Eventually, we’ll build this out to include a more structured navigation to key resources, including how to contribute to the Handbook.
For now, you can see the top-level sections below, or in the sidebar to the left.
1 - Finance
Under constructionThis page is still under construction. Please check back later as we continue to work on it.
1.1 - Corporate Credit Card Policy
Corporate credit cards are useful tools, but need to be managed carefully to avoid misuse. This policy sets out the rules for issuing and using corporate credit cards at Vaxa.
Purpose
The purpose of this policy is to ensure corporate credit cards are issued and used appropriately for Vaxa related business, and all expenses incurred are properly approved and acquitted.
Scope
The Corporate Credit Card Policy sets out Vaxa’s policy on corporate credit cards (“Card”). It applies to all corporate credit cardholders (“Cardholder”), managers responsible for authorising credit card applications, and approvers of the Cardholder’s acquittals.
Responsibilities
All employees who are issued with a Corporate Credit Card are responsible for ensuring that the Card is used appropriately and in accordance with this policy.
Managers are responsible for ensuring that their staff are aware of and comply with this policy, including the acquittal of expenses.
The Finance team is responsible for the administration of the Card program, including the issuing of Cards, setting of limits, and monitoring of Card usage.
Policy/Process/Standard
Corporate Credit Cards must be used appropriately within relevant delegations, and in accordance with Vaxa policies and legislation.
Issuing of Corporate Credit Cards
The purpose of the Card is to facilitate and simplify the purchasing process for minor purchases and travel expenditure which are not able to be processed through Vaxa’s Purchase Order process.
The Card will only be issued to an employee who:
is required to travel for business purposes; and/or
can demonstrate an ongoing and regular need to purchase goods or services on behalf of a Group or Team which is best facilitated through the use of a credit card. Examples include paying for training courses, professional fees, publications, catering or any purchase where a credit card is the only acceptable form of payment.
Both ongoing and non-ongoing employees can apply for the Card provided they have a genuine business need such as that specified above.
Contractors will not be eligible for the Card. The exception to this is where a contractor is working on a long term contract for Vaxa, and will be required to undertake frequent travel as part of that engagement.
Credit Card Limits
Standard transaction and monthly limits are as follows
Delegation
Transaction Limit
Monthly Limit
Managing Director
$1,000
$5,000
Director
$500
$2,000
Executive Assistant
$200
$1,000
All other staff
$200
$1,000
Variations to the standard limits must be supported by genuine business need and approved by the Managing Director only.
Limits are subject to annual review.
Cancellation of Corporate Credit Cards
The Card is not transferable and may be cancelled by Finance when:
the Cardholder ceases employment with Vaxa
the Cardholder no longer requires the Card because of a change of duties or positions
the Cardholder is taking an extended period of absence of three months or more
the Cardholder fails to comply with any Managing Director’s direction, Vaxa’s policies or procedures relating to the use of the Card
requested to do so by a partner; or
the Card has not been used for more than twelve months.
General Terms of Use
Cardholders must obtain approval from an appropriate financial delegate before using the Card to pay for their own business expenses e.g. professional membership, training, travel etc., see Instrument of Delegations—Financial Authorisations.
Direct debit authorities must not be placed on the Card except where business conditions necessitate and are approved by the Managing Director.
Centrally purchased items such as assets, IT equipment, property/equipment, stationery and insurance should only be purchased by the Managing Director, unless the Cardholder has obtain specific approval from the respective teams to purchase items separately on the Card.
Compliance and Monitoring
Misuse of the Card is a serious matter and may constitute a breach to this policy.
Penalties apply for fraud or misuse of the Card under the Crimes Act 1914. Cardholders may be liable for any loss to Vaxa.
Suspected or inadvertent misuses of the Card must be reported, investigated and dealt with in accordance with the Corporate Credit Card Procedures. Disciplinary action against the cardholder includes, and is not limited to, a warning, full recovery of monies, criminal proceedings, or other direction at the discretion of the Managing Director.
Non-compliance with this policy may result in the cancellation of the Card and/or disciplinary action, up to and including termination of employment.
Related Documents and Legislation
None.
2 - Information Technology
Under constructionThis page is still under construction. Please check back later as we continue to work on it.
2.1 - Change Management
The change management policy outlines the procedures for managing changes to major systems within Vaxa.
Purpose
The purpose of this policy is to establish a streamlined change management control process that ensures all changes to major systems are effectively managed, minimising risk and ensuring system stability. This policy is supported by our continuous integration and continuous delivery (CI/CD) approach.
Scope
This policy applies to all team members involved in the development, testing, deployment, and maintenance of major systems within the organisation.
Roles & Responsibilities
Who is responsible for doing what. This should refer to departments or roles instead of specific individuals.
Role
Responsibility
Developer
Propose and implement changes, perform initial testing.
Second developer
Review and approve changes, assess risks, authorise deployments.
CTO
Approve all medium & high-risk changes and ensure compliance with the policy.
Policy Statements, Standard, or Procedure
All changes to major systems must follow the procedures outlined below to ensure proper risk assessment, testing, authorisation, and control.
Change Proposal
Documentation: Changes must be documented in our version control system (Github) with a clear description, rationale, and expected impact; this will generally be a pull request.
Risk Assessment: The developer proposing the change must assess the risk level (low, medium, high) based on potential impact; this will usually be done in the pull request as a tag.
Impact on Confidentiality, Integrity, and Availability: The developer must consider the impact of the change on the confidentiality, integrity, and availability of the system. See our Information Security Policy for more information.
Risk Review
Second Developer Review: A second developer shall review the proposed change and risk assessment.
Stakeholder Involvement: For medium or high-risk changes, additional stakeholders should be consulted, including consideration for time to deploy, potential impact, and rollback plan. This includes stakeholders internal to Vaxa, as well as any suppliers.
Testing
Environment: All changes must be tested in a staging or test environment.
Automated Tests: Ensure all automated tests pass before deployment, and that coverage is sufficient in the CI/CD pipeline.
QA Verification: Relevant QA resources (including business takeholders) should conduct additional testing as needed.
Authorisation
Approval: The second developer must approve all changes before deployment to production if a low-risk change, or if a medium or high-risk change, the CTO must approve.
Documentation: Approval is documented in the version control system.
Deployment
CI/CD Pipeline: Changes should deployed via the CI/CD pipeline where possible, but may be deployed manually where required.
Scheduling: Consideration should be given to deployment timelines and potential impact on users; deployments in-hours is permissible if the risk mitigation plan is sufficient.
Rollback Plans
Rollback Plan: A rollback plan must be documented for each change.
Automated Rollback: The CI/CD pipeline should support automated rollback to the previous stable version, or a manual rollback plan should be documented.
Initiation: The CTO can initiate a rollback in case of post-deployment issues.
Incident Management: If a rollback is required, the incident management process should be followed.
Change Control Record Keeping
All changes, approvals, test results, and deployment logs are stored in version control for audit purposes. This are retained in line with our Data Retention Policy.
Exceptions
Urgent Changes: In critical situations (e.g., emergency fixes), the standard procedure may be expedited. This shall be documented in the ticketing system, including rationale and any additional risks.
Compliance & Monitoring
Periodic Reviews: The team lead will periodically review change records to ensure compliance.
Team Meetings: Deviations from the policy will be discussed to prevent future occurrences.
Automated Enforcement: Tools may be used to enforce aspects of the policy (e.g., requiring approvals before merge in Github), alongside our access control policy ensuring only authorised personnel can deploy.
Overview of why the controlled document is being implemented.
Scope
Who or what does the controlled document apply to.
Roles & Responsibilities
Who is responsible for doing what. This should refer to departments or roles instead of specific individuals.
Role
Responsibility
[Role]
[Responsibility]
Policy Statements, Standard, or Procedure
The details! Detail the specific policy, procedure, or process. This section can include step-by-step instructions or rules that must be followed.
Exceptions
Define how exceptions to the controlled document will be tracked.
Compliance & Monitoring
Define how compliance with the controlled document will be monitored and what checks will be performed (where applicable).
References
Procedure documents should map back to a governing policy or standard, and may relate to one or more procedures or other uncontrolled documentation. Policy documents may relate to an internal or external framework or legal requirement.
2.3 - MacOS Software Management Using Munki and Autopkg
This document provides a detailed overview of our Munki and Autopkg setup, which is used to manage software installations and updates across our organisation
This document provides a detailed overview of our Munki and Autopkg setup, which is used to manage software installations and updates across our organisation. It is designed to cover most things, from the basics for non-technical users to in-depth technical details for our administrators and contributors.
Introduction to Munki and Autopkg (For Non-Technical Users)
Imagine you have many computers in an organisation, and you need to install and keep software updated on all of them. Doing this manually would be very time-consuming and prone to errors. This is where Munki and Autopkg come in.
Munki is like an app store for our organisation’s computers, but it works in the background. It automatically installs new software, updates existing software, and even removes software when needed, all without requiring constant manual intervention. Think of it as an automated software delivery system that ensures everyone has the right tools and the latest versions.
Autopkg is a tool that works with Munki to make software management even easier. Autopkg automates the process of finding new versions of software, downloading them, and preparing them for Munki to install. It’s like a helper that constantly searches for updates so we don’t have to do it manually.
Why are Munki and Autopkg important?
Consistency: They ensure everyone in the organisation is using the same versions of software, reducing compatibility issues and making troubleshooting easier.
Security: Keeping software updated is crucial for security. Munki and Autopkg help us quickly deploy security updates to protect our systems, as required by our compliance frameworks e.g. Essential Eight.
Efficiency: Automating software management saves a significant amount of time and effort, allowing our technical teams to focus on other important tasks.
Reliability: Automated processes are less prone to human error, ensuring software deployments are reliable and consistent.
In short, Munki and Autopkg are essential tools that help us manage software efficiently, securely, and consistently across our organisation, ensuring everyone has the tools they need to work effectively.
Getting Started with Munki and Autopkg (Technical Focus)
For those involved in managing or contributing to our Munki and Autopkg setup, understanding the basic workflow and tools is essential.
Prerequisites
Munki Client: The Munki client must be installed on all target macOS machines. This is typically handled as part of the standard macOS deployment process.
Autopkg Installation: Autopkg needs to be installed on a designated machine used for managing recipes and running autopkg. Installation instructions can be found on the Autopkg GitHub page.
Recipe Repositories: Autopkg relies on recipes to know how to download, process, and import software into Munki. We utilise several recipe repositories, primarily:
autopkg/recipes: The main repository containing a wide range of common software recipes.
Munki Repository: A shared repository where our Munki clients (workstations) download software packages and package information. Our repository is located in our Azure DevOps instance, specifically in the vaxa/vaxa-security/munki repository. This repository is then synced to Azure Blob Storage, and access from a workstation is facilitated via a Shared Access Token (downloaded via Intune) and middleware_azure.py.
Azure DevOps Access: Access to our Azure DevOps organisation is required for contributing and approving package updates.
Initial Setup
Refer to each of the repositories for detailed setup instructions:
Our Munki and Autopkg infrastructure is designed for reliability, scalability, and automation.
Munki Repository Location
The Munki repository is hosted on Azure Blob Storage. This location was chosen because it integrates nicely with our Microsoft stack, and additionally has a lower cost for storing large files versus GitHub’s LFS (where we originally hosted Munki).
Autopkg Automation
Autopkg runs are automated using Azure DevOps Pipelines. We use Azure DevOps Pipelines to:
Regularly run Autopkg: Autopkg is scheduled to run daily to check for updates to managed software.
Process Recipes: Autopkg processes recipes to download new software versions, create Munki packages, and import them into the Munki repository.
Generate Catalogs: After importing new or updated packages, Autopkg generates Munki catalogs to make the software available to clients.
Trigger Azure DevOps Pipelines: For certain critical packages or workflows, Autopkg may trigger Azure DevOps pipelines for further automated testing or approval processes.
Azure DevOps Integration
We leverage Azure DevOps for:
Recipe Management: Our custom recipes and overrides are stored and version-controlled in Azure DevOps repositories.
Pull Request Workflow: Contributions and updates to recipes are managed through pull requests, ensuring code review and quality control.
Automated Testing (Future): We plan to integrate automated testing into our Azure DevOps pipelines to further validate package updates before deployment.
Approval Process: Pull requests for recipe changes require approval from designated team members before being merged and deployed.
Contributing New Packages
To contribute a new package to our Munki setup, follow these steps:
Identify a Recipe: Search existing recipe repositories to see if a recipe for the desired software already exists.
If a recipe exists, consider if it meets our needs and if an override is sufficient (see “Updating Packages” section).
If no recipe exists or existing recipes are unsuitable, you will need to create a new one.
Create a Recipe (If Necessary):
Recipe Type: Determine the appropriate recipe type (e.g., pkg, dmg, app).
Recipe Structure: Follow the standard Autopkg recipe structure, defining processors for downloading, extracting, packaging, and importing the software into Munki. Refer to existing recipes for examples.
Testing: Thoroughly test your recipe locally to ensure it correctly downloads, packages, and imports the software into your local Munki repository. Use autopkg run -v <YourRecipe.recipe> for verbose output and debugging.
Create an Override (Recommended): Instead of directly modifying recipes in the main repositories, create an override recipe in the autopkg/overrides directory. This allows us to customise recipes for our environment without affecting the base recipes. This is still secure because only the original base recipe is trusted; any changes to the base recipe will require manual review. Most of the time, you’ll want to change the catalogs in the override to release (until we get autopromote working).
Test the Override: Run your override recipe to ensure it works as expected: autopkg run -v <YourOverride.munki.recipe>.
Submit a Pull Request:
Commit your new recipe or override to a feature branch in your local Git repository.
Push your branch to our Azure DevOps repository.
Create a pull request targeting the main branch, clearly describing the new package and any relevant details.
Code Review and Approval: Your pull request will be reviewed by designated team members. Address any feedback and make necessary changes. Once approved, your pull request will be merged.
Automated Deployment: After merging, the automated Autopkg process will pick up the new recipe/override and begin managing the software package in our Munki environment.
Updating Packages
Updating existing packages is crucial for security and ensuring users have the latest features.
Autopkg Monitoring: Our automated Autopkg system regularly checks for updates to managed software based on the recipes and overrides.
Recipe Updates: When a new version of software is detected, Autopkg will:
Download the new version.
Create a new Munki package.
Import the package into the import catalog in our Munki repository.
Testing and Validation: Packages are initially imported into the import catalog for testing.
Testing Catalog: We have a testing Munki catalog for deploying updates to a subset of test machines.
Prerelease Catalog: Optionally, a prerelease catalog can be used for even earlier testing phases.
Catalog Promotion: After successful testing in the testing catalog, packages can be promoted to the release catalog to be deployed to all managed machines. Catalog promotion is typically done by:
Manual Promotion (Initial): Initially, catalog promotion may be a manual step performed by administrators after verifying the updated package.
Automated Promotion (Future): We aim to implement automated catalog promotion based on successful testing and approval workflows in Azure DevOps.
Override Adjustments: In some cases, updates may require adjustments to our override recipes. For example, if a software vendor changes the download URL or package format, we may need to modify the recipe’s Input variables or processors. These changes should be made via pull requests as described in the “Contributing New Packages” section.
Approving Pull Requests in Azure DevOps
The pull request workflow in Azure DevOps is essential for maintaining the quality and stability of our Munki and Autopkg setup.
Notification: When a pull request is created for recipe changes, designated team members will receive notifications in Azure DevOps.
Code Review: Reviewers should carefully examine the pull request, focusing on:
Recipe Logic: Verify the recipe logic is correct and efficient.
Security: Ensure the recipe downloads software from trusted sources and does not introduce security vulnerabilities.
Munki Integration: Confirm the recipe correctly imports packages into Munki with appropriate catalogs and pkginfo settings.
Testing: Check if the contributor has adequately tested the recipe.
Feedback and Discussion: Provide clear and constructive feedback to the contributor directly in the pull request. Engage in discussions to clarify any questions or suggest improvements.
Approval: Once the pull request meets the required standards and all concerns have been addressed, reviewers can approve the pull request in Azure DevOps.
Merge: After approval, the pull request can be merged into the main branch. This action triggers the automated deployment process, making the changes live in our Munki environment.
Relevant Information
Icon Management: Icons for software packages are stored in the munki/icons directory. Ensure new packages have appropriate icons for a better user experience in Self Service (if used).
Manifests: Munki manifests (munki/manifests) define which software packages are installed on different groups of machines. The site_default manifest is the primary manifest applied to most machines. Create or modify manifests as needed to customise software deployments for specific departments or user groups.
Pkginfo Files: Pkginfo files (munki/pkgsinfo) contain metadata about each software package, such as name, version, description, and dependencies. Autopkg automatically generates pkginfo files based on recipes. Review and customise pkginfo files as needed for specific requirements.
Troubleshooting: For troubleshooting Autopkg or Munki issues, consult the official documentation for Autopkg and Munki. Check log files for errors and use verbose output (-v flag) when running Autopkg commands for debugging.
This document provides a comprehensive guide to our Munki and Autopkg setup. By following these guidelines and procedures, we can ensure efficient, consistent, and secure software management across our organisation.
3 - Security
Under constructionThis page is still under construction. Please check back later as we continue to work on it.
3.1 - Cybersecurity Strategy
This document outlines Vaxa’s cybersecurity strategy, detailing the key pillars, principles, and practices that guide our approach to security. It serves as a reference for all team members, outlining the shared responsibilities and expectations for maintaining a secure environment. Policies and procedures are detailed in separate documents, with this strategy providing the overarching framework for our security posture.
Introduction
Cybersecurity isn’t just about protecting systems—it’s about maintaining trust, ensuring business continuity, and safeguarding the data we’re entrusted to keep safe.
Vaxa’s cybersecurity strategy focuses on practical, high-impact measures that align security with our business operations.
We structure our approach around five key pillars: risk management, cyber detection and prevention, access and identity control, data security, and resilience and response. Each pillar provides a guiding framework for securing our business without unnecessary complexity or overhead.
Pillar #1: Risk management
Security starts with understanding risk. We take a proactive approach by identifying the most critical threats to our business—whether that’s data breaches, insider threats, phishing attacks, or system failures.
Risk assessments are an ongoing process, not a one-time exercise. We evaluate risks based on their likelihood and impact, ensuring that security measures are proportionate to the business’s size and resources. Where possible, we mitigate risks through secure architecture, strong internal practices, and cyber insurance for financial protection.
Pillar #2: Cyber detection and prevention
Our strategy prioritises early detection and proactive prevention to reduce the likelihood and impact of cyber incidents.
We implement continuous monitoring for suspicious activity, using tools that provide real-time alerts on unauthorised access attempts, malware, or data exfiltration. Prevention starts with strong authentication, secure configurations, and automated updates—ensuring our systems remain protected without manual intervention. We also use external threat intelligence to stay ahead of emerging risks.
A key part of prevention is educating our team. Cybersecurity awareness is built into our culture, ensuring that everyone understands the risks of phishing, weak passwords, and social engineering attacks.
Pillar #3: Access and Identity Control
Limiting access is one of the simplest and most effective ways to reduce cyber risk. We follow a zero trust approach, where access is only granted on a need-to-know basis. Every system, account, and user remains untrusted at every link in the chain. We instead verify each request based on the user’s identity, device, and context to make an informed decision on providing access.
Multi-factor authentication (MFA) is enforced across all critical systems, reducing the risk of compromised credentials. Administrative privileges are tightly controlled, and regular audits ensure that old or unused accounts are removed. We use role-based access control (RBAC) to define who can access what, ensuring that sensitive data is never exposed unnecessarily.
Pillar #4: Data Security
As a digital business, our most valuable asset is data. Protecting it is non-negotiable.
We encrypt sensitive data both in transit and at rest, ensuring that even if data is intercepted, it remains unreadable. Backups are maintained regularly and stored securely, with an emphasis on offsite and immutable backups that can’t be altered by ransomware.
Client and business data is handled with clear security and privacy considerations, ensuring compliance with relevant regulations (e.g., Australian Privacy Act). Secure file sharing and communication methods are used to prevent accidental data leaks.
Pillar #5: Resilience and Response
No security strategy is complete without a plan for when things go wrong. Cyber resilience is about ensuring the business can recover quickly from incidents while minimising disruption.
We maintain a simple but effective incident response plan, detailing how to contain, investigate, and recover from security breaches. Regular testing, including simulated phishing attacks and breach response drills, ensures that we’re prepared for real threats.
Business continuity is a priority. We ensure that critical systems and data can be restored quickly in the event of an attack, outage, or data loss. By combining strong technical defences with a well-rehearsed response plan, we build a business that can withstand and adapt to cyber threats.
Concluding statements
Cybersecurity is not just an IT function—it’s a core part of how we operate. By embedding security into every aspect of our business through risk management, cyber detection and prevention, access control, data security, and resilience, we ensure that security supports growth rather than hinders it.
This strategy evolves as the business grows, adapting to new threats and technologies while keeping security simple, effective, and aligned with business needs.
3.2 - Information Security Statement
This statement lays out Vaxa’s commitment to information security and the principles that guide our approach to protecting information assets.
As part of our mission, Vaxa necessarily handles privileged information on behalf of our clients, partners and personnel.
The information we hold needs to be treated with care and respect regardless of its physical or electronic format–it’s our ethical duty.
Vaxa also has legislative, moral and contractual responsibilities to ensure that we protect all information adequately. By designing for security, establishing strong policy frameworks, and providing training, we can help protect the information we handle against the ever-growing landscape of information security threats.
The security controls implemented to safeguard the information should mitigate threats to prevent harm from coming to those we are assisting and ensure we can continue to provide first-class services. We should strive to implement security controls that appropriately safeguard information, but with respect to the impact it has on our operations.
Vaxa has committed to series of policies that guide organisation-wide decision making when it comes to operating at highest standards when securing information. They will also help demonstrate to our clients that we operate with integrity and accept that we are accountable for protecting the information entrusted.
Above all else, we build on the following fundamental security principles:
Confidentiality: Protecting information from unauthorised disclosure.
Integrity: Protecting information from unauthorised or erroneous modification.
Availability: Ensuring that information and associated services are available when and where required to meet the Vaxa’s service needs.
Our policies apply equally to all personnel (staff or contractor) accessing information or our information processing systems. Vaxa commits to ensuring all personnel are issued with the appropriate policies (namely, via the Handbook), can access them easily and understand the importance of adhering to them. Vaxa commits to plain language and clear communication across all that it does.
Vaxa also commits to reviewing and updating our policies to meet the changing external landscape and our internal requirements.
Have questions? Please reach out to the ISG Group.
Written and adopted by:
Todd Crowley - Managing Director
Curtis West - Director and CTO
3.3 - Information Security Objectives
The Information Security Objectives are the high-level goals that the Information Security Management System (ISMS) is designed to achieve, and are reviewed annually.
Under constructionThis page is still under construction. Please check back later as we continue to work on it.
3.4 - Playbooks & Plans
Playbooks and plans are detailed documents that outline the steps to be taken in response to specific security incidents and events.
Under constructionThis page is still under construction. Please check back later as we continue to work on it.
3.4.1 -
Vaxa Cyber Incident Response Plan
Purpose
Vaxa’s Cyber Incident Response Plan (CIRP) provides a structured approach to detecting, responding to, and recovering from cyber incidents.
The goal is to minimise damage, restore normal operations quickly, and prevent future incidents. Cyber-attacks can escalate rapidly, so a clear and coordinated response is critical.
Scope
This plan covers cyber and information security incidents that impact Vaxa’s IT systems, data, or digital assets. These incidents may include:
Data breaches (e.g. unauthorised access or data leaks)
Unauthorised system access (e.g. compromised accounts, privilege escalation)
Technically speaking, cybersecurity incidents are a subset of Information Security incidents (for example, the loss of a physical document containing sensitive information would be an Information Security incident, but not a Cybersecurity incident). In practice, we treat these the same way so we can respond quickly and effectively without the overhead of maintaining many separate plans.
What’s not covered in this plan?
General IT issues don’t fall part of this plan unless they’re suspected to be caused by a cyber incident. This therefore excludes things like:
Hardware failures
Software bugs
Software updates
General system outages
If you’re experiencing one of these, you should use the usual process to report to the IT team who may enact the Disaster Recovery policy and plans as required.
Roles & Responsibilities
Everyone at Vaxa
All employees play a role in keeping Vaxa’s systems secure. As part of the team, you should:
Follow security policies when using company systems and handling data
Report any suspicious activity or potential incidents immediately
Complete cyber security training to stay aware of risks
Managers
Managers are responsible for ensuring their teams understand and follow security policies. Specifically, managers should:
Promote secure system use and data protection
Ensure employees know how to report incidents
Assist with investigations if required
Cyber Incident Response Team (CIRT)
The CIRT is responsible for managing incidents and coordinating response efforts. Their responsibilities include:
Assessing, containing, and investigating incidents
Coordinating with third-party IT providers when needed
Keeping senior management and stakeholders informed
Reviewing security measures to prevent future incidents
The CIRT structure will vary based on incident severity, but typically includes:
IT Service Provider – Assists with containment and remediation
Legal & Compliance – Ensures regulatory reporting and legal steps are taken
Finance & Business Continuity – Assesses business impact
As Vaxa doesn’t engage a permanent IT Service Provider, the CTO will be responsible for coordinating with external IT providers if required.
CTO
Ownership of these plans and their review/update sits with the CTO. They are responsible for ensuring the plans are up to date. Particular importance is placed on the responsibility of keeping contact details up to date.
Cyber Incident Response Stages
1. Preparation
Proactive preparation reduces risk and ensures Vaxa is ready to respond effectively. This includes:
Regular security assessments and penetration testing
Keeping security policies and recovery plans up to date
Monitoring cyber threat intelligence (e.g. reports from the Australian Cyber Security Centre)
Employee training to identify and report threats
2. Detection & Reporting
Actual or suspected incidents must be identified quickly to reduce potential damage.
If you suspect a cyber incident:
Report it immediately to your manager or IT team
Provide as much detail as possible, such as:
What happened?
What systems/data were affected?
When was it detected?
Any visible impact?
Who else knows about it?
What do you think caused it?
Did anything unusual happen before the incident?
Failure to report an incident may result in disciplinary action.
Once a report of an incident is received and validated, the CIRT will be activated. The CIRT can place a priority on the incident.
Once an incident is confirmed, the CIRT will take action to prevent further damage. This may involve:
Isolating affected systems from the network
Disabling compromised accounts and resetting credentials
Blocking malicious traffic or connections
Engaging external IT security specialists if required
As part of containment, forensic evidence should be gathered where appropriate. Our approach generally keeps logs in a place where they can’t be tampered with, but still, care should be taken to ensure that evidence is preserved as much as possible. General guidance for forensic evidence preservation includes:
Don’t turn off the system unless absolutely necessary
Log all actions taken
Don’t access or modify files unless necessary
Keep a record of all places where evidence was or could be found.
Our External First Response Advisor
Once initial containment is complete, the CIRT must contact our First Response provider:
First Response Advisor: Clyde & Co, Norton Rose Fulbright
First Response Contact: [1800 290 982](tel:1800 290 982) or [1800 316 349](tel:1800 316 349)
The First Response Advisor:
Will point an approved IT Specialist to assist with the incident response if required. They will form part of the CIRT, under the command of the Response Controller.
Will advise on initial legal advice including our obligations to regulators and individuals.
May appoint a Public Relations Advisor to prevent reputational damage.
Staff should be advised to route all inquiries from the public towards this advisor.
May appoint a Cyber Extortion Advisor to assist with ransomware or other extortion attempts.
In this case, all contact with the attacker should be routed through this advisor first.
The advise of the First Response Advisor should generally be followed as they are experts in the field of cyber incident response, and are familiar with the legal and regulatory environment in which we operate. Our cyber insurance policy recommends that we follow their advice.
4. Investigation & Impact Assessment
The CIRT will perform the initial triage and investigate the source, method, and impact of the attack. This includes:
Reviewing logs and system activity
Determining how the attack occurred
Assessing data loss or system compromise
Engaging external security experts if necessary
The incident severity will be determined based on:
Threat Level (e.g. untargeted malware vs. targeted attack)
System Criticality (e.g. finance system vs. general file storage)
Business Impact (e.g. operational disruption, financial loss)
Suspected Source (e.g. external attacker vs. internal error)
The severity will guide the response and recovery efforts.
5. Remediation
Once the issue is understood, the next step is to fix vulnerabilities and prevent recurrence. This may involve:
Removing malware or compromised accounts
Updating security controls and patching vulnerabilities
We try to develop a range of playbooks that can be used to respond to common incidents. You can find this in the Playbooks & Plans section, and in Grafana.
6. Recovery
Restoring systems and monitoring for lingering threats. Recovery actions include:
Restoring affected services & verifying system integrity
Ensuring no further unauthorised access
Conducting vulnerability scans
Monitoring for any recurrence of the attack
Communication & Reporting
Managing stakeholders is an important part of our incident response. This section outlines the communication and reporting requirements for different types of incidents.
Externally
Some incidents require notification to external parties. Our First Response Advisor will usually advise on this as the expert.
Generally, if we have a CRITICAL or HIGH incident, we will need to notify the following parties (each has their own specifics though):
Third-party IT/security providers – if additional expertise is needed
Australian Cyber Security Centre (ACSC) – must be notified within 12 hours for major incidents
Office of the Australian Information Commission (OAIC) – required for serious data breaches affecting personal information
Impacted customers/stakeholders – must be informed within 24 hours
Internally
Senior Management – must be kept updated on high-severity incidents
Relevant Business Units – need to understand potential operational impact
IT Teams – coordinate response and prevention measures
First Response Advisor (via our cyber insurance): Clyde & Co / Norton Rose Fulbright – 1800 290 982 or 1800 316 349
If there is a threat to life or risk of harm, call 000.
For suspected incidents, use the internal email notification template to report details to your manager and the CIRT team.
Appendices
Appendix A - Types of Incidents
Incident Type
Description
Installation or execution of unauthorised or malicious software
Suspected, attempted or actual installation or execution of unauthorised or malicious software on a Vaxa device. Includes malware detections by anti-malware software (even if mitigated successfully) and detections by application whitelisting solutions.
Network intrusion, enumeration, or another probe
Suspected, attempted or actual network intrusion, enumeration, or probe. Includes intrusion alerts generated by network security equipment such as firewalls or IDS/IPS.
Physical loss, theft, or damage of an IT asset
Suspected, attempted or actual physical loss, theft or damage of any IT asset containing Vaxa data. Includes the loss or theft of laptops, tablets, smartphones, or removable media (USB sticks, CDs, DVDs, DATs, etc.).
Physical loss, theft, or damage of hardcopy information
Suspected, attempted or actual physical loss, theft, or damage of any Vaxa information in hardcopy.
User impersonation
Suspected, attempted or actual instance of user impersonation. Includes password-sharing, attacks on authentication controls, impossible log-on scenarios, etc.
Suspicious privilege amendment
Suspected, attempted or actual instances where a genuine user appears to have been placed in an inappropriate user group or to otherwise have gained excessive privileges.
Suspicious use of legitimate privileges
Suspected, attempted or actual instances where user appears to have abused legitimate access privileges, e.g., by accessing large number of files, e-mailing data to unauthorised recipients, copying data to removable media or unusual network locations, etc.
Eavesdropping on a legitimate comms channel
Suspected, attempted or actual instances where Vaxa data appears to have been intercepted by an unauthorised party. Includes instances where sensitive data is transferred to authorised recipients in unencrypted form.
Service spoofing
Suspected, attempted or actual instances where a data service belonging to, or used by, Vaxa is spoofed by a third party. Includes fake websites.
DoS or excessive resource consumption
Suspected, attempted or actual instance where an entity places an excessively high demand on an information system or asset. Includes Denial of Service and spam.
Phishing
Suspected, attempted or actual instances where: - Email received that claims to be something, or from someone, that it is not. - Persons outside receive email which claims to be from Vaxa but is not.
Social Engineering
Suspected, attempted or actual instances where an unauthorised person attempts to gain access to Vaxa data or IT systems by deception or extortion of authorised users (staff, customers or third parties).
Inappropriate use of IT facilities (including inappropriate web browsing)
Suspected, attempted or actual instance where user uses system which they have authorised access in an illegal manner, breach policy or contrary to workplace norms. This includes browsing websites that are inappropriate for workplace; sending threatening, obscene or harassing communication; or accessing/storing illegal material.
Other harmful mode not listed
Any event that is deemed to be a security event that falls within the remit of the CIRT, but which does not fall into any of the above categories.
Appendix B – Incident Threat Levels
The following is an explicit description of Incident Threat Levels in descending order of criticality (worst at the top):
The criticality of systems and information that is potentially at risk is the second component to guiding the assessment of the severity of an incident. The following is an explicit description of these system or information criticalities in descending order of importance (most important first):
Highly Critical Information – Confidential Information (Intellectual Property, PII, PHI).
Criticality Level 3
High Criticality Systems (Active Directory, Exchange, Web Services etc.).
Criticality Level 4
Sensitive Information – Restricted Information (Sensitive Corporate Information, non-PII, Financial Transaction Information etc.).
Criticality Level 5
Non-Critical Multi-Use Systems (File Servers, SharePoint etc.).
Criticality Level 6
Individual Systems and Non-Sensitive Information.
Appendix D – Incident Severity Matrix
The following table outlines the severity of incidents based on the combination of Incident Threat Level and System or Information Criticality.
System or Information Criticality
Threat Level 1
Threat Level 2
Threat Level 3
Threat Level 4
Threat Level 5
Threat Level 6
Criticality Level 1
Critical
Critical
Critical
High
High
Medium
Criticality Level 2
Critical
Critical
High
High
Medium
Medium
Criticality Level 3
Critical
High
High
Medium
Medium
Medium
Criticality Level 4
High
High
Medium
Medium
Medium
Low
Criticality Level 5
High
Medium
Medium
Medium
Low
Low
Criticality Level 6
Medium
Medium
Medium
Low
Low
Low
3.5 - Policies
Under constructionThis page is still under construction. Please check back later as we continue to work on it.
3.5.1 - Information Security Policy
The information security policy outlines Vaxa’s overarching approach to information security management and signposts to specific sub-policies within our framework.
Purpose
This policy outlines Vaxa’s overarching approach to information security management and signposts to specific sub-policies within our framework.
Scope
The Information Security Policy applies to
All organisational and customer information, regardless of format.
All individuals associated with Vaxa, including temporary workers and external contractors.
Roles & Responsibilities
Who is responsible for doing what. This should refer to departments or roles instead of specific individuals.
Role
Responsibility
[Role]
[Responsibility]
Policy Statements, Standard, or Procedure
Related ISMS Policies
To ensure comprehensive information security management, Vaxa has opted to establish several detailed policies that support and complement this Information Security Policy.
Employees, contractors, and other stakeholders are required to familiarise themselves with these policies and adhere to their guidelines.
Details measures and practices to classify data in compliance with relevant regulations and our risk tolerance, so that appropriate protections can be applied.
All staff and contractors must undergo security training to support their roles. The training must align
with their job roles and the data they handle.
Induction for new employees includes mandatory security awareness.
Staff will be given regular training updates to maintain awareness of changing security threats.
Physical Security
Staff will secure and report lost security access passes.
Use physical restrictions such as keys or preferably swipe cards to manage access to restricted areas and equipment.
Always ensure visitors are accompanied on site.
Oral Communications
Use caution when communicating confidential information in public areas due to the risks of being overheard.
Third-Party Security
All third parties processing data on behalf of the organisation will undergo a risk assessment.
All third parties handling internal or confidential information must sign confidentiality agreements.
The organisation’s security policies will be communicated to third parties and contractually obligated as required.
Refer to our related third-party security policies;
Supplier Security Policy: This is for guidance on expectations around the approach to 3rd party security, with particular emphasis on personal data protection.
Personnel Screening
Personnel will undergo background checks before being employed. See the Personnel Screening Policy for more information.
Exceptions
Define how exceptions to the controlled document will be tracked.
Compliance & Monitoring
Define how compliance with the controlled document will be monitored and what checks will be performed (where applicable).
References
Procedure documents should map back to a governing policy or standard, and may relate to one or more procedures or other uncontrolled documentation. Policy documents may relate to an internal or external framework or legal requirement.
3.5.2 - Acceptable Use of Technology Policy
Under constructionThis page is still under construction. Please check back later as we continue to work on it.
3.5.3 - Backup Policy
The Backup Policy outlines the procedures and guidelines for data backup to ensure data availability and integrity.
Purpose
The purpose of this Backup Policy is to protect the confidentiality, integrity, and availability of data for both Vaxa and its customers. Complete backups are performed at regular intervals to ensure that data remains available when needed and in the event of a disaster.
Scope
This policy applies to all data and information systems owned, operated, or managed by Vaxa, including customer data, internal data, and all supporting infrastructure and systems.
Roles & Responsibilities
Role
Responsibility
IT Department
Implement and maintain backup systems and processes. Monitor backups and address any malfunctions promptly.
Security Officer
Oversee backup policy compliance and respond to backup failures or incidents.
Employees
Ensure business data is stored in company-controlled repositories and follow data classification procedures.
Management
Ensure data retention periods comply with regulatory and contractual requirements.
Policy Statement
Data classification:
Data should be classified at the time of creation or acquisition according to the Data Classification Policy.
An up-to-date inventory and data flow map of all critical data shall be maintained.
Data storage:
All business data, including data on end-user computing systems, shall be stored or replicated into a company-controlled repository.
Backup scope and frequency:
Data shall be backed up according to its classification level as defined in the Data Classification Policy.
Complete backups are performed at scheduled intervals appropriate to the data’s criticality.
Data retention:
Data retention periods shall be defined and comply with all applicable regulatory and contractual requirements. This is detailed in our Data Retention Policy.
Data and records belonging to Vaxa customers shall be retained our product terms and conditions and/or specific contractual agreements.
By default, all security documentation and audit trails are kept for a minimum of seven years, unless otherwise specified.
System documentation:
System documentation, including security and privacy-related documents, shall be backed up regularly.
Monitoring and safeguards:
The data backup process shall be monitored using technical and organisational safeguards.
Malfunctions shall be addressed promptly by qualified employees to ensure compliance with retention scope, frequency, and duration.
Use of removable media:
Removable or external hard drives (e.g., USB sticks) used for data backups shall remain disconnected from computers outside of active backup sessions.
Backup and Recovery Procedures
Customer Data & Systems
Vaxa’s customer data is stored in production accounts across numerous providers, depending on the nature of our engagement with the customer. In any case, Vaxa performs automatic backups to protect against catastrophic loss.
If you are a Vaxa customer, please ask us which of the below applies to your data.
Google Cloud Platform:
Data is stored in BigQuery databases and Cloud Storage buckets.
Google Cloud provides durable infrastructure designed for 99.999999999% object durability.
Versioning is enabled on all mission-critical data storage for both customer and Vaxa infrastructure.
Microsoft 365:
Data is backed up using the Afi.ai SaaS service.
Backups are immutable and encrypted in transit (TLS 1.3) and at rest (AES 256-bit).
Backups are stored in the Google Cloud Platform australia-southeast1 (Sydney) region.
Vaxa workstations:
Windows and Mac workstations are configured via MDM to redirect known folders to Microsoft OneDrive, providing backup for common folders.
OneDrive contents are backed up per the Microsoft 365 backup procedures.
Workstations are considered ephemeral and are not backed up as all relevant data is stored in cloud services.
Source code:
All source code is stored in Git repositories on GitHub.
GitHub’s data replication and backup strategy, along with local copies on developer machines, provide sufficient protection against data loss and for this reason, no additional backups are performed on this.
General Backup Procedures
Automatic backups:
Vaxa performs automatic backups of all customer and system data to protect against catastrophic loss due to unforeseen events.
An automated process backs up all data to a separate region within the country (e.g. Australia-southeast1 to Australia-west1)
Backup frequency and encryption:
Data is backed up at intervals appropriate to its criticality level according to the Data Classification Policy.
Backups are encrypted in the same manner as live production data.
Monitoring and alerts:
Backup processes are monitored by an appropriate monitoring system.
Backup failures trigger an incident response, alerting the Security Officer immediately.
Exceptions
Any exceptions to this policy must be documented and approved by the Security Officer and relevant management. Exceptions will be tracked and reviewed periodically to determine if they are still required.
Compliance & Monitoring
Compliance:
Regular audits will be conducted to ensure adherence to this Backup Policy.
Compliance with applicable laws, regulations, and contractual obligations will be maintained.
Monitoring:
The IT Department will monitor backup processes and address any issues promptly.
Backup logs and reports will be reviewed regularly for anomalies or failures.
Reporting:
Any incidents or failures in the backup process must be reported to the Security Officer immediately.
Compliance findings will be reported to senior management.
We classify data to ensure it is protected according to its sensitivity and criticality.
Purpose
The purpose of this Data Classification Policy is to establish a framework for classifying Vaxa’s data based on its level of sensitivity, value, and criticality. This policy ensures that data is appropriately protected and accessible only to authorised individuals & systems.
Scope
This policy applies to all employees, contractors, consultants, partners, and any other personnel with access to Vaxa’s information assets. It covers all types of data, regardless of format or medium, including documents, emails, electronic files, and verbal communications.
Roles & Responsibilities
Role
Responsibility
Employees and Contractors
Classify data according to this policy at the time of creation or acquisition. Handle data according to its classification level.
Managers
Ensure team compliance with the data classification policy. Provide guidance on classification levels.
Information Owners
Determine the classification of information assets under their control. Approve access requests for sensitive data.
Security Officer
Oversee the implementation of the data classification policy. Provide training and support.
Policy Statements, Standard, or Procedure
Data Classification Levels
All Vaxa data must be assigned a classification level at the time of creation or acquisition. The classification determines the security controls required for handling, transmitting, or storing the data.
These classification levels shall be applied as protective markings to data and information assets where possible.
Table 1 - Data Classification Levels
Classification Level
Color
Description
UNOFFICIAL
BLACK
Internal information not requiring specific protective measures.
PUBLIC
GREEN
Information authorized for unlimited external access and circulation to the public. Examples include press releases, marketing materials, blogs, webinars, social media posts, and the Vaxa website.
OFFICIAL(Default Classification)
GREY
Information that can be freely disclosed within Vaxa and to authorized external parties with a relevant business relationship. Examples include client metadata and proposals, most client data and reports (depending on sensitivity or client requirements), internal communications, policies, procedures, methodologies, photos taken within Vaxa offices, internal messages, and emails.
OFFICIAL: Sensitive
YELLOW
OFFICIAL information requiring limited dissemination due to its sensitive nature. Compromise could result in limited damage to individuals or organizations.
PROTECTED
BLUE
Valuable, important, and sensitive information. Compromise would be expected to cause damage to the national interest, organizations, or individuals.
VAXA RESTRICTED
BLUE
Information available only to authorized groups within Vaxa relevant to their job function. Can only be disclosed externally to specific third parties. Encryption (AES-256 or equivalent) must be used when transmitting or storing this data. Strong passwords are required if sending files. Examples include some client data and reports (depending on sensitivity or client requirements), data protected by state or federal regulations, and data under non-disclosure or confidentiality agreements.
VAXA PRIVILEGED
RED
Information disclosed internally on a need-to-know basis and externally only to specific authorized parties. Access must be approved by the information owner. Examples include finance information, sensitive human resources information, company business and strategy plans, board and shareholder reports, and any information subject to legal privilege.
Alignment between Vaxa’s Data Classification Levels and Australian PSPF Protective Markings
As Vaxa commonly interacts with entities under the Australian Government Protective Security Policy Framework (PSPF), we need to consider how our data classification levels align with the PSPF protective markings.
Vaxa, it’s personnel and systems are not authorised to process, store or interact with information above the classification of PROTECTED, and therefore we don’t include those classifications in this policy. There may be exceptions made under the appropriate legislative instruments, but these are rare and require specific approval. Internally, however, we do have similar classifications for data above PROTECTED, but again these are only for internal use.
Below is a table that steps out the alignment between Vaxa’s data classification levels and the PSPF protective markings.
Table 2 - Alignment between Vaxa’s Data Classification Levels and Australian PSPF Protective Markings
Vaxa Classification Level
PSPF Protective Marking
Description
UNOFFICIAL
UNOFFICIAL
Internal information not requiring specific protective measures.
PUBLIC
UNOFFICIAL
Information authorized for unlimited external access and circulation to the public.
OFFICIAL
OFFICIAL
Information that can be freely disclosed within Vaxa and to authorized external parties with a relevant business relationship.
OFFICIAL: Sensitive
OFFICIAL: Sensitive
OFFICIAL information requiring limited dissemination due to its sensitive nature. Compromise could result in limited damage to individuals or organizations.
PROTECTED
PROTECTED
Valuable, important, and sensitive information. Compromise would be expected to cause damage to the national interest, organizations, or individuals.
VAXA RESTRICTED
No equivalent
This is a Vaxa-specific classification.
VAXA PRIVILEGED
No equivalent
This is a Vaxa-specific classification.
(We note that UNOFFICIAL is not an officially recognsied PSPF Protective Marking, however many entities use this classification for internal information that does not require specific protective measures.)
Data Classification Guidelines
Assignment of classifications:
Data creators are responsible for assigning the appropriate classification level at the time of creation.
When in doubt, consult with your manager or the Security Officer for guidance.
Handling of data:
Handle, transmit, and store data according to its classification requirements.
Regardless of classification, always protect sensitive information from unauthorised access or disclosure.
As required, refer to the other Information Security Policies for specific handling requirements for your given classification level.
Review and Reclassification:
Regularly review data to determine if reclassification is necessary.
Update classifications if the sensitivity level of the data changes.
Exceptions
Any exceptions to this policy must be approved in writing by the Security Officer and the Managing Director. Requests for exceptions should include a justification and any mitigating controls.
Compliance & Monitoring
Training:
All personnel must complete training on data classification and handling procedures.
Monitoring:
The Security Officer will monitor compliance with this policy through regular audits and assessments.
Non-compliance will be addressed promptly with corrective actions.
Reporting:
Any breaches or suspected breaches of this policy must be reported immediately to the Security Officer. See the Responsible Disclosure Policy for reporting guidelines.
The Data Retention Policy outlines how we retain and dispose of data in a secure and compliant manner, to ensure that data is available when needed and that we comply with legal and regulatory requirements while minimising risks.
Purpose
The purpose of this Data Retention Policy is to ensure that Vaxa retains necessary data for business operations, legal obligations, and regulatory compliance. This policy aims to manage data efficiently, reduce storage costs, and minimise risks associated with unnecessary data retention.
Scope
This policy applies to all employees, contractors, and third-party partners of Vaxa who handle company data. It covers all types of data collected, stored, processed, or transmitted by Vaxa, including electronic and physical records.
Data is to be retained for 7 years, unless flagged for a different retention period based on its classification (see exceptions).
Data Disposal
Upon expiration of the retention period, data must be securely disposed of.
Disposal methods shall be complete, irreversible, and in compliance with data protection regulations regardless of the physical medium.
Legal and regulatory dompliance
Data shall be retained longer if required by law, regulation, or ongoing litigation.
Data disposal shall be paused in case of legal holds until clearance is obtained under appropriate legal advice.
Third-party data
Data received from clients or partners must be retained according to contractual agreements.
Some contracts with clients may necessitate earlier or later data disposal than our standard retention period; this should be documented and adhered to.
Exceptions
Any exceptions to this policy must be documented and approved by the Security Officer. Requests for exceptions should outline the reasons and duration of the exception, as well as details of how it was implemented in our data storage systems.
Compliance & Monitoring
The Security Officer will conduct regular reviews to ensure adherence to this policy. Non-compliance may lead to disciplinary actions as per company guidelines.
Identity and Access Management are cornerstones of our security strategy. This policy outlines how we manage identities and access to systems, applications, and data.
Purpose
This policy defines how Vaxa Analytics manages identities and access to systems, applications, and data. It ensures access is granted based on business needs while minimising security risks. The policy aligns with our Zero Trust Network Architecture (ZTNA) principles, ensuring access is continuously verified, minimises privileges, and follows least privilege access principles.
Scope
This policy applies to all employees, contractors, vendors, and third parties who access Vaxa’s IT systems, applications, or data.
Roles & Responsibilities
Role
Responsibility
CTO
Oversees IAM strategy, reviews high-risk access requests, and ensures policy compliance.
Information Security Group
Implements IAM controls, reviews access logs, manages identity lifecycle, and enforces access revocation policies.
System Owners
Approve and review access requests, ensuring they align with least privilege principles.
HR
Ensures onboarding and offboarding processes align with identity lifecycle management.
All Users
Adhere to IAM policies, use only approved authentication mechanisms, and report any suspicious activity.
Policy Statements
Identity Verification & Authentication
All access is identity-based and requires strong authentication.
Multi-Factor Authentication (MFA) is mandatory for all accounts where technically feasible.
Passwordless authentication methods should be used.
Service accounts and machine identities must have unique credentials and not be used for interactive login.
Break-glass accounts are tightly controlled, regularly audited, and credentials are long, unique, and unpredictable.
Zero Trust, Least Privilege Access, & Role-Based Access Control (RBAC)
Access is denied by default and granted on a need-to-know, least privilege basis.
Users must request access through a formal approval process.
Privileged access must be reviewed regularly and revoked if no longer required.
Access must be continuously monitored, logged, and revoked in case of suspicious activity.
Access to systems and data is role-based, ensuring least privilege access.
RBAC must be implemented in all critical systems, assigning users permissions based on job functions.
Access to applications is managed via security groups, rather than assigning permissions at an individual level.
System Owners define and manage RBAC roles and group memberships, subject to Information Security Group (if typical) or CTO approval (if subject to an Evaluation of Privilege Requests Procedure).
Identity Lifecycle & Access Reviews
Access must be provisioned and deprovisioned as part of the onboarding and offboarding process.
Automatic deactivation of privileged accounts should occur:
After 12 months unless revalidated.
After 45 days of inactivity.
And, should occur as soon the access is no longer required.
Access reviews:
System Owners conduct quarterly reviews of privileged access.
User access to business-critical systems is reviewed every 6 months.
Terminated employees must have access revoked immediately.
Monitoring & Auditing
All privileged access events are logged, stored centrally, and protected from unauthorised modification or deletion.
All privileged account and group management events are logged, stored centrally, and protected.
Logs are monitored for unusual activity, with alerts raised for suspicious access attempts.
Break-glass accounts are tightly controlled, regularly audited, and credentials are long, unique, and unpredictable.
Exceptions
Any exceptions to this policy require documented approval from the CTO and Information Security Group. Exceptions must be risk-assessed and periodically reviewed.
Compliance & Monitoring
Information Security Group will conduct regular audits to ensure compliance.
IAM policies will be reviewed annually to ensure they remain effective.
Violations of this policy may result in disciplinary action, up to and including termination.
Our team is the backbone of Vaxa, and we need to make sure we do our due diligence when it comes to hiring new team members. This policy outlines the guidelines and procedures for employment screening at Vaxa.
Purpose
The purpose of this policy is to establish comprehensive guidelines and procedures for employment screening in accordance with AS 4811:2022.
This policy aims to ensure that all potential and existing employees, contractors, and volunteers are appropriately screened and monitored based on their level of access to sensitive information or their position within the organisation. It is designed to mitigate risks such as fraud, theft, or reputational damage while promoting a fair and transparent process across all levels of employment.
Scope
This policy applies to all potential and current employees of the organisation, including full-time, part-time, and temporary staff, as well as contractors and volunteers. It also extends to ongoing employment screening, periodic re-screening, and continuous monitoring of current employees, particularly those in sensitive positions.
Additionally, it applies to external contractors in certain circumstances.
Roles & Responsibilities
The person undertaking the employment administrative tasks is responsible for ensuring that all potential employees undergo the appropriate screening checks in accordance with this policy.
Policy
Screening levels
Potential and current employees, contractors, and volunteers each bring about a different level of risk. Our risk-based approach classifies employees into four Levels, which in turn determines the appropriate level of screening/vetting/due diligence.
These levels are:
Level 4 - Executive: This level is for employees who hold executive positions within the organisation, such as CEOs, directors, and other senior leaders who have a significant impact on the direction and management of the organisation.
Level 3 - Sensitive Access: This level applies to employees who require access to sensitive information, financial data, or other privileged information. This includes employees with company credit cards, access to financial systems, or those who could cause significant public-facing damage due to their level of access or position (e.g., spokespersons, technical roles, or work on sensitive contracts).
Level 2 - Standard: This level is for all other employees who do not fall under Level 3 or Level 4.
Level 1 - Restricted Access Contractors: This level is for contractors with limited access to systems (e.g., only email) but who nonetheless have some level of access. Full-time or part-time contractors with broader access fall into Level 2 or above. Level 1 is usually only suitable for short-term or transient employees.
Records of employment screening checks
Records of all employment screening checks must be kept for five years from the date of the last action taken on the records. Record shall be securely disposed of after this time.
This applies to both potential and current employees, including any re-screening checks conducted during ongoing employment. The organisation shall ensure compliance with data privacy laws and secure storage practices for these records.
Undertaking of screening
Screening checks shall be conducted using an approved third-party supplier. Where possible, the organisation shall not store personal information of potential or current employees, in line with the organisation’s information security management policies. Instead, the organisation will store only the outcome of the screening provided by the third-party supplier.
Offers of employment (or in the case of a contractor, engagement) shall:
Be contingent on successful completion of screening checks; or
Not be issued prior to the successful completion of screening checks.
Candidates must be informed of the screening process and the types of checks that will be conducted as part of the job offer process. This ensures transparency and allows candidates to provide accurate and complete information, facilitating a smooth and efficient screening process.
Mandatory screening checks
The following screening checks shall be conducted for all potential and current employees (Level 2, Level 3, and Level 4) prior to employment or as part of ongoing employment monitoring:
Identity check requiring 100 points of ID: All potential and current employees must provide identification that meets the 100 points of ID requirements (e.g., passport, driver’s license, birth certificate).
Eligibility to work in Australia: All potential and current employees must provide evidence of their eligibility to work in Australia.
Address history checks for a minimum of five years: Potential and current employees must provide their address history for the past five years, verified through a screening check. Address history will be cross-referenced against sensitive countries that may pose a risk to the employee or organisation.
Character reference checks: Two character references will be obtained and verified for all potential and current employees.
National police check not exceeding one year: A national police check, no older than one year, must be conducted for all potential and current employees.
Verification of declared experience and qualifications: All declared experience and qualifications must be verified through appropriate screening checks.
Social media assessment: A social media assessment will be conducted for all potential and current employees.
Referee checks: Referee checks will be conducted for all potential and current employees.
Ongoing employment screening and re-screening
Periodic re-screening of current employees, particularly those in Level 3 and Level 4 positions, is required to ensure continued suitability for their roles. This includes re-screening at intervals determined by the organisation based on the risk profile of the position.
Additional screening checks
The following additional screening checks may be conducted depending on the assessed screening level:
Australian Securities and Investments Commission (ASIC) check: An ASIC Banned & Disqualified Persons, Enforceable Undertakings Register, and Australian Directorships checks will be conducted for Level 4 potential and current employees.
Employment history checks, including Defence-related work: Employment history checks, including any Defence-related work history, will be conducted for all potential and current employees to verify information provided in resumes.
Credit check: A basic public record credit check will be conducted for Level 4 potential and current employees and any Level 3 employees dealing with the organisation’s financial dealings.
Professional membership and education verification: Where employment is predicated on professional membership or education (e.g., tertiary degree), the existence and validity of the membership and/or education must be verified directly with the relevant body.
Cultural and diversity considerations
The organisation is committed to ensuring that the employment screening process is conducted in a manner that is respectful and inclusive of all cultural, religious, and personal backgrounds. The following considerations must be taken into account:
Respect for cultural differences: Screeners must be sensitive to cultural variations in naming conventions, documentation, and personal histories. For example, the identity verification process should account for differences in the types of identification documents that are commonly used or accepted in different cultures.
Non-discrimination: All screening processes must be conducted in a non-discriminatory manner, ensuring that no potential or current employee is treated unfairly or differently based on their race, ethnicity, religion, gender, sexual orientation, disability, or any other protected characteristic.
Language barriers: Where necessary, the organisation will provide translation or interpretation services to ensure that all potential and current employees fully understand the screening process and can provide accurate information.
Religious sensitivities: The organisation will accommodate religious practices and observances during the screening process, such as respecting religious attire in photographs or conducting interviews in a manner that aligns with religious customs.
Inclusive practices: The screening process should be designed to include, rather than exclude, individuals from diverse backgrounds. This includes recognising qualifications and experiences from different countries and adapting the screening process to fairly evaluate such credentials.
Vaxa recognises the importance of maintaining strong, transparent relationships with third-party suppliers we use that are responsible for conducting employment screening checks.
These vendors, like all Vaxa vendors, are subject to our Supplier Security Policy. These vendors shall be assessed under that policy.
In addition, these vendors should be subject to the following additional requirements:
Selection criteria: Vendors chosen to conduct employment screening must demonstrate their ability to comply with AS 4811:2022, relevant legal requirements, and the organisation’s internal policies. They should also provide evidence of their expertise, reliability, and commitment to data security.
Contractual obligations: All third-party suppliers should enter into a formal agreement with the organisation that outlines their responsibilities, the scope of services, confidentiality requirements, and the standards they are expected to meet. The agreement should also include provisions for regular audits and performance reviews.
Data Security and privacy: Vendors should adhere to strict data security protocols to protect the personal information of potential and current employees. This includes ensuring that data is stored securely, access is restricted to authorised personnel only, and data is processed in compliance with relevant privacy laws.
Performance monitoring: Vaxa should regularly monitor the performance of third-party suppliers to ensure that they are meeting agreed-upon standards. This may include periodic reviews of screening outcomes, timeliness of service, and compliance with contractual obligations.
Continuous improvement: Vaxa should work collaboratively with third-party suppliers to continuously improve the screening process. This may involve providing feedback, sharing best practices, and updating screening criteria as new risks or regulatory requirements emerge.
Termination of services: If a vendor fails to meet Vaxa’s standards or breaches the terms of the contract, Vaxa should reserve the right to terminate the relationship and seek an alternative supplier. Termination procedures should be clearly outlined in the contract, along with any associated penalties or remedies.
Compliance and Monitoring
Any violation of this policy may result in disciplinary action, up to and including termination of employment.
For all personnel, the Information Security Group shall be responsible for monitoring compliance with this policy.
For personnel in scope of DISP, then the DISP Security Officer shall also be responsible for monitoring compliance with this policy.
Related Documents and Legislation
AS 4811:2022 - Employment Screening: available via Standards Australia here.
Overview of why the controlled document is being implemented.
Scope
Who or what does the controlled document apply to.
Roles & Responsibilities
Who is responsible for doing what. This should refer to departments or roles instead of specific individuals.
Role
Responsibility
[Role]
[Responsibility]
Policy Statement/Standard/Procedure [PICK ONE]
The details! Detail the specific policy, procedure, or process. This section can include step-by-step instructions or rules that must be followed.
Exceptions
Define how exceptions to the controlled document will be tracked.
Compliance & Monitoring
Define how compliance with the controlled document will be monitored and what checks will be performed (where applicable).
References
Procedure documents should map back to a governing policy or standard, and may relate to one or more procedures or other uncontrolled documentation. Policy documents may relate to an internal or external framework or legal requirement.
3.5.9 - Privacy Policy
Vaxa necessarily handles sensitive & personal information about clients, partners, and employees. This policy outlines how we collect, use, disclose, and manage this information in a compliant way.
Purpose
This Privacy Policy outlines how Vaxa collects, uses, discloses, and manages personal and sensitive information. Our commitment is to protect the privacy of individuals and ensure compliance with the Privacy Act 1988 (Cth) and the Australian Privacy Principles (APPs). By adhering to these standards, we aim to maintain transparency and trust with our clients, partners, and employees.
Scope
This policy applies to all personal and sensitive information collected, stored, processed, or disclosed by Vaxa in the course of our data analytics, software development, solution design, program design, and advisory services. It encompasses all employees, contractors, consultants, partners, and third parties who handle personal information on our behalf.
Roles & Responsibilities
Role
Responsibility
CTO
Set and maintain the technical implementation of this policy across the business.
Privacy Officer
Monitor adherence to the Privacy Act and APPs. Provide guidance on privacy matters. Respond to inquiries and manage data breaches alongside CTO.
Employees and Contractors
Comply with this policy and report any privacy concerns.
Third Parties
Adhere to privacy obligations when handling information on our behalf.
Policy
Collection of Personal Information
We collect personal information only when it is necessary for our business functions or activities. This may include:
Contact Details: Name, address, email, and phone numbers.
Professional Information: Job titles, employer details, and qualifications.
Sensitive Information: Health data, racial or ethnic origin, etc., collected only with consent or as required by law.
We strive to collect information directly from individuals. When collecting from third parties, we ensure that consent has been obtained or it is otherwise permissible under the law.
Use and Disclosure
Personal information is used for:
Providing and improving our services.
Communicating with clients and stakeholders.
Fulfilling legal and regulatory obligations.
We do not disclose personal information to third parties except:
With the individual’s consent.
When required by law.
To service providers who assist us in our operations, under confidentiality agreements.
Data Security and Storage
We take reasonable steps to protect personal information from misuse, interference, loss, unauthorized access, modification, or disclosure. Measures include:
Physical Security: Secure office premises and restricted access areas.
Technical Safeguards: Firewalls, encryption, and secure servers.
Administrative Controls: Policies, procedures, and staff training.
Retention: Personal information is stored securely and retained only for as long as necessary.
Individuals have the right to access and correct their personal information held by us. Requests should be directed to our Privacy Officer and will be addressed within a reasonable time frame.
Cross-border Disclosure
We may transfer personal information overseas only if:
The recipient is subject to laws similar to the APPs.
Consent has been obtained.
It is necessary for contractual purposes.
Anonymity and Pseudonymity
Where practicable, individuals may interact with us anonymously or under a pseudonym. However, certain services may require identification.
Direct Marketing
We will not use personal information for direct marketing without consent. Individuals can opt-out of marketing communications at any time.
Data Breaches
In the event of a data breach likely to result in serious harm, we will notify affected individuals and the Office of the Australian Information Commissioner (OAIC) as required under the Notifiable Data Breaches scheme.
Complaints Handling
Complaints regarding privacy breaches can be submitted to our Privacy Officer via security@vaxagroup.com. We will investigate and respond promptly, in accordance with our obligations and this policy.
Exceptions
Any exceptions to this policy must be approved by the Managing Director and the Privacy Officer. All exceptions will be documented, including the rationale and duration.
Compliance and Monitoring
We are committed to regular monitoring and review of our privacy practices to ensure compliance. Actions include:
Training: Regular staff training on privacy obligations.
Audits: Periodic assessments of data handling practices.
Policy review: Annual reviews or updates in response to legislative changes, in line with our Controlled Document procedure
Non-compliance may result in disciplinary action, including termination of employment or contracts.
Office of the Australian Information Commissioner (OAIC): OAIC website
Notifiable Data Breaches Scheme (NDB): OAIC guidance
3.5.10 - Privileged Access Policy
This policy ensures that privileged access to systems, applications, and data is securely managed, controlled, and monitored.
Purpose
This policy ensures that privileged access to systems, applications, and data is securely managed, controlled, and monitored. It aims to minimise security risks associated with privileged accounts, ensuring they are only granted when necessary and for a limited duration.
Scope
This policy applies to all employees, contractors, and third parties who require privileged access to Vaxa’s systems, applications, and data.
Roles & Responsibilities
Role
Responsibility
Chief Technology Officer (CTO)
Reviews and approves privileged access requests based on necessity and security considerations. Ensures compliance with this policy.
Configure and enforce privileged access controls. Manage privileged account lifecycle, including periodic revalidation.
Privileged Users
Use privileged accounts strictly for administrative duties. Adhere to access controls, separation of duties, and security best practices.
Policy Statements
Definition of Privileged Access
Privileged access is defined as access to systems, applications, and data that allows users to perform administrative or configuration tasks that could impact the security, integrity, or availability of the environment. This includes, but is not limited to, access to system settings, user account management, data manipulation, and configuration changes. This is on servers, within applications, across databases, cloud environments, network devices, and local machines.
Access Control & Restrictions
Privileged accounts must be explicitly authorised and are strictly limited to what is required for users and services to undertake their duties.
Privileged users must use separate privileged and unprivileged operating environments.
Privileged users must be assigned a dedicated privileged account, which must be used solely for tasks requiring privileged access.
The environment must be configured to prevent virtualisation of privileged operating environments within unprivileged ones.
Unprivileged accounts must be prevented from logging into privileged operating environments.
Privileged accounts (excluding local administrator accounts) must be prevented from logging into unprivileged environments.
Privileged Access Lifecycle Management
Privileged access is automatically disabled after 12 months unless explicitly revalidated.
Privileged access is automatically disabled after 45 days of inactivity.
Privileged access requests are assessed individually by the CTO, who ensures appropriate restrictions and timeouts based on necessity.
Secure Administrative Operations
Where required, administrative activities should be conducted through jump servers. However, as a cloud-native organisation without a traditional data centre, Vaxa may go without the use of jump servers until their necessity is demonstrated or dicated by the CTO.
Credentials for break-glass accounts, local administrator accounts, and service accounts must be long, unique, unpredictable, and their whereabouts must be known only to authorised personnel and audited regularly for misuse and availability.
Logging & Monitoring
All privileged access events must be logged, stored in a central location, and protected from unauthorised modification and deletion.
All privileged account and group management events must be logged, stored in a central location, and protected from unauthorised modification and deletion.
Exceptions
Exceptions to this policy must be formally requested, documented, and approved by the CTO. Exceptions must include a risk assessment and mitigation strategy.
Compliance & Monitoring
The Information Security Group will:
Regularly audit privileged access logs.
Conduct periodic privileged account reviews to ensure adherence to lifecycle policies.
Investigate and respond to any unauthorised privileged access attempts.
A policy to facilitate the secure reporting of vulnerabilities and policy violations.
Purpose
This policy allows for the reporting and disclosure of concerns and vulnerabilities discovered by external entities, as well as anonymous reporting of information security policy violations by internal entities. These vulnerabilities or concerns usually relate to security, confidentiality, integrity, and availability failures, incidents, or concerns.
Scope
Vaxa’s Responsible Disclosure Policy applies to all Vaxa platforms and information security infrastructure. It applies to all employees and all third parties.
Roles & Responsibilities
Role
Responsibility
Security and Compliance Team
Review and assess vulnerability reports submitted to the security+vulnerability@vaxagroup.com inbox. Initiate the resolution process, communicate with the reporter, and track remediation efforts. Ensure compliance with legal and ethical standards throughout the process.
Product Security Team
Manage receipt and triage of vulnerability reports. Prioritise and assign resources for resolution. Maintain communication with external entities providing vulnerability reports, and acknowledge submissions within 2 business days. Provide public credit to the reporter upon successful resolution.
Managing Director/Directors
Act as the point of contact for individuals reporting retaliation, reprisal, or harassment related to whistleblowing. Ensure any instances of retaliation are addressed promptly and appropriately. Support and protect the whistleblower’s rights during an investigation.
Neutral Third Party (if necessary)
Assist in resolving communication issues or challenges related to the handling of a vulnerability. Facilitate communication between Vaxa and external entities if conflicts arise.
Policy Statement
Legal Position
Vaxa will not engage in legal action against individuals who submit vulnerability reports through our Vulnerability Reporting inbox. We openly accept reports for all Vaxa products and services. We agree not to pursue legal action against individuals who, in good faith:
Engage in the testing of systems/research without harming Vaxa or its customers.
Engage in vulnerability testing within the scope of our vulnerability disclosure program.
Test on products without affecting customers, or receive permission/consent from customers before engaging in vulnerability testing against their devices/software.
Adhere to the laws of their location and the location of Vaxa.
Refrain from disclosing vulnerability details to the public before a mutually agreed-upon timeframe expires.
Vulnerability Reporting/Disclosure
How to Submit a Vulnerability
To submit a vulnerability report to Vaxa’s Product Security Team, please utilise the following email: security+vulnerability@vaxagroup.com.
A basic version of our responsible disclosure policy is also made available in the security.txt format on each of the Vaxa brands’ public-facing websites at /.well_known/security.txt.
Preference, Prioritisation, and Acceptance Criteria**
What we would like to see from you:
Well-written reports in English will have a higher probability of resolution.
Reports that include proof-of-concept code equip us to better triage.
Reports that include only crash dumps or other automated tool output may receive lower priority.
Reports that include products not on the initial scope list may receive lower priority.
Please include how you found the bug, the impact, and any potential remediation.
Please include any plans or intentions for public disclosure.
What you can expect from Vaxa:
Acknowledgement of your report within 2 business days.
After triage, we will send an expected resolution timeline. We commit to being as transparent as possible about the remediation timeline as well as on issues or challenges that may extend it.
An open dialogue to discuss issues and resolution.
Notification when the vulnerability analysis has completed each stage of our review.
Public credit after the vulnerability has been validated and fixed.
If we are unable to resolve communication issues or other problems, Vaxa may bring in a neutral third party to assist in determining how best to handle the vulnerability.
Whistleblowing
How to Submit a Report
To anonymously report an information security program violation or a violation of related laws and regulations, you can:
Send an email to security+whistleblow@vaxagroup.com.
We encourage you to use a temporary email service to protect your identity if desired.
Preference, Prioritisation, and Acceptance Criteria**
What we expect from you:
A detailed report made in good faith or based on a reasonable belief.
Good faith: Truthful reporting of a company-related violation of information security policies, procedures, or regulations, as opposed to a report made with reckless disregard or willful ignorance of facts.
Reasonable belief: The subjective belief in the truth of the disclosure and that any reasonable person in a similar situation would objectively believe based on the facts.
Details of the violation (i.e., what, how, why).
Facts about the reported event (i.e., who, where, when).
You are not responsible for investigating the alleged violation or determining fault or corrective measures.
What you can expect from Vaxa:
Your report will be submitted to the Security and Compliance Team for review.
Protection of your identity and confidentiality.
Note: It may be necessary for your identity to be disclosed when a thorough investigation, compliance with the law, or due process of accused members is required.
Protection against any form of reprisal, retaliation, or harassment.
If you believe that you are being retaliated against, immediately contact the Managing Director or other Director.
Any retaliation or harassment against you will result in disciplinary action towards the instigator.
Retaliation, reprisal, and harassment—from which you will be protected—can include:
Dismissal
Disadvantaging you in your employment or position
Discrimination between you and other employees or third parties
Harassment or intimidation
Harm or injury (including psychological injury)
Damage to property
Damage to reputation
Note: Your right to protection does not extend to immunity for any personal wrongdoing alleged in the report and investigated. You may be liable for your own misconduct.
Due process for you and the accused member(s).
Corrective actions will be taken to resolve a verified violation, including reviewing and enhancing applicable policies and procedures if necessary.
Continuous information security awareness training and advice on your rights as a whistleblower.
Exceptions
Any exceptions to this policy must be approved by the Security and Compliance Team and properly documented.
Compliance & Monitoring
Compliance with this policy will be ensured by:
Regular reviews: Conducting regular reviews of reported vulnerabilities and policy violations.
Tracking remediation: Monitoring remediation efforts and ensuring timely resolution.
Transparent communication: Maintaining open communication with reporters throughout the process.
Whistleblower protection: Protecting whistleblowers from retaliation and ensuring their rights are upheld.
Audits: Performing periodic audits to ensure adherence to legal and ethical standards.
This policy outlines the security requirements that suppliers must adhere to when working with Vaxa.
Under constructionThis page is still under construction. Please check back later as we continue to work on it.
3.6 - Procedures
Under constructionThis page is still under construction. Please check back later as we continue to work on it.
3.6.1 - Controlled Document Procedure
Vaxa deploys control activities through policies and standards that establish what is expected and procedures that put policies and standards into action.
Purpose
Vaxa deploys control activities through policies and standards that establish what is expected and procedures that put policies and standards into action.
The purpose of this procedure is to ensure that there is consistency in developing and maintaining controlled documents at Vaxa utilizing a hierarchal approach for managing legal and regulatory requirements.
There are two types of documentation at Vaxa:
Controlled Documents: Formal policies, standards and procedures.
Uncontrolled Documents: Informal runbooks, certain handbook pages, guidelines, blog posts, templates, etc.
Everyone at Vaxa is welcomed and encouraged to submit a pull request to create or suggest changes to controlled documents at any time.
Scope
This procedure applies to all controlled documents developed in support of Vaxa’s statutory, regulatory and contractual requirements.
Uncontrolled documents are dynamic in nature and not in scope of this procedure.
Roles & Responsibilities
Role
Responsibility
Security Compliance Team
Responsible for implementing and maintaining Security Policies and oversight of supporting standards and procedures as part of ongoing continuous control monitoring
Security Governance Team
Responsible for conducting annual controlled documents review
Security Assurance Management (Code Owners)
Responsible for approving changes to this procedure
Control Owners
Responsible for defining and implementing procedures to support Security policies and standards
Policy: A policy is a high-level statement of intent and defines Vaxa’s goals, objectives and culture. Statutory, regulatory, or contractual obligations are commonly the root cause for a policy’s existence. Policies are designed to be centrally managed at the organizational level (e.g. Security Compliance Team or Legal & Ethics Compliance Team).
Standard: Standards are mandatory actions or rules that give formal policies support and direction by providing specific details that enable policies to be implemented. Standards may take the form of technical diagrams.
Procedure: Procedures are detailed instructions to achieve a given policy and, if applicable, supporting standard and provid step-by-step instructions to follow. Procedures are decentralized and managed by process/control owners where a security control is translated into a business process.
Creation
At minimum, controlled documents should cover the following key topic areas:
Purpose: Overview of why the controlled document is being implemented.
Scope: Who or what does the controlled document apply to.
Roles & Responsibilities: Who is responsible for doing what. This should refer to departments or roles instead of specific individuals.
Policy Statements, Standard or Procedure: The details.
Exceptions: Define how exceptions to the controlled document will be tracked.
Compliance & Monitoring: Define how compliance with the controlled document will be monitored and what checks will be performed (where applicable).
References: Procedure documents should map back to a governing policy or standard, and may relate to one or more procedures or other uncontrolled documentation. Policy documents may relate to an internal or external framework or legal requirement.
Publishing
Creation of, or changes to, controlled documents must be approved by management or a formally designated representative of the owning department as defined in the CODEOWNERS file prior to publishing.
Controlled documents are required to be reviewed and approved on at least an annual basis. Controlled documents may be updated ad-hoc as required by business operations. Changes must be approved by a code owner of the controlled document prior to merge.
Ensure that announcements for team members are scheduled, and tick off the MR template task.
List of Controlled Documents
An accurate list of current controlled documents can be found here.
Exceptions
Exceptions to controlled documents must be tracked and approved by the controlled document approver(s) via an auditable format. An exception process should be defined in each controlled document.
In the event a team member requires a deviation from the standard course of business or otherwise allowed by policy, the Requestor must submit a Policy Exception Request to the Vaxa Security Compliance team, which contains, at a minimum, the following elements:
Team member Name and contact
Time period for the exception (deviations should not exceed 90 days unless the exception is related to a device exception, like using a Windows device)
The exception being requested, i.e. which policy or procedure is affected by the proposed deviation
Additional details as required by each template, to include evidence of security protections.
Exception request approval requirements are documented within the issue template. The requester should tag the appropriate individuals who are required to provide an approval per the approval matrix.
If the business wants to appeal an approval decision, such appeal will be sent to Legal at legal@Vaxa.com. Legal will draft an opinion as to the proposed risks to the company if the deviation were to be granted. Legal’s opinion will be forwarded to the CEO and CFO for final disposition.
Any deviation approval must:
Recommended compensating controls to reduce exposure and/or harm (i.e. admin rights to financially significant system may require audit logs and review of users activity within the system)
Be captured in writing
References
3.6.2 - Evaluation of Privilege Requests Procedure
Sometimes, users need access beyond their usual permissions that come with their job function. This procedure outlines how we evaluate and approve privileged access requests.
Purpose
This procedure defines how privileged access requests are evaluated and approved beyond the access granted to a specific job function, ensuring access is granted based on business necessity and security best practices. This does not cover ordinary access granted to users via their job function as this is automatically granted based on their role.
Scope
Applies to all requests for privileged access to systems, applications, and data within Vaxa Analytics.
Roles & Responsibilities
Role
Responsibility
Chief Technology Officer (CTO)
Approves or denies privileged access requests. Ensures appropriate restrictions and timeouts are applied.
Information Security Group
Assesses security risks of access requests. Implements controls and logs all privileged access decisions.
Requester
Submits access requests with justification. Adheres to all privileged access controls and security requirements.
Procedure
1. Submission of Privileged Access Request
Requests must be submitted via the designated access request system at least 5 business days before access is required. The system is accessible through this link.
The request must include:
Justification for access (specific task or role requirement).
Duration for which access is needed.
Systems, applications, and data requiring access.
Proposed restrictions (e.g., time-based access, least privilege model).
2. Evaluation Criteria
The CTO, with input from the Information Security Group, assesses each request based on:
Business necessity.
Potential security risks.
Existing access controls and segregation of duties.
The principle of least privilege.
Alternative options to mitigate the need for privileged access.
Alignment with the broader security and policy framework.
3. Decision & Implementation
Approved requests:
Privileged access is granted with necessary restrictions and timeouts.
Default timeouts include automatic disablement after 12 months or 45 days of inactivity.
Privileged accounts are configured to prevent logging into unprivileged environments.
Access is logged and monitored.
Denied requests:
Requester is notified with justification.
Alternative solutions (if applicable) are provided.
4. Periodic Review
The Information Security Group conducts quarterly privileged access reviews.
Any inactive privileged accounts are automatically disabled after 45 days.
Annual revalidation is required for continued privileged access.
Exceptions
Exceptions must be submitted in writing and approved by the CTO with documented justification. All exceptions are subject to periodic review.
Compliance & Monitoring
The Information Security Group will track all privileged access requests and approvals.
Privileged access logs will be regularly reviewed for suspicious activity.
Non-compliance will be reported to senior management and may result in revoked access.
The Information Security Group (ISG) is responsible for overseeing and advising on the organisation’s information security strategy and practices in alignment with its business objectives.
Under constructionThis page is still under construction. Please check back later as we continue to work on it.
3.7.1 - Contact the ISG
Get in touch with the Information Security Group (ISG) for any questions or concerns about information security.
The ISG has a responsibility to oversee and advise on the organisation’s information security strategy and practices in alignment with its business objectives.
Refer to the ISG Terms of Reference to see how these members are selected and what their responsibilities are.
Current people fulfilling these roles are:
Curtis West
Todd Crowley
Nathan Archer
3.7.2 - ISG Terms of Reference
With responsibility to oversee and advise on the organisation’s information security strategy and practices in alignment with its business objectives, the ISG itself is subject to certain requirements on it’s conduct and membership. This document sets out those requirements.
Purpose
The ISG is responsible for overseeing and advising on the organisation’s information security strategy and practices in alignment with its business objectives.
Objectives
Provide strategic direction for information security initiatives.
Prioritise information security projects and resource allocation.
Ensure compliance with legal and regulatory requirements.
Facilitate communication between stakeholders.
Periodically review and assess the effectiveness of security measures.
Membership
Chief Operational Officer (Chair)
IT Director
Legal Counsel
Product Director
Data Director
Representative from HR
Representative from Finance
Meetings
Monthly general meetings
Quarterly strategic reviews
Annual evaluation and planning
Responsibilities
Develop an annual Information Security Strategy.
Review and approve information security policies and procedures.
Monitor security incidents and responses.
Approve budgets for security projects.
Standing Agenda
Monthly Activities
Opening Remarks: Brief recap of security status.
Monitoring & KPIs review
Incident Report Review: Discuss any security incidents and responses.
Risk Review: Summarise any new or updated risks the group monitors.
KPI & Metrics Review: Review report on KPIs and ISMS Metrics
Project Updates: Update on ongoing and upcoming security projects.
Compliance Review: Updates on legal and regulatory compliance.
Resource Allocation: Discuss needs and priorities.
Any Other Business: Open floor for other concerns.
Quarterly Activities
Strategic Review: Assess the status of key initiatives from the Information Security Strategy.
Risk Assessment: High-level overview of emerging risks and vulnerabilities.
Budget Review: Assess budget utilisation and future allocation.
External Audit Summary: Presentation of external audit findings, if any.
Annual Activities
Annual Evaluation: Evaluate the year’s accomplishments, failures, and areas for improvement.
Strategic Planning: Update the Information Security Strategy for the following year.
Membership Review: Consideration for adding or removing members.
3.8 - ISO27001
This serves as the central repository for all key information related to Vaxa’s compliance with the ISO27001 standard. It is designed to assist our staff and external auditors in navigating the key documentation, processes, and policies required to maintain ISO27001 accreditation.
Under constructionThis page is still under construction. Please check back later as we continue to work on it.
3.8.1 - What is ISO27001?
ISO27001 is an international standard that provides a framework for establishing, implementing, maintaining, and continually improving an information security management system (ISMS).
Under constructionThis page is still under construction. Please check back later as we continue to work on it.
3.8.2 - Regulatory Security Requirements
The Information Security Objectives are the high-level goals that the Information Security Management System (ISMS) is designed to achieve, and are reviewed annually.
Under constructionThis page is still under construction. Please check back later as we continue to work on it.
3.9 - Defence Industry Security Program (DISP)
This serves as the central repository for all key information related to Vaxa’s compliance with the Defence Industry Security Program (DISP) at Entry Level. It is designed to assist our staff and external auditors in navigating the key documentation, processes, and policies required to maintain DISP accreditation.
3.9.1 - Contact the DISP team
Get in touch with the DISP team for any questions or concerns in scope of the DISP program.
3.9.2 - What is DISP?
A brief introduction to the Defence Industry Security Program and its role in ensuring the security of Defence-related information and assets.
The Defence Industry Security Program (DISP) is an Australian Government membership program designed to help companies meet the necessary security requirements when working with the Department of Defence or handling sensitive Defence information. Its underpinned by the Defence Security Principles Framework - Principle 16, Control 16.1, Defence Industry Security.
It is essentially security vetting for Australian entities.
The purpose of DISP is to:
ensure industry has the right security in place for Defence tenders and contracts
provide industry with access to security advice and support services
help industry to understand and manage security risks
provide assurance to Defence and other government entities when working with DISP members.
DISP has several levels of accreditation, and we are currently focused on Entry Level compliance, which covers the foundational security requirements for working with Defence-related contracts and information.
DISP covers four core areas (“security domains”):
Security governance: Managing security risks and maintaining compliance with security standards.
Personnel security: Ensuring that staff with access to sensitive information are vetted and trustworthy.
Physical security: Protecting facilities and locations where defense information or assets are stored.
ICT and cyber security: Safeguarding Defence-related data and systems in the cyber realm.
Our commitment to DISP compliance helps us protect Defence information, meet government standards, and ensure trust with our Defence partners.
Why does DISP matter to me?
Regardless of your role at Vaxa, DISP compliance is essential because it affects how we all handle sensitive information and protect the security of our workplace–even if this is not Defence-related information. It’s forms part of our standard that we strive to achieve across our entire organisation, you included.
Here’s why it matters:
Protecting sensitive information: DISP requires that we handle Defence-related data with the utmost care. This means following strict guidelines when accessing, sharing, or storing information to prevent leaks or unauthorized access.
Maintaining trust: Our ability to work with Defence, Defence industry, and some Commonwealth contracts depends on meeting DISP requirements. By following these guidelines, we demonstrate that we can be trusted to handle their sensitive information securely.
Personal responsibility: Every employee plays a part in keeping Vaxa compliant. Whether it’s following the Acceptable Use Policy for IT systems, participating in security training, or reporting suspicious activity, your actions directly contribute to our overall security.
Job security and growth: Being compliant with DISP allows Vaxa to continue working with government clients and Defence, which helps the company grow and secure more opportunities. That stability benefits every employee by creating a safer, more secure workplace and ensuring the long-term success of our projects.
In short, DISP compliance means keeping our workplace secure, maintaining trust with our clients, and contributing to the success and growth of Vaxa. Every action you take to support security helps ensure we meet these standards.
3.9.3 - Our DISP Compliance Statement
This statement sets our approach to compliance, necessary to protect Defence-related information, maintain our DISP accreditation, and align with broader security frameworks like ISO27001 and Essential Eight.
Overview of Our Compliance Approach
Our compliance strategy is built on four key pillars:
Risk Management: Continuous identification, assessment, and mitigation of risks related to Defence information and operations.
Policy Implementation: Comprehensive and up-to-date policies governing information security, access control, incident response, and personnel security.
Training and Awareness: Regular training programs for staff to ensure they understand and adhere to DISP requirements and security best practices.
Monitoring and Auditing: Ongoing monitoring of compliance measures, supported by regular internal and external audits to identify and address any gaps.
We leverage industry best practices, a proactive risk management approach, and strict adherence to security protocols to protect Defence information and our interests.
Our Risk Management Policy drives our compliance efforts by focusing on:
Identifying Risks: We systematically assess risks associated with handling Defence-related information, supplier relationships, and internal processes.
Mitigating Risks: Our mitigation strategy incorporates a range of controls, both Vaxa and Defence-specified, such as access restrictions, cryptographic measures, and incident response protocols to address potential vulnerabilities.
Monitoring Risks: We continuously monitor potential risks through regular assessments, incident tracking, and analytics, coupled with our broader external audit program
By integrating risk management with DISP requirements, we ensure that threats are addressed proactively and compliance is maintained at all times.
Our compliance relies on a comprehensive set of policies, endorsed at the highest level and implemented in our day-to-day. These are designed to meet not only DISP Entry Level standards, but the requirements of Essential Eight (now) and ISO27001 (in future).
These include:
Policy
Description
Information Security Policy
Defines the overarching framework for protecting sensitive information.
Access Control Policy
Manages access to systems and information based on the principle of least privilege, supported by multi-factor authentication (MFA).
Incident Response Policy
Provides a structured approach for responding to security incidents, including breaches of Defence information.
Personnel Security Policy
Details security clearance and vetting processes for all personnel handling sensitive Defence information.
Each policy is regularly reviewed on a set cadence to stay aligned with changes in DISP requirements and the evolving threat landscape.
Every Vaxa employee should consider themselves playing a key role in ensuring compliance with DISP standards, whether they’re technically in scope or not. This includes you.
To support them, we have a robust training and awareness program that covers:
DISP Security Awareness Training: Mandatory for all staff, focusing on the requirements of DISP and defense-related information handling.
Role-Specific Training: Additional training for staff with elevated access to sensitive information or Defence/Commonwealth contracts.
Ongoing Awareness Initiatives: Regular updates on emerging threats and security best practices, with real-time security alerts.
By embedding security awareness in Vaxa’s culture, we ensure that every employee is equipped to maintain DISP compliance.
We take a proactive approach to monitoring and improving our compliance processes through:
Audit Logs and Evidence of Compliance: We maintain detailed records of access control, system changes, and incidents to provide evidence of compliance during audits.
Internal and External Audits: Regular audits are conducted to assess our compliance with DISP requirements, Essential Eight controls, and (eventually) ISO27001. This includes a review of policies, incident handling, and system vulnerabilities.
Continuous Improvement: Findings from audits and assessments are used to inform our strategy and make necessary adjustments to our security policies and procedures.
Our continuous improvement framework ensures that we not only meet current DISP Entry Level requirements but also evolve our compliance measures in line with changing Defence, industry, and regulatory needs.
How our DISP strategy integrates with our other compliance efforts
While our primary focus in this Handbook section is obviously our DISP compliance, Vaxa recognises the value and need to comply with other frameworks including ACSC’s Essential Eight and ISO27001.
To comply with these frameworks at once, Vaxa’s approach to each of those frameworks must recognise how these frameworks would interact.
Here is how we see those two frameworks interacting with DISP:
Essential Eight: Our implementation of the Essential Eight strategies helps protect against cybersecurity incidents, with particular emphasis on patch management, application control, and privileged access management.
ISO27001: Our Information Security Management System (ISMS) aligns closely with DISP requirements, ensuring that we meet global standards for information security.
This integrated approach ensures that we meet a high standard of security across all aspects of our operations, from Defence information handling, to client information handling, to how we engage 3rd party suppliers—-if we’re in business, we’re in the business of security.
What Vaxa needs from you
It is a requirement of all Vaxa staff to:
Review our key policies and training materials: Make sure you are familiar with the latest policies and training resources.
Participate in ongoing security awareness initiatives: Stay up-to-date with security alerts and participate in regular training sessions.
Report any security concerns or incidents immediately: Use the Incident Reporting Form (or contact the Security Officer directly) to report any suspected or actual security breaches.
For questions, concerns, or more detailed information about our compliance strategy,
please contact the DISP Team.
3.9.4 - DISP Security Policy & Plans
.
Purpose
This policy outlines Vaxa’s approach to maintaining compliance under the Defence Industry Security Program (DISP) and the requirements for safeguarding DISP-scoped information. It’s supplementary to the organanisation’s overarching Information Security Policy. This set of Security Policy and Plans are designed for Vaxa’s primary (and only) facility located in Brisbane, Australia.
Scope
The DISP Security Policy applies to all Vaxa personnel who handle DISP-scoped information or systems, including temporary workers and external contractors.
Acts as the primary point of contact for DISP-related matters and liaises with Defence on operational matters.
CTO
Ensures DISP requirements are integrated into the organisation’s technology strategy and architecture.
Chief Security Officer
The Chief Security Officer (CSO) must be a member of the organisation’s board of directors (or similar governing body), executive personnel, general partner, or senior management official with the ability to implement policy and direct resources. They must be able to obtain and maintain a minimum Baseline Security Clearance.
Todd Crowley is Vaxa’s CSO, and is responsible for oversight of, and responsibility for, security arrangements and championing a security culture in Vaxa.
The CSO is accountable for ensuring:
all obligations contained in the DISP principle and control policy documents for their level of membership are met;
an appropriate system of risk, oversight and management is maintained;
DISP reporting obligations are fulfilled;
any sensitive and classified materials entrusted to the Vaxa are safeguarded at all times;
Security Officer(s) are appointed to develop and implement the Entity’s security policies and plans, on the CSO’s behalf;
DISP Annual Security Report (ASR) is agreed by the executive (Board equivalent), and all recommendations are implemented within agreed timeframes;
any change in Foreign Ownership Control and Influence (FOCI) status of Vaxa is reported to Defence via the FOCI Declaration (AE250-1); and
any change in Vaxa’s circumstances that may impact their ability to maintain DISP membership (including changes in ownership and control) is reported to Defence.
Security Officer
The SO is responsible for the development and implementation of the security policies and plans and acts on behalf of the CSO. The SO must be an Australian citizen and be able to obtain and maintain a Personnel Security Clearance at the Baseline level or above, as appropriate with the level of DISP membership.
Curtis West as Vaxa’s SO is responsible for:
the development and application of security policies and plans within Vaxa;
*ensuring sensitive and classified materials entrusted to Vaxa are protected in line with the Defence Security Principles Framework (DSPF);
maintaining a Security Register (SR);
facilitating annual security awareness training of personnel:
reporting security incidents and fraud incidents, and contact reports, in accordance with DSPF, Control 77.1 – Security Incidents and Investigations;
actively monitoring and managing ongoing suitability of sponsored security cleared personnel including their security attitudes and behaviours;
notifying AGSVA when a clearance holder no longer requires their clearance or when they separate from the Vaxa; and
yearly assurance activities to support the CSO.
Policy
DISP has four key pillars:
Governance Security: Ensuring that the organisation has the appropriate governance arrangements in place to manage security risks.
Personnel Security: Ensuring that personnel are suitable to access DISP information.
Physical Security: Ensuring that physical security measures are in place to protect DISP information.
Information & Cyber Security: Ensuring that information security measures are in place to protect DISP information, in line with our broader Information Security Policy.
This policy document is structured to address each of these pillars in turn.
Governance Security
Security Policies and Plans
Vaxa maintains Security Policies and Plans (SPP) to guide personnel on their security responsibilities. The SO is responsible for developing and maintaining these policies.
All Vaxa employees shall review the SPP annually. New employees shall review it as part of their security briefing.
Vaxa personnel working at Defence establishments shall comply with all applicable local security instructions.
Security Register
The Security Register (SR) is maintained by the SO and shall capture all security-related matters relevant to Vaxa.
The SR is a living document and shall be updated regularly. It includes records on governance, physical security, personnel security, security education and training, information security, and security incidents.
Designated Security Assessed Positions Register
Vaxa’s Designated Security Assessed Positions (DSAP) register shall be maintained within the Security Register.
Foreign Ownership, Control or Influence (FOCI) Reporting
Vaxa shall report any potential or actual change in FOCI status.
The SO shall submit FOCI changes using the AE250-1 webform, available on the DISP website or DISP Portal, to DISP.submit@defence.gov.au.
Annual Security Report
The ASR is a declaration by the CSO, under the authority of the Directors, that Vaxa continues to meet the eligibility and suitability requirements of DISP.
The SO shall ensure the ASR is submitted to Defence annually. The ASR form is located on the DISP website or DISP Portal and shall be submitted to DISP.submit@defence.gov.au.
Copies of the ASR shall be retained in DISP SharePoint under the Annual Security Report document library.
Security Risk Assessments
Vaxa shall maintain Security Risk Assessments (SRA) to identify and manage risks. A Defence-specific SRA shall be maintained for any Defence contract Vaxa is engaged in.
Completed SRAs shall be retained in DISP SharePoint under the Security Risk Assessment document library.
Security Awareness Training
All Vaxa employees shall complete annual security awareness training. The SO is responsible for ensuring training completion and maintaining records.
Defence may require Vaxa personnel to complete additional security awareness training via Campus Anywhere.
Insider Threat Program
The SO shall ensure all Vaxa employees receive Insider Threat awareness training.
Contact Reporting
All security-significant contact with foreign representatives, extremist groups, criminal organisations, or politically motivated entities shall be reported.
Employees shall report any such contact immediately using Form XP168 - Report of Security Contact Concern, submitted to the Security Incident Centre at security.incidentcentre@defence.gov.au.
Vaxa personnel shall report all security incidents in accordance with DSPF Principle 77.
The SO shall submit security incidents via Form XP188 - Security Incident Report through the DSPF system. If DSPF access is unavailable, incidents shall be reported via email to security.incidentcentre@defence.gov.au.
Security Officer Training
The SO shall complete the Introduction to DISP training course.
Curtis West, as SO for Vaxa, completed this training on <date>. Renewal is due <date>.
DISP Portal Access
The DISP Portal provides access to security resources via the Defence Online Security Dashboard (DOSD).
The SO has DISP Portal access. Additional access requests shall be submitted using Form SCS 001 to dsvs.awareness@defence.gov.au.
Close of Business Security Checks
A close of business security check shall be conducted daily to secure classified materials and ensure physical security zones are locked.
The SO shall ensure all personnel are familiar with close of business procedures.
Random Security Checks
Defence may conduct random security checks on DISP members, reviewing security policies, personnel, and physical security measures.
The SO shall also conduct internal security checks to ensure classified materials are protected and personnel comply with security protocols.
All random security checks shall be recorded in the Security Register.
Emergency Situations
In an emergency, security-cleared personnel shall:
Secure classified materials in approved security containers, or
Retain personal custody of classified materials until relieved by the SO or appropriate custodian.
Emergency responders may require escorted access by security-cleared personnel.
Personnel Security
Personnel Screening Policy
Vaxa maintains a Personnel Screening Policy that complies with AS 4811:2022.
The SO shall record all granted security clearances in the Security Register.
All security-cleared Vaxa personnel shall understand and comply with their ongoing security responsibilities.
Further information, including change-of-circumstances reporting, is available on the AGSVA website.
Security Clearance After-Care
When an employee leaves Vaxa, Defence manages the security clearance after-care process.
The SO shall update the Security Register as required.
Identification (ID) and Access Passes
Access passes are required to enter Vaxa’s offices at Level 54, 111 Eagle Street.
Vaxa personnel shall:
Ensure safekeeping of their pass.
Wear their pass visibly at all times in the workplace.
Report lost passes immediately to the SO.
Ensure no unauthorised person uses or possesses their pass.
Challenge any unidentified individual not wearing a pass.
Return their pass to the SO upon expiration, end of requirement, or termination.
Surrender any Defence access pass during their debriefing.
Electronic access cards are considered security keys and shall be recorded in the Security Register.
The SO shall conduct an annual audit to account for all Vaxa access cards.
Personnel visiting Defence sites shall wear their Defence Visitor or Defence Access pass visibly at all times.
International Travel
Vaxa personnel engaged under a Defence contract shall:
Notify the SO of travel plans using Form AB 644, following the prescribed process.
Be aware of security risks at their destination.
Understand additional risks if they hold Sensitive Compartmented Information (SCI) access.
Protect official information if carried or accessed during travel.
Report suspicious contacts as per Section 6.9.3.
Ensure official visits to allied facilities comply with bilateral security agreements.
Maintain security awareness as per DSPF requirements.
Vaxa personnel engaged under a Defence contract shall not make false employment declarations. If required, they shall list their status as “contractor”.
Pre-Travel Briefing
Vaxa personnel travelling overseas shall follow the overseas travel briefing process to ensure security awareness and compliance.
Stage
Responsible Party
Description
1
Person Travelling
Complete Form AB644 – Overseas Travel Briefing and Debriefing for personal or official travel. Submit the form to the SO as soon as travel is planned.
2
Security Officer
Conduct an overseas travel briefing with the traveller. Complete the pre-travel Security Officer section of Form AB644. Confirm that the traveller has completed any required compartment briefings.
3
Person Travelling
Obtain travel advice from the DFAT Smartraveller website for all countries being visited or transited through.
4
Security Officer
Record travel details in the Security Register. Retain Form AB644 (private travel) or Form AA062 (official travel). Conduct a detailed security briefing if: 1) The traveller has a high-level security clearance. 2) DFAT has issued a Consular Travel Advisory Notice or Bulletin for any country on the itinerary. 3) The traveller is carrying a Defence or DISP-issued laptop or Portable Electronic Device (PED) that is not protected by a Laissez-Passer.
Post-Travel Debriefing
Upon returning from overseas travel, Vaxa personnel shall follow the debriefing process to ensure security compliance and report any security concerns.
Stage
Responsible Party
Description
1
Person Travelling
Complete the debriefing section of Form AB644 (private or official) with the SO.
2
Security Officer
Conduct an initial debriefing using the debriefing section of Form AB644.
Retain copies of Form AB644 and XP188 (if applicable) in the Security Register.
Visitor Security Protocols
Visitors to Vaxa, beyond the public areas of in the office (Zone 1, i.e. the public lounge and kitchen), shall not be granted access to classified material unless their identity, security clearance, and “Need to Know” have been confirmed. They must also sign in at reception upon arrival and be escorted by a security-cleared Vaxa employee at all times if entering secure areas.
The escorting officer is responsible for ensuring the visitor leaves the facility upon conclusion of their visit.
Physical Security
Physical Certification of Zones
Vaxa’s premises include a Zone 1 foyer on the ground floor and the reception/shared areas on Level 54. The main office area with our workstations is classified as a Zone 2 restricted employee access area.
Security Containers
All official and classified material shall be stored in approved security containers. Access to security containers shall be restricted to approved custodians.
The SO shall maintain records of all security containers, including their locations and custodians, in the Security Register (SR).
Keys and Combinations
The SO shall maintain a register of all facility keys, security containers, combinations, and custodians. Each security container must have an appointed custodian responsible for its contents and access control.
Security keys shall only be issued to authorised and security-cleared personnel.
Keys to classified material containers shall be treated with the same level of classification as the material stored inside.
Key Management
The SO shall maintain a key register. Duplicate keys shall not be made unless explicitly authorised by the SO and recorded in the register.
The SO shall conduct a facility key audit at least every six months. Loss or compromise of a security key must be reported in accordance with DSPF Principle 77 - Security Incidents and Investigations.
Security Compromise
If a security container is compromised or suspected to be compromised, the SO must be informed immediately.
Information and Cyber Security
ICT Networks Standard Operating Procedures
Vaxa, as a DISP member with Information and Cyber Security Entry Level membership, is required to meet at least one of the following ICT network accreditation standards:
ISO-27001/2:2013
NIST SP 800-171 Rev.1 (US ITAR requirement)
DEFSTAN 05-138
ASD Essential 8 Maturity Level 2
Unclassified/DLM network compliance in accordance with the ISM/DSPF
Vaxa has completed a self-assessment and meets the ASD Essential 8 Maturity Level 2 requirements.
The Security Officer is responsible for maintaining system-specific Standard Operating Procedures (SOPs) applicable to Vaxa’s ICT systems. These are available in the Handbook under the Security heading. Employees are responsible for adhering to all relevant policies, plans, and procedures for the systems they use. Specifically, they must ensure that information provided in system or network access requests is accurate, secure unattended equipment appropriately, follow a clear desk and clear screen policy, protect their authentication credentials, and report any security incidents to the Security Officer as soon as they become aware of them.
System Integrity
The IT Security Manager (ITSM) is responsible for maintaining a ‘known good’ baseline of Vaxa’s system and network. This baseline aids in detecting and recovering from any incident that affects system integrity.
The ITSM is also responsible for implementing logical security controls in line with the DSPF, ISM, and ASD Strategies to Mitigate Cyber Security Incidents, ensuring that Vaxa’s systems remain protected against malicious code.
System Monitoring
Vaxa’s ICT systems shall be monitored in accordance with its established Standard Operating Procedures (SOPs).
System Availability
The ITSM is responsible for implementing availability controls to mitigate identified risks, in line with DSPF Principle 10.1 – Classification and Protection of Official Information. Backup and restore processes shall be conducted as per Standard Operating Procedures, see our Backup Policy.
Official Information
Defence official information is classified according to the Australian Government Security Classification System (AGSCS) and must be protected to prevent unauthorised access or disclosure. Access is strictly limited to those with an appropriate security clearance and a need-to-know.
Vaxa personnel handling classified material must ensure that it is not subject to deliberate or casual inspection by unauthorised individuals. When not in use or under direct supervision, all classified material must be stored in an approved security container.
Protective markings assigned to official information indicate the level of protection required during use, storage, transmission, transfer, and disposal. The correct application of protective markings is detailed in DSPF Principle 10 – Classification and Protection of Classified Information.
Protective Security Policy Framework (PSPF) provides the appropriate controls for the Australian Government to protect its people, information and assets at home and overseas. The PSPF can be found at: https://www.protectivesecurity.gov.au/Pages/default.aspx
Defence Security Principles Framework: Defence Security Principles Framework (DSPF) is available from the SO and provides information on security requirements which are specific to Defence and DISP members. The DSPF can be found on the DS&VS website and DISP Portal.
Australian Government Information Security Manual: The Australian Government Information Security Manual (ISM) is the standard which governs the security of government Information Communications Technology (ICT) systems and complements the PSPF. The ISM can be found at https://www.asd.gov.au/infosec/ism
3.9.5 -
Insider Threat Awareness Statement
Understanding the Trusted Insider
A trusted insider is any current or former employee or contractor who has legitimate access to either Vaxa or our client’s facilities and information. With this access, a trusted insider could pose a security risk by intentionally or inadvertently compromising operations.
Some insiders deliberately seek to harm Defence by leaking classified information, sabotaging assets, or granting unauthorised access. Others may pose a risk through careless security practices, failing to follow procedures and unintentionally exposing sensitive information.
External threat groups may also target trusted insiders, attempting to gain access to valuable information, weapons, or assets. Insiders can be manipulated, coerced, or influenced by foreign or domestic threats—including media organisations seeking unauthorised disclosures. Only authorised personnel may engage with the media.
Types of Trusted Insider Activity
A trusted insider threat can take many forms, including:
Unauthorised disclosure of sensitive or classified information
Corruption of processes that allow improper decisions or actions
Facilitating third-party access to assets or information
Physical sabotage of equipment, facilities, or operations
Digital or ICT sabotage that disrupts systems
Being intoxicated or affected by substances at work, which could impair judgement and security compliance
Our Responsibility
The best defence against insider threats is awareness and vigilance. Every industry professional has a responsibility to uphold security standards and report concerning behaviours.
Indicators of Concern
Signs that a colleague may pose a security risk include:
Appearing intoxicated or under the influence of substances at work
Unusual nervousness, anxiety, or erratic behaviour
A noticeable decline in work performance
Persistent interpersonal conflicts with colleagues
Expressions of resentment, dissatisfaction, or bitterness
Financial distress, such as creditors calling at work
Unexplained wealth or sudden changes in lifestyle
Unusual or excessive interest in sensitive or classified information
If you notice any of these signs, take a moment to check in with the person. A simple conversation could help them and prevent a serious security issue. If the behaviour raises a legitimate concern, report it immediately to our Security Officer. Ignoring security risks could endanger your colleagues, property, or even national security.
This is not the time to think, “She’ll be right, mate”, or “It’s un-Australian to dob in a mate.” Security is a shared responsibility, and reporting concerns is the right thing to do.
Reporting a Security Concern
If you believe someone may be a trusted insider risk, take action by following these steps:
Speak with your supervisor or manager about your concerns.
Contact your Security Officer, Curtis West, for guidance on reporting requirements.
Complete Form XP168 – Report of Contact of Security Concern.
Further Information
For any security-related questions or concerns, contact:
Under constructionThis page is still under construction. Please check back later as we continue to work on it.
4.1 - Code of Conduct
To provide the best possible service to our clients and the public, and to foster a positive work environment, Vaxa expects all employees to follow these rules of conduct. These guidelines are designed to protect the interests and safety of our clients, the public, your colleagues, and the company.
General Expectations
Always treat fellow employees, clients, and suppliers with the utmost respect and courtesy. Interactions should be friendly, professional, and focused on excellent service.
Unacceptable Behaviors
Engaging in any of the following actions may result in disciplinary measures, including reprimand, warning, suspension, or dismissal.
1. Disobeying the Law and Instructions
Examples of things you should consider to remain compliant with the law and Vaxa’s policies include:
Compliance with Professional Codes: Follow all Professional Codes of Conduct or Ethics relevant to your work.
Legal compliance: Adhere to all laws related to Vaxa’s operations.
Company policies: Comply with all Vaxa policies and procedures in this handbook.
Instructions from management: Carry out any reasonable and lawful instructions from your manager.
Health and safety: Follow health and safety regulations and do not encourage others to violate them.
Prohibited items: Do not possess firearms, weapons, illegal drugs, or drug paraphernalia on company property.
2. Respect for Others
Professional conduct: Treat clients and colleagues with respect. Avoid using threatening, obscene, profane, or abusive language, gestures, or behaviour.
Violence: Do not engage in physical or verbal violence.
Disorderly conduct: Refrain from horseplay or disruptive behaviour.
Discrimination: Do not unlawfully discriminate against anyone.
Harassment and bullying: Avoid harassing or bullying clients or employees.
Victimisation: Do not victimise anyone who reports a breach of this code or any other policy.
Dress code: Wear uniforms if provided, or dress according to Vaxa’s standards if uniforms are not supplied.
3. Integrity
Conflict of interest: Declare any real or perceived conflicts of interest promptly; see below section on Conflict of Interest.
Bribery: Report any attempted bribery immediately.
Confidentiality: Do not disclose any confidential or official information without authorisation.
Reporting of any breaches or concerns in any shape are encouraged. Refer to our Responsible Disclosure Policy for more information.
4. Diligence
Smoking policy: Do not smoke in areas where it is prohibited.
Punctuality: Be at your workplace and ready to work at your scheduled start time.
Timekeeping: Personally clock in and out at the beginning and end of your shift.
Work ethic: Focus on your duties and avoid wasting time during working hours.
Substance use: Do not come to work under the influence of alcohol or illegal drugs. Do not bring alcohol or illegal substances onto Vaxa property.
Internet and technology use: Do not access or share pornography, hate speech, or illegal content using company equipment or personal devices used for work. See the Acceptable Use of Technology Policy for more information.
Online conduct: Avoid posting offensive, defamatory, threatening, discriminatory, bullying, inappropriate, false, sexist, derogatory, or malicious comments or materials online or on social media.
Communication: Inform your manager promptly upon completing tasks or if there are any delays.
Attitude: Maintain a cooperative and positive attitude.
Personal devices: Do not use personal electronic devices like smartphones, music headsets, wearables, or handheld games during work hours unless authorised.
5. Economy and Efficiency
Care for company property: Take proper care of Vaxa equipment and tools. Do not neglect or abuse them.
Theft and damage: Do not wilfully damage, destroy, or steal property belonging to colleagues or Vaxa.
Honesty: Provide truthful information when requesting leave or other accommodations.
Attendance: Avoid unexcused absences from work.
Use of resources: Do not use Vaxa equipment, property, or supplies for personal purposes without prior authorisation.
Conflict of Interest
Avoid any interests, influences, or relationships that might conflict—or appear to conflict—with the best interests of Vaxa or our clients. If your loyalty could be divided, disclose the situation promptly to your manager and remove yourself from any related decision-making processes.
This policy outlines the guidelines and procedures for managing conflicts of interest to ensure that Vaxa employees act in the best interests of the company and our clients.
Purpose
The purpose of this Conflict of Interest Policy is to ensure that all employees of Vaxa act in the best interests of both the company and our clients. This policy aims to prevent situations where personal interests could interfere with professional duties and responsibilities, thereby providing assurance to our clients that we diligently and transparently manage potential conflicts on their behalf.
Scope
This policy applies to all employees, contractors, consultants, officers, and directors of Vaxa, covering all interactions with clients, suppliers, competitors, and other stakeholders.
Roles & Responsibilities
Role
Responsibility
Employees
Disclose any actual or potential conflicts of interest promptly. Avoid participating in decisions related to the conflict. Ensure client interests are not compromised.
Managers
Receive conflict disclosures, provide guidance, and implement measures to mitigate conflicts. Communicate with clients as necessary to assure them that conflicts are managed appropriately.
HR
Maintain records of disclosures, monitor compliance, provide training on conflict of interest matters, and support transparency with clients.
Senior Management
Ensure systems are in place to manage conflicts effectively and provide clients with assurance regarding our conflict management practices.
Policy Statements, Standard, or Procedure
All employees must avoid any interests, activities, or relationships that conflict—or appear to conflict—with the best interests of Vaxa and its clients. The following guidelines must be followed to ensure our clients can trust in our integrity and the impartiality of our services:
Disclosure of conflicts:
Employees must promptly inform their manager or the HR Department of any actual or potential conflicts of interest, especially those that could affect client interests.
Disclosures should be made in writing, detailing the nature of the conflict and any potential impact on clients.
Avoidance of participation:
Employees with a conflict must remove themselves from any decision-making processes related to the conflict, particularly those affecting clients.
They may provide information or expertise if it benefits Vaxa and the client but should not influence decisions.
Client interests:
Employees must prioritize the interests of clients above themselves or Vaxa in all business dealings.
Any conflicts that could adversely affect a client must be managed promptly and effectively to prevent negative impacts.
Confidentiality of client information must be maintained at all times.
Examples of potential conflicts:
Financial interests:
Owning a significant financial stake in a company that does business with Vaxa or its clients.
Engaging in business transactions with Vaxa or clients for personal gain.
Personal relationships:
Supervising or influencing employment decisions about a close friend or family member involved in client-related work.
Being in a position to affect client projects involving someone with whom you have a close personal relationship.
External affiliations:
Holding a position (e.g., advisor, consultant, employee) with a competitor, customer, or supplier that could affect client interests.
Accepting secondary employment that affects your ability to serve clients effectively.
Gifts and benefits:
Accepting gifts, entertainment, or other benefits of more than nominal value from any competitor, customer, supplier, or client.
Offering or receiving bribes or kickbacks that could influence client-related decisions.
Acting upon confidential information:
Using confidential client information for personal gain or to benefit others.
Disclosing confidential client information to unauthorized parties.
Guidelines for Gifts and Entertainment:
Gifts of nominal value (e.g., promotional items, modest meals) may be accepted if they do not influence, or could be perceived to reasonably influence, business decisions or compromise client interests.
Any gift or benefit exceeding a nominal value must be reported to the HR Department.
Cash gifts of any amount are strictly prohibited.
Conflict resolution:
Upon disclosure, management will assess the situation and determine appropriate actions to protect client interests.
Possible actions include restructuring job duties, reassigning projects, or other measures to eliminate the conflict. Employees wil not be penalized for disclosing conflicts of interest appropriately.
Clients will be informed as necessary to maintain transparency and trust.
Client communication:
When appropriate, clients will be informed of any conflicts of interest that could affect them and the steps taken to manage these conflicts.
Vaxa commits to maintaining open communication with clients regarding our conflict management practices.
Exceptions
Any exceptions to this policy must be approved in writing by the Managing Director. Requests for exceptions should include a full explanation of the circumstances, justification, and an assessment of potential impacts on clients.
Compliance & Monitoring
Monitoring:
The HR Department should maintain a register of all disclosed conflicts of interest, including those related to client engagements.
Regular reviews shall be conducted to ensure compliance with this policy and verify that client interests are protected.
Non-Compliance:
Violations of this policy may result in disciplinary action, up to and including termination of employment.
Legal action may be taken if the conflict results in unlawful activities or breaches of client contracts.
Reporting Violations:
Employees are encouraged to report any suspected violations of this policy, especially those that could affect clients.
Reports can be made confidentially to the Compliance Officer or through the whistleblower disclosure process detailed here.
Client audits:
Vaxa may allow clients to audit our conflict of interest management processes as part of contractual agreements or regulatory requirements.
Audit findings will be addressed promptly to improve our conflict management practices.
A commitment to prevent modern slavery within our operations and supply chain.
Purpose
This policy outlines Vaxa’s commitment to ensuring, to the best of our ability, that there is no modern slavery in any part of our business operations or supply chain. We are dedicated to acting ethically and with integrity in all business dealings and relationships, in compliance with the Modern Slavery Act 2018 (Cth).
Scope
This policy applies to all employees, contractors, suppliers, service providers, and any other parties working on behalf of Vaxa.
Roles & Responsibilities
Role
Responsibility
Management
Implement anti-slavery measures and ensure legislative compliance. Include anti-slavery clauses in contracts and assess supplier compliance.
Employees
Report any concerns or suspicions regarding modern slavery practices.
Policy Statement
We are committed to:
Prohibiting Modern Slavery: Including specific prohibitions against the use of forced, compulsory, or trafficked labour, or anyone held in slavery or servitude, in all our contracts.
Ethical Expectations: Expecting our service providers, suppliers, and contractors to share our commitment to act lawfully and ethically, ensuring modern slavery does not occur within their organizations or supply chains.
Due Diligence: Conducting due diligence on suppliers to assess their compliance with anti-slavery measures.
Training: Providing training to employees on modern slavery risks and indicators.
Reporting Mechanisms: Encouraging the reporting of any concerns related to modern slavery.
Under the Modern Slavery Act 2018 (Cth) ‘Act’, we are not required to publish a Modern Slavery Statement as we have an annual consolidated revenue of less than $100 million. However, we are committed to ensuring that modern slavery does not occur within our operations or supply chain.
Definitions
The term ‘modern slavery’ describes situations where coercion, threats or deception are used to exploit victims and undermine their freedom. Coercion, threats and deception can be explicit or implicit.
The Act defines modern slavery as including eight types of serious exploitation;
trafficking in persons, slavery, servitude, forced labour, forced marriage, debt bondage, the worst forms of child
labour and deceptive recruiting for labour or services.
The worst forms of child labour means extreme forms of child labour that involve the serious exploitation of
children, including through enslavement or exposure to dangerous work. The worst forms of child labour does
not mean all child work.
Under Australian law, modern slavery is defined in the Act. In the event of any inconsistency between this policy and the Act, the Act will prevail.
Exceptions
No exceptions to this policy are permitted.
Compliance & Monitoring
We will ensure compliance by:
Regular Audits: Conducting regular audits of our operations and supply chain.
Supplier Assessments: Performing supplier assessments and due diligence processes.
Policy Review: Reviewing and updating the policy annually.
Reporting: Monitoring reports of any concerns related to modern slavery.
A commitment to environmental excellence and preservation of cultural heritage, including active Indigenous participation.
Purpose
This policy outlines Vaxa’s commitment to clearly communicate environmental and cultural heritage expectations, meet legal requirements, and progress beyond compliance towards innovation and excellence. It aims to drive continual improvement in managing matters affecting the environment and cultural heritage.
Scope
This policy applies to Vaxa, its officers, employees, contractors (where applicable), and any other personnel notified that this policy applies to them.
Roles & Responsibilities
Role
Responsibility
Management
Implement and uphold the policy, allocate resources, and set objectives and targets.
Employees
Adhere to policies, understand and manage environmental and cultural heritage risks.
Contractors
Comply with Vaxa’s environmental and cultural heritage policies and procedures.
Policy Statement
Vaxa is committed to:
Developing policies and systems: Establishing, maintaining, and communicating policies, processes, and systems to drive continual improvement in environmental and cultural heritage management.
Setting objectives and allocating resources: Setting challenging objectives and targets, and allocating resources to achieve our organisational goals related to the environment and cultural heritage.
Empowering employees: Sustaining a high level of performance by empowering employees to take ownership of environmental and cultural heritage outcomes.
Partnering with stakeholders: Collaborating with regulators, traditional owners, Indigenous communities, and other stakeholders as appropriate.
Community engagement: Responding appropriately to community expectations on environmental and heritage matters.
Environmental protection: Protecting the environment by prioritizing pollution prevention, biodiversity preservation, and sustainable natural resource management.
Cultural heritage respect: Respecting and protecting Indigenous and non-Indigenous heritage, including active participation and consultation with Indigenous communities.
Sustainable future: Building a sustainable future through safe, efficient, and sustainable energy solutions.
Vaxa personnel should:
Adhere to policies: Follow all relevant policies, processes, and systems for environmental and cultural heritage management.
Risk management: Understand and manage environmental and cultural heritage risks during all phases of their work.
Lead by example: Demonstrate commitment through actions and dedication to environmental and cultural heritage performance.
Take action: Address any acts or situations that may result in harm to the environment or cultural heritage.
Collaborate and communicate: Engage collaboratively to effectively communicate and improve Vaxa’s environmental and cultural heritage performance.
Support indigenous participation: Encourage and facilitate Indigenous participation in projects and decision-making processes.
Exceptions
Any exceptions to this policy must be approved by senior management and properly documented.
Compliance & Monitoring
Compliance with this policy will be ensured by:
Regular audits: Conducting regular audits and assessments of environmental and cultural heritage practices.
Reporting: Recording and reporting any breaches in accordance with applicable policies and procedures.
Training: Providing training to employees and contractors on environmental and cultural heritage responsibilities.
Performance reviews: Reviewing environmental and cultural heritage performance against set objectives and targets.
Legal compliance: Ensuring all activities comply with relevant legislation, regulations, codes of practice, and guidelines.
Environmental Protection and Biodiversity Conservation Act 1999 (Cth)
Aboriginal and Torres Strait Islander Heritage Protection Act 1984 (Cth)
Native Title Act 1993 (Cth)
4.5 - Offboarding of a Contractor Procedure
This sets out the steps to offboard a contractor from Vaxa.
Purpose
The purpose of this procedure is to outline the steps to be followed when offboarding a contractor from Vaxa’s systems and applications. It ensures that the offboarding process is conducted securely, efficiently, and in compliance with Vaxa’s policies and legal requirements.
Scope
This procedure applies to all contractors engaged by Vaxa, including temporary staff, consultants, and third-party vendors. It covers the steps to be taken by the IT team and the Onboarding Lead (or designated manager) to remove access to Vaxa’s systems and applications when a contractor’s engagement ends.
Roles & Responsibilities
Role
Responsibility
Contractor
Cooperate with the offboarding process and return any Vaxa-owned assets.
HR or Legal
Inform the IT team and Onboarding Lead of the contractor’s end date and provide any necessary documentation.
Onboarding Lead
Initiate the offboarding process and ensure all steps are completed.
IT
Disable access to M365, revoke session tokens, and remove access from other systems.
Procedure
Important: Offboarding must be initiated as soon as the contractor’s engagement ends, or as directed by HR or Legal. The Onboarding Lead (or designated manager) is responsible for initiating this process and ensuring all offboarding steps are completed, but will be supported by the IT team.
1. Initiation of Offboarding Process
Trigger: Offboarding should begin immediately once the contractor’s term is concluded, or upon receipt of a termination request from HR or Legal.
Responsibility: HR or Legal to inform the IT team and Onboarding Lead of the end date.
Documentation: Capture the final date of access and reason for offboarding in the contractor’s personnel record.
2. Disable and Remove Access from Microsoft Entra / M365
Action: Disable the contractor’s M365 account as soon as possible (preferably within 24 hours of termination notice).
Log in to the Microsoft 365 Admin Center using an admin account (admin.microsoft.com).
Navigate to Users > Active Users.
Locate the contractor’s account and select Block sign-in. This will prevent any further access to M365 services.
Remove from Groups:
Open the user’s profile in the Admin portal.
Under Groups, select Manage groups.
Remove the contractor from OS_x_Contractors and any other groups granting access to resources.
Licence Removal:
While still in the user’s profile, navigate to Licences and Apps.
Unassign all Microsoft 365 licences, including Business Basic, Business Premium, or any other assigned licence.
Navigate to Licenses and reduce the number of purchases licenses to reduce costs.
3. Revoke Session Tokens and Invalidate Access
Action:
Visit entra.microsoft.com and log in with an admin account.
In the Entra/Azure AD portal, under the user’s profile, select Authentication methods and ensure no active sessions remain.
Use the “Revoke Sessions” option to invalidate all existing refresh tokens, blocking any chance of re-entry.
Remove the contractor’s seat and revoke any sessions.
Productive (Project Management Tool):
The contractor’s account in Productive is tied to their M365 identity.
With M365 access removed, they will no longer be able to log in.
Confirm that no direct, non-SSO logins exist.
Reassign any of the contractor’s tasks, projects, or responsibilities to internal staff. This step is usually performed by the Project Manager or Onboarding Lead
Remove the license from the contractor’s account to reduce costs, if required.
Client Sites and Third-Party Services:
Remove the contractor from any client SharePoint sites, Teams channels, or external portals.
Revoke permissions from BitWarden, production IT environments (e.g. Google Cloud, AWS), scheduling software (e.g. Cal.com), LMS platforms, or any other services the contractor was granted access to.
Ensure no residual accounts or API keys tied to the contractor’s identity remain active.
5. Data Retrieval and Handover
Mailbox and Data:
If required, preserve the contractor’s mailbox content by placing it on eDiscovery hold (if applicable) or exporting mailbox data for legal and compliance purposes.
Transfer ownership of any SharePoint documents, Teams files, or OneDrive data to a designated internal staff member. This is usually best done by converting to a Shared Mailbox and assigning access to the relevant person.
Productive Project Handover:
Verify that all time entries and expense records are finalised.
Ensure that any non-completed tasks are reassigned to another user.
6. Hardware and Physical Asset Recovery
Action:
If the contractor was issued any Vaxa-owned devices (e.g. laptops, phones, security tokens), arrange for their immediate return.
Perform a factory reset or secure wipe of returned hardware to remove any residual data.
7. Notification and Confirmation
Communications:
HR or Legal to confirm with IT once all steps have been completed.
Notify the Onboarding Lead that the contractor’s offboarding is finalised.
Record Keeping:
Document the completion of offboarding steps in the contractor’s personnel file.
Retain any necessary access logs or audit reports in line with compliance requirements.
The contractor may be notified with an email to their personal email, similar to the following:
Subject: Vaxa Offboarding Notification
Dear [Contractor Name],
This email is to confirm that your access to Vaxa’s systems and applications has been disabled in line with the conclusion of your engagement. If you have any questions or require further information, please contact [Onboarding Lead’s Name] at [Onboarding Lead’s Email Address].
Thank you for cooperation.
Best regards,
[Onboarding Lead’s Name]
Compliance and Monitoring
The Onboarding Lead or IT Manager should periodically review the offboarding process to ensure all steps are followed consistently. Identify any gaps or risks and update this procedure as needed.
Exceptions
If a contractor requires partial offboarding (e.g. retaining access to certain systems for a defined period), ensure it is documented by the Onboarding Lead. Any deviation from this process must be approved by HR or Legal and recorded for audit purposes.
4.6 - Onboarding of a Contractor Procedure
This sets out the steps to onboard a contractor at Vaxa, including the documentation required and the process for setting up access to systems and facilities.
Purpose
Contractors may be engaged by Vaxa to provide services that are not part of the core business. This procedure sets out the steps to onboard a contractor at Vaxa, including the documentation required and the process for setting up access to systems and facilities. This is important to ensure we’re consistently implementing requirements/controls placed upon contractors e.g. under our Security Policy.
Scope
The scope of this procedure is limited to contractors engaged by Vaxa, usually on a day-rate or similar arrangement. It doesn’t include employees or vendors providing a product. It also doesn’t include the accounting or payment process for contractors e.g. setup in Productive/Xero etc.
Roles & Responsibilities
Role
Responsibility
Contractor
Provide the required documentation to complete the onboarding process, and adopt the required controls placed upon them by Vaxa
Onboarding Lead
Ensure the contractor provides all required information and provide this information to IT for setup.
IT
Set up the contractor in the required systems and provide access to the required facilities.
Legal
Issue the contract to the contractor and ensure it is signed and returned in accordance with the organisational requirements, and requirements provided by the Onboarding Lead
Procedure
Contractor Engagement
A suitable contractor must be found; the process for finding and engaging a contractor is outside the scope of this procedure. However, in selecting a suitable contractor, one must consider:
The contractor’s experience and qualifications
The contractor’s availability
The contractor’s reputation
The contractor’s cost
The contractor’s ability to meet the requirements of the role
Consider whether an NDA is required prior to sharing any sensitive information with the contractor regarding the job.
You should get verbal approval from the contractor on these matters before proceeding to the next step.
Screening
Under our Personnel Security Policy, we are implementing requirements for screening of contractors. Generally, most contractors we engage are classified as Level 1, and so have limited screening requirements.
At the time of writing this procedure, we haven’t implemented checks for Level 2 and above contractors. We endeavour to make this change soon.
Document Exchange
Contract
The first step here is to sign contracts. To do so, we require the following information:
Contractor details
If a sole trader:
Full name
Phone number
Email
If a company:
Company name
Signatory and witness details for the contract
Name
Position
Email
If no witness is available, then we require a mobile phone number of the signatory
Contract specifics
Proposed job title for use in Vaxa systems
Fees, including specification on structure e.g. fixed fee, daily/hourly rate, and GST inclusive/exclusive
Scope of Works
Start and end date
Any required insurances, otherwise standard insurances will be required
Optionally, a custom restraint period otherwise 3 months will be applied
Optionally, place of work otherwise we’ll assume their office/as directed by Vaxa
Optionally, key personnel / designated personnel
Optionally, headshot photo for use in Vaxa systems
Internal signatory/witness details
In line with Vaxa policy, signatories must be a Director; specify the Director who will sign the contract
Any client SharePoint sites the contractor will be working on
Any project budgets the client will need access to in Productive (usually to track time/expenses against)
Who the contract will report to i.e. who is the Manager
Provide this information the Legal team, who will issue the contract. The contract shall be sent to Vaxa’s internal signatory/witness first for vetting, and only once signed will it be sent to the contractor for signing.
To doIs there a structured form we could create for this information, to make it easier for all the information to be provided at once?
Remember, signed contracts are automatically filed away into the Contract Register via the Vaxa Link integration.
Insurances
The contractor must provide evidences of the required insurances.
If this was customised in the contract, then defer to the contract. Otherwise, the standard insurances required are:
Public liability insurance @ $10m
Professional indemnity insurance @ $2m
Workers compensation for the contractor’s employees (if applicable)
Vaxa requires copies of these insurances to be provided before the contractor can commence work.
To doWhere should we store copies of these insurances?
IT Setup
IT setup cannot commence until contracts are signed, per our Security Policy.
Once the contract is signed, Legal shall inform the IT team will be notified to set up the contractor in the required systems. The IT team will reference the contract and onboarding information to set up the contractor in the required systems.
Entra / M365 accounts
The first step is to create a new user in M365/Entra. This will take the format of:
Name: as defined in contract/onboarding information
Position: as specified in contract
Phone number: as specified in contract
Email: first.last@vaxagroup.com
License: M365 Business Basic
This provides basic access to email, Teams, SharePoint, and online Office apps (but not desktop apps).
This is sufficient for most contractors, but if they require more access, then the IT team will need to be informed.
By default, we won’t issue access to any Client Sites, so if the contractor requires access to a Client Site, then the IT team will need to be informed.
We first create the account within the Admin portal:
In the left-hand menu, click on Users , then All Users, and click on the newly created contractor user
Click on Authentication methods in the left-hand menu, then Add authentication method
In the pane that appears, select the Temporary access pass method and configure it as follows:
TAPs are limited to up to 24 hours. You should make it as short as possible, but long enough for the contractor to receive the email and set up their account.
You can delay the start time if the contract isn’t due to start for a while but make sure you communicate this to the contractor.
One-time use is OK, but generally not required; usually we leave it set to No.
Click Add to finalise the TAP creation.
Save the TAP code into a Bitwarden Send and copy the link.
We then need to inform the contractor of their new account and how to set it up. To do so:
Fetch the contractor’s personal email address (not the Vaxa one) and draft a new email to them using the below template.
Send the following email to the contractor, and CC the Onboarding Lead and IT team.
Subject: Setting up your Vaxa account
Hi [Contractor Name], welcome aboard.
Your Vaxa account has been setup and just requires a few final setup steps from you, stepped out in these instructions. Please note this is a time-sensitive process so please complete it as soon as possible.
Your Temporary Access Pass is available here: [Bitwarden Send Link]
Once you’ve setup your account, you can access Productive (our time tracking and project management tool) via Cloudflare Access here: vaxagroup.cloudflareaccess.com. Simply sign in with your new Vaxa account, then click the tile called Productive.
We’ve also provided you access to:
[List any other systems the contractor has access to e.g. client site]
If you have any issues, please contact reach out to me directly.
Warm regards,
The contractor will receive an email with the onboarding instructions, temporary access pass, and IT’s contact details. The temporary access pass cannot be issued for more than 24 hours.
IT will assign the contractor to the OS_x_Contractors group in M365. This provides basic levels of access to SSO-linked systems, and some Sharepoint sites etc.
Productive
By being assigned to the OS_x_Contractors group, the contractor will automatically be given access to Productive. This is our project management tool, and the contractor will be able to log their time and expenses here. IT will provide instructions on how to use Productive.
Accounts in Productive are only issued upon first sign-in, so the contractor must sign in, then IT will be able to assign them to the correct projects. These instructions will be provided in the onboarding email.
Other systems
The contractor will be advised of our Cloudflare Access portal for apps at vaxagroup.cloudflareaccess.com. This is where they can access other systems including Productive.
Noted limitations
By default, the contractor will not have access to:
Client Sharepoint sites (except those specified)
BitWarden
Production IT environments (e.g. Google Cloud, AWS)
Scheduling software (e.g. Cal.com)
LMS
Exceptions
Some contractors may require different onboarding procedures. If this is the case, the Onboarding Lead should work with the contractor to determine the best course of action. This should be documented in the onboarding documentation.
Compliance & Monitoring
The Onboarding Lead is responsible for ensuring this procedure is followed for each relevant contractor.
We don’t yet have artifacts in place to monitor compliance with this procedure. This is a gap we need to address.
To doWhat artifacts could we put in place to monitor compliance with this procedure?