
Data security and privacy in government: Adapting to the cloud
Learn how to navigate the data security and privacy challenges as government entities adapt to the cloud, and get strategies to protect sensitive information.
Learn how to navigate the data security and privacy challenges as government entities adapt to the cloud, and get strategies to protect sensitive information.
Australian government entities are walking a tightrope between innovation and data protection. As more agencies see the need for and benefits of moving to the cloud, securing citizen data has become increasingly complex and critical.
As a result of these shifts, regulatory frameworks are tightening, and expectations around transparency and privacy are becoming increasingly rigid, both from regulators and the public.
In this guide, we’ll examine what the great cloud migration means for government organisations, explore how it has impacted data privacy and security principles and discuss how government entities can adapt to meet the new standards in the digital era.
The cloud has fundamentally changed how government entities manage and protect sensitive data. ‘Securing the perimeter’ is no longer sufficient to safeguard critical information. Sensitive data lives everywhere and requires continuous protection that evolves alongside threats.
Here are some of the reasons cloud security is so important for government agencies:
With these risks in mind, it’s little surprise that legislation is becoming increasingly prescriptive. Let’s take a closer look at the regulatory landscape and how it’s evolving.
The primary legislation governing Australian government entities (as well as many of Australia’s private organisations) has long been the Privacy Act 1988 . But this framework existed in a pre-digital era, and the rapid shift to cloud technology has introduced new complexities.
As a result, several modern frameworks are now in place to help government entities keep their data secure and privacy tight as they shift to cloud environments. Two examples include the Protective Security Policy Framework (PSPF) and the Australian Government Information Security Manual (ISM) , both of which provide mandatory guidance to ensure government entities can integrate cloud systems effectively.
We’ve also recently been introduced to the AGA Cloud Computing Policy , which offers more specific guidance. It outlines how government agencies should approach procurement and risk management in the cloud and puts a strong emphasis on cloud sovereignty under the Hosting Certification Framework .
In short, there’s a lot in motion. This simple table breaks things down by outlining what the key frameworks are, what they do, and when they were last amended.
Framework | What’s the purpose? | Who does it apply to? | Amendments/ Introduced |
---|---|---|---|
Privacy Act 1988 | Regulates handling of personal information and includes the APPs | Governments and private organisations | 2024–2026 |
Cyber Security Act 2024 | Sets national cybersecurity standards | All critical infrastructure | Introduced in 2024 |
SOCI Act | Secures critical infrastructure in Australia | Critical sectors like energy, defence and finance | Amended in 2025 |
Information Security Manual (ISM) | A framework that provides technical security controls, including the Essential Eight | All government agencies | Routinely updated |
AGA Cloud Computing Policy | Sets out government policy across six security domains | Non-corporate government entities | Routinely updated |
AGA Cloud Computing Policy | Guides cloud planning and security for government entities | Governments adopting cloud services | Ongoing |
Australian government entities have good reasons to be excited about a move to the cloud. The opportunity to deliver faster, data-empowered and more readily available services is a primary motivator, as is the chance to reduce the costs of keeping everything running.
But while the cloud is incredibly beneficial, it isn’t without its security and privacy challenges. Here are eight of the most common roadblocks to cloud adoption:
Modernise government service and increase operational efficiency with proactive agents and automation. Use Salesforce software for government to unify and harmonise data on a compliance-enabled cloud. Innovate faster with a low code application platform for government.
Now that we’ve examined the challenges government entities face when adopting cloud technologies, let’s look at the strategies that can help them avoid those challenges.
We’ve paired each of the risks above with a concrete strategy to show how governments can build a robust cloud adoption framework that covers every base.
Let’s look at each of these strategies in more detail.
Cloud-era risk | Action-oriented strategy |
---|---|
Expanded attack surface | Reduce your attack surface with strong access controls. |
Data sovereignty and control | Keep citizen data local and sovereign. |
Multi-cloud and hybrid complexity | Standardise and simplify multi-cloud environments. |
Legacy system integration | Modernise securely with planned legacy integration. |
Insider and supply chain threats | Protect against insider threats and third-party risks. |
Evolving threat landscape | Harden defences with layered protection and resilience. |
Compliance complexity | Align with government frameworks and policies. |
Loss of public trust | Build trust through transparency and accountability. |
Cloud environments create more entry points for attackers. That’s why it’s critical to implement strong access controls that identify who can access what and when. Important principles include:
The end goal of all these safeguards is to make it harder for bad actors to move around unnoticed. It ensures that even if an individual gets past the perimeter, they’ll hit a wall of controls and limited privileges at every stage.
Tools like Salesforce’s Shield 2.0 can support your security posture by enforcing access controls and helping you spot unusual activity before it escalates. Learn more about how our groundbreaking compliance and security tool works.
Australians are growing concerned about how their data is stored and used. The cloud can make this issue more complex, as many providers operate in different countries and therefore adhere to different privacy and protection laws.
For this reason, it’s vital to work with cloud providers that comply with Australian legislation and abide by local standards. The Cloud Assessment and Authorisation (CAAF) framework provides guidance to help government entities choose the right sovereign cloud provider.
Platforms like Salesforce Hyperforce keep data secure and firmly on Australian shores, supporting data sovereignty and localisation for government entities.
Juggling multiple cloud platforms (and balancing these systems with legacy IT) can lead to inconsistent data practices and fragmented communication.
The best way to navigate this problem is to look for ways to simplify your cloud environments. Here are some concepts:
The key is to switch to the cloud piece by piece, stay consistent and unify data where possible. Tools like MuleSoft can make this process easier by connecting systems across your cloud environment while keeping data governance front and centre.
Migrating from legacy systems can be a significant challenge, both from a technical and a risk standpoint. For example, moving data to modern cloud platforms can expose sensitive information if it isn’t properly encrypted during transit.
The trick here is to move slowly and strategically. Start with a cloud readiness and security risk assessment to identify risks and dependencies. Once you’ve mapped out your information, follow a phased, risk-based migration approach, such as the one provided by the AGA .
You can also leverage technology to automate the transition. MuleSoft can bridge systems securely to speed up your data integration efforts while keeping sensitive information protected.
As cloud environments provide access to more people across multiple locations, governments need to put protocols in place to protect against the increased risk that comes from internal threats and interactions with external parties.
In practice, this means putting in place enforceable safeguards across every touchpoint within their cloud ecosystem. These include:
Entities need to treat insider and third-party risks as operational and legal responsibilities, rather than just a technical checkbox.
Securing the perimeter isn’t a valid approach in modern cloud environments. To counter advanced threats, governments need to implement a multi-layered approach that anticipates breaches rather than reacting to them.
A good starting point here is to use the ACSC’s Essential Eight as a baseline. These eight principles aim to reduce vulnerabilities and strengthen cybersecurity postures for government organisations. Agencies should also take this one step further by routinely stress-testing their systems with penetration testing to detect and protect against threats before they occur.
Lastly, it’s essential to have a plan for when things go wrong. A cyber incident response plan aligned with the Notifiable Data Breaches scheme will ensure entities can act quickly and limit damage in the worst-case scenario.
Finally, we have the element that’s more challenging to quantify: public trust. Consumers are naturally concerned about the way their data is used and secured. That’s why it’s essential to have a strategy in place to keep them on side.
It all starts with transparency. Government agencies need to communicate their data practices clearly, including why and how they collect, use and store it. It’s also vital to act in the best interests of the public by minimising data collection and retention in line with APA standards.
Platforms like Data Cloud can help you organise and manage sensitive data securely, ensuring you can maintain transparency and accountability while getting the best out of the information you possess.
Data Cloud helps you securely unify and activate data across systems. Maintain transparency and unlock insights — all on a trusted platform built for compliance and scale.
Salesforce helps Australian government entities meet the demands of cloud integration while maximising the benefits that come with it. We’re proud to assist several government agencies across the country in delivering secure, compliant cloud services that put citizens first.
The Victorian Government renewed its State Purchase Contract (SPC) with Salesforce in June 2025 to support its digital transformation by delivering more efficient and accessible public services to Victorians.
As a result of the partnership, Salesforce has been able to support dozens of Victorian Government agencies, including those in the health, energy and justice sectors, with a faster, more consistent pathway to providing first-rate public services.
This partnership will help departments and agencies to easily access important platforms and technologies to deliver better digital services to Victorians.
Natalie HutchinsMinister for Government Services, Victorian Government
The recent AGA framework is comprehensive. Aligning with it requires a consistent approach to technology security, a clear risk-management framework and providers that can meet strict requirements around sovereignty and compliance.
Here’s how Salesforce meets those requirements:
Learn more about our services for the public sector and government agencies in Australia
As cloud adoption becomes the norm for government agencies, entities need to walk a fine line to ensure they can deliver citizen-first services that uphold public trust without opening the door to security incidents and compliance breaches.
The key is to adopt a strategic, risk-aware approach that aligns with modern frameworks, embeds transparency at every stage and leverages the right providers to make the transition seamless.
Ready to find out how Salesforce can help? Watch the demo today to see how Salesforce for Public Sector agencies can help you keep data secure and private while you launch faster, more accessible digital services for your citizens.
Try Public Sector Solutions for 30 days with sample data. No credit card, no installations.
We would love to connect with you. Tell us a bit more so the right person can reach out to discuss your needs.
Visit the Public Sector Solutions Resource Centre for the latest research, industry insights, and product best practices.
While many government entities are concerned about artificial intelligence posing a risk for organisations, we’re also seeing how AI security can work to protect against threats.
For instance, cloud AI can analyse vast amounts of data to identify anomalies and predict vulnerabilities before incidents occur. It can also automate security tasks, reducing the chance of human error. All of this supports faster, more accurate threat detection and allows government agencies to take a proactive approach to data management.
Adhering to laws like the APA and frameworks like the PSTF becomes, at best, deeply challenging and, at worst, nearly impossible when you rely on legacy IT. Cloud platforms make it easier to implement consistent controls across your entire ecosystem, demonstrate compliance through auditable records and maintain up-to-date security standards, all of which are vital for complying with modern regulations.
The Essential Eight is a set of strategies developed by the Australian Cyber Security Centre (ACSC) under the Department of Home Affairs. The eight principles are:
Implementing the Essential Eight is a mandatory requirement for all non-corporate Commonwealth entities (NCEs). Other government entities are also encouraged to use these principles as guidance to work towards compliance with other regulations such as the AGA, PSPF and APA.