Professional woman analyzing data on a tablet with digital graphics overlay.

Data security and privacy in government: Adapting to the cloud

Learn how to navigate the data security and privacy challenges as government entities adapt to the cloud, and get strategies to protect sensitive information.

Cover of the Salesforce State of Marketing report

Uncover the latest insights on the state of public services and the future of agentic AI.

Hosting Certification Framework

In short, there’s a lot in motion. This simple table breaks things down by outlining what the key frameworks are, what they do, and when they were last amended.

Framework What’s the purpose? Who does it apply to? Amendments/ Introduced
Privacy Act 1988 Regulates handling of personal information and includes the APPs Governments and private organisations 2024–2026
Cyber Security Act 2024 Sets national cybersecurity standards All critical infrastructure Introduced in 2024
SOCI Act Secures critical infrastructure in Australia Critical sectors like energy, defence and finance Amended in 2025
Information Security Manual (ISM) A framework that provides technical security controls, including the Essential Eight All government agencies Routinely updated
AGA Cloud Computing Policy Sets out government policy across six security domains Non-corporate government entities Routinely updated
AGA Cloud Computing Policy Guides cloud planning and security for government entities Governments adopting cloud services Ongoing
Image of Public sector dashboard

Build public trust and connection with Agentforce for Public Sector.

Modernise government service and increase operational efficiency with proactive agents and automation. Use Salesforce software for government to unify and harmonise data on a compliance-enabled cloud. Innovate faster with a low code application platform for government.

A robust cloud adoption framework

Let’s look at each of these strategies in more detail.

Cloud-era risk Action-oriented strategy
Expanded attack surface Reduce your attack surface with strong access controls.
Data sovereignty and control Keep citizen data local and sovereign.
Multi-cloud and hybrid complexity Standardise and simplify multi-cloud environments.
Legacy system integration Modernise securely with planned legacy integration.
Insider and supply chain threats Protect against insider threats and third-party risks.
Evolving threat landscape Harden defences with layered protection and resilience.
Compliance complexity Align with government frameworks and policies.
Loss of public trust Build trust through transparency and accountability.
Data Cloud platform in a ssot dashboard

Say hello to Data Cloud.

Data Cloud helps you securely unify and activate data across systems. Maintain transparency and unlock insights — all on a trusted platform built for compliance and scale.

This partnership will help departments and agencies to easily access important platforms and technologies to deliver better digital services to Victorians.

Natalie Hutchins
Minister for Government Services, Victorian Government

Government Data Security and Privacy FAQs

While many government entities are concerned about artificial intelligence posing a risk for organisations, we’re also seeing how AI security can work to protect against threats.

For instance, cloud AI can analyse vast amounts of data to identify anomalies and predict vulnerabilities before incidents occur. It can also automate security tasks, reducing the chance of human error. All of this supports faster, more accurate threat detection and allows government agencies to take a proactive approach to data management.

Adhering to laws like the APA and frameworks like the PSTF becomes, at best, deeply challenging and, at worst, nearly impossible when you rely on legacy IT. Cloud platforms make it easier to implement consistent controls across your entire ecosystem, demonstrate compliance through auditable records and maintain up-to-date security standards, all of which are vital for complying with modern regulations.

The Essential Eight is a set of strategies developed by the Australian Cyber Security Centre (ACSC) under the Department of Home Affairs. The eight principles are:

  • Patch applications: Regularly update apps to fix known vulnerabilities.
  • Patch operating systems: Apply OS patches promptly when required.
  • Multi-factor authentication (MFA): Requires at least two forms of identification.
  • Restrict admin privileges: Limit access to information to the bare minimum.
  • Application control: Allow only approved applications to run.
  • Restrict Microsoft Office macros: Only allow vetted and signed macros to run.
  • User application hardening: Limit or completely disable high-risk app features.
  • Regular backups: Create frequent backups of data.

Implementing the Essential Eight is a mandatory requirement for all non-corporate Commonwealth entities (NCEs). Other government entities are also encouraged to use these principles as guidance to work towards compliance with other regulations such as the AGA, PSPF and APA.