20241219001
- CISA Releases Five ICS Advisories - 20241218001
- Microsoft and Adobe Known Exploited Vulnerabilities - 20241217001
- Apache Struts Critical Vulnerability - 20241213002
- CISA Releases New ICS Advisories - 20241213001
- CISA Releases New ICS Advisories - 20241204001
- Microsoft Monthly Updates - 20241211001
- Mitel Micollab Critical Advisory - 20241209001
- Veeam Critical Advisory - 20241205001
- CISA Releases New ICS Advisories - 20241204001
- IBM Rhapsody Model Manager vulnerability - 20241202001
2024 November
- CISA Releases New ICS Advisories - 20241127001
- QNAP Critical Vulnerability - 20241126001
- New ICS Advisories - 20241122002
- Veritas Critical Vulnerability - 20241122001
- Apache OfBiz Critical Update - 20241121001
- CISA Releases New ICS Advisories - 20241120002
- Apple Releases Urgent Updates - 20241120001
- Paloalto Publishes Critical Advisory - 20241119001
- New ICS Advisories - 20241118001
- Siemens Releases New ICS Advisories - 20241113003
- Microsoft Monthly Updates - 20241113002
- ACSC Publishes Routinely Exploited Vulnerability Advisory - 20241113001
- CISA Releases New ICS Advisories - 20241108001
- Cisco Releases Critical Updates - 20241107001
- Ricoh Critical Updates - 20241105001
- New ICS Advisories - 20241101002
- ServiceNow Critical Vulnerability - 20241101001
WA SOC - Recent Threat Activity (December 2024)¶
Based on recent high impact incidents seen by the WA SOC, security teams should be focusing on the below areas of improvement based on phishing and phishing resistant MFA:
WASOC Guidance targeted on recent escalation of state-based actor threat activity
- Threat Actor Exploiting Weaknesses in Low Strength Multi-factor Authentication Protocols Microsoft Guidance
- Continuous campaign utilising Whaling Phishing Activity Whaling Guidance
- Please ensure monthly Microsoft Updates are applied where possible due to frequent exploitation in the wild. Microsoft December Updates
Recent WA SOC advisories this month worth staying across include:
- ASD's ACSC published an advisory on Mitel Micollab Critical vulnerabilities: Mitel Micollab Critical Advisory
- Apache published advisory for Struts Critical vulnerabilities: Apache Struts Critical Vulnerability
Agencies should review the latest WA Government Cyber Security Policy
WASOC - General Advice¶
Security Hardening remains a focus for all organisations. Please refer to the below guides to ensure all external and internal sign-ins are appropriately monitored.
- Policy The Government of Western Australia’s Artificial Intelligence Policy specifies the principles that must be applied by WA Government agencies who are developing or using Artificial Intelligence (AI) tools. WA Government Artificial Intelligence Policy and Assurance Framework
- Review ACSC Annual Cyber Threat Annual Cyber Threat Report 2023-2024