Our cyber security products span from our next gen SIEM used in the most secure government and critical infrastructure environments, to automated cyber risk reporting applications for commercial and government organisations of all sizes.
Organisations subject to Australia’s Security of Critical Infrastructure Act 2018 (SOCI) face a tough challenge: how to meet strict cyber incident reporting timelines while juggling a mix of governance frameworks, operational pressures, and technical controls.
While the SOCI legislation enables organisations to choose from a range of cyber security frameworks to meet their obligations—such as ISO/IEC 27001 and NIST CSF, the real question is:
Can some of these frameworks alone meet some of SOCI’s tight incident reporting timeframes, particularly for those that cause ‘relevant impact’?
SOCI-mandates incident reporting deadlines as follows:
Additionally, organisations designated as responsible entities for critical infrastructure assets also need to maintain and comply with a Critical Infrastructure Risk Management Program (CIRMP) to demonstrate their proactive hazard risk management capabilities, including cyber security.
The problem is that, while traditional ISMS-style frameworks work well for governance and long-term cyber security strategy, they lack the real-time visibility needed to detect and report threats in the timeframes required by SOCI.
That’s where the ACSC Essential Eight (E8) can help.
Unlike comprehensive ISMS frameworks that focus on policy, governance and documentation, the ACSC Essential Eight delivers a practical, technical baseline of critical security controls. These controls are measurable, automatable, and map directly to your cyber threat posture—making them ideal for operationalising CIRMP mitigation requirements.
Factor | ISMS-Only Approach | With Essential Eight Integration |
Detection & Monitoring | Periodic, policy-led | Continuous, control-state visibility |
Incident Response | Audit frequency dependent | Near real-time detection and escalation |
Reporting Alignment | Difficult to meet timelines | Supports automated reporting triggers |
Evidence for CIRMP | Manual and indirect | Auditable, metrics-driven outputs |
Regulator Familiarity | Requires justification | Recognised by ACSC & CISC |
The most effective approach isn’t to choose one over the other—it’s to combine governance frameworks like ISO 27001 with data-driven technical overlays using the ACSC Essential Eight.
This hybrid model enables:
Meeting SOCI requirements isn’t just about frameworks—it’s about having the right tooling in place to monitor, measure, and report the effectiveness of your risk management efforts that support your cyber resilience.
The Huntsman Security Scorecard was specifically developed to address this challenge.
SOCI Obligation | How Scorecard Helps |
12–72 hour reporting | Alerts triggered by a degradation of control effectiveness |
CIRMP evidence | Automated evidence-based reporting of current control maturity |
Executive/Board attestation | Easy-to-understand dashboards to inform governance processes |
Framework mapping | Supports Essential Eight alignment even when using ISO/NIST as primary frameworks |
Bonus: The Scorecard integrates with existing SIEM and SOC environments, to make them efficient and cost-effective.
Compliance with SOCI isn’t just a checkbox exercise—it’s an ongoing race to protect your enterprise against security incidents or disruption. Traditional frameworks give you the map, but Essential Eight gives you the vehicle.
The Essential Eight is more than just guidance—it’s a practical enabler of SOCI cyber resilience.
For critical infrastructure providers, integrating the ACSC Essential Eight and leveraging platforms like the Huntsman Scorecard into their CIRMP provides a clear, auditable path to meeting SOCI’s incident reporting and compliance demands—while at the same time informing dynamic risk management and board-level oversight.
In a world of evolving threats and tightening regulations, that’s not just good governance—it’s business as usual.
Read by directors, executives, and security professionals globally, operating in the most complex of security environments.