APRA Cybersecurity Guidelines

Application Security Requirements for Australian Financial Services

APRA Cybersecurity Guidelines
3 min read

Cybersecurity is non-negotiable for websites, and if you're operating in Australia, there's no shortage of guidance available to fortify your online assets. While the Australian Government's "Essential 8" focuses broadly on workplace security, the Australian Prudential Regulation Authority (APRA) offers a more specific Information Security Manual (ISM) which contains numerous recommendations applicable to business websites.

Why Website Security Matters

When your business operates a website or web application, you're not just managing content; you’re also responsible for safeguarding data. Inadequate security measures expose you to risks like data breaches, malware, DDoS attacks, and reputational damage. It is incumbent on company executives and operational staff to implement recommendations to minimise their risk and liability in the event of a security breach.

APRA’s ISM: Tailored for Websites

APRA's ISM guidelines are particularly insightful. Here are key recommendations for websites and why you should consider them:

Network Traffic and Anonymity (ISM-1627, ISM-1628)

Blocking anonymity network traffic minimises the risk of malicious actors hiding their identity. This enhances accountability and reduces security threats.

Cloud Service Providers (ISM-1437)

APRA advises the use of cloud service providers for hosting online services. By leveraging the cloud, you can benefit from robust security measures that often outclass on-premises solutions.

Content Delivery Network (ISM-1438)

A CDN isn’t just for speed; it’s also for security. A CDN can filter out malicious traffic and provide an additional layer of security.

Origin Exposure and DDoS Mitigation (ISM-1439)

Hiding the origin IP and using cloud providers for DDoS mitigation keeps your primary server safe by dispersing traffic across a distributed network.

Data Encryption (ISM-1781, ISM-1139)

Encrypt all data over the network and only use the latest version of TLS to ensure secure data transit.

Logging and Auditing (ISM-261, ISM-580, ISM-0585, ISM-1661)

Maintaining comprehensive audit logging is vital for tracking activities and identifying irregular patterns. Your logs should be detailed and periodically audited.

Web Application Firewall (WAF) (ISM-1240, ISM-1490, ISM-1509, ISM-1657)

A WAF is essential for monitoring and filtering incoming traffic, enabling you to block harmful requests.

Backup and Configuration (ISM-1511)

Back up your data, website, and configurations and store them securely, preferably in a version-controlled environment like Git.

HTTPS and SSL (ISM-1277, ISM-1552)

SSL certificates and HTTPS should be a standard for all web content. This safeguards data integrity and user confidentiality.

Scaling and Monitoring (ISM-1579, ISM-1581)

Ensure your website can scale during demand spikes and that you have real-time monitoring for both capacity and availability.

Virtual Patching and Antivirus Scanning (ISM-1690, ISM-1288, ISM-1694)

Virtual patching and antivirus scanning fortify your website against new vulnerabilities and malware.

Content Types (ISM-0649)

Only allow specific content types to run. Restricting this reduces the risk of malicious content affecting your website.

Final Thoughts

Incorporating APRA’s ISM recommendations into your cybersecurity strategy makes your website resilient against various forms of cyberattacks. Don’t just consider these as mere guidelines; view them as essential practices for robust website security.

Enterprise-Grade Security and Performance

Peakhour offers enterprise-grade security to shield your applications from DDoS attacks, bots, and online fraud, while our global CDN ensures optimal performance.

Contact Us

Related Content

How to Prepare for a SOC 2 Type II Audit

Understanding SOC 2

A SOC 2 (Service Organization Control 2) report is an audit of a service organization's internal controls. It is designed to provide assurance to clients that their data is being handled securely. The audit is conducted by a third-party Certified Public Accountant (CPA) firm and is based …

PCI DSS Compliance for E-commerce

What is PCI DSS?

The Payment Card Industry Data Security Standard (PCI DSS) is a set of mandatory security standards for any organization that accepts, processes, stores, or transmits credit card information. It was created by the major payment card brands (Visa, MasterCard, American Express, etc.) to reduce credit card …

What is Compliance as Code?

Back to learning

Compliance as Code is the practice of implementing regulatory compliance requirements through automated, code-based systems that continuously validate, monitor, and report on compliance status. This approach treats compliance as an automated, integral part of the development and operations lifecycle.

Core Principles

Automated Compliance Validation

Continuous verification of …

What is Data Residency?

Back to learning

Data Residency refers to the physical or geographical location where data is stored and processed, often governed by legal and regulatory requirements that mandate certain types of data must remain within specific jurisdictional boundaries. Organisations must understand and manage data residency to ensure compliance with local data …

What is GDPR Compliance?

Back to learning

GDPR Compliance refers to adherence to the General Data Protection Regulation, the European Union's comprehensive data protection law that governs how personal data of EU citizens is collected, processed, stored, and protected. GDPR compliance is essential for any organisation handling EU citizen data, regardless of location.

Core …

What is HIPAA Compliance?

Back to learning

HIPAA Compliance refers to adherence to the Health Insurance Portability and Accountability Act, which establishes national standards for protecting individually identifiable health information. Organisations that handle Protected Health Information (PHI) must implement comprehensive safeguards to ensure the privacy and security of healthcare data.

HIPAA Rules Overview

Privacy …

© PEAKHOUR.IO PTY LTD 2025   ABN 76 619 930 826    All rights reserved.