Overview of the Uplift Process
The Uplift Process is intended to assist applicant entities in achieving a suitable level of cyber security hygiene, where they’re assessed to have shortfalls during the Initial Assessment (IA).
The Uplift Process is broken into the following stages:
Action Plan Requested
-
- When an entity IA has an overall rating of Ad-Hoc or Developing, the assessment includes recommendations and the opportunity to respond to those recommendations in “Part 2 – Uplift Action Plan”.
Action Plan Received
-
- The entity submits “Part 2 – Uplift Action Plan”, commonly referred to as the “Action Plan”.
Action Plan Accepted
-
- The action plan is accepted if the assessor agrees that the identified actions are suitable. Afterward, DISO Cyber will advise the entity to submit an “Uplift Letter”. The letter must confirm implementation has been completed.
- If the actions are unsuitable, the assessor will work with the entity to determine the best path forward.
Uplift Letter Received
-
- If DISO Cyber accepts the entity’s Action Plan, the entity must write to us to confirm the implementation is complete.
Reassessment
-
- A reassessment can only be raised if a complete uplift letter has been received.
- The Reassessment must consider the action plan recommendations and the original cyber security assessment report.
Uplift Quality Assurance Check
-
- The Reassessment is subject to a Quality Assurance check, just as the IA is.
Action Plan Suitability
The assessor must ensure that the identified actions are suitable for addressing the recommendations made within the IA Cyber Security Assessment Report.
Ambiguous statements are not suitable for addressing our recommendations. Instead, applicants must explain to us in no uncertain terms how they will address a control.
An assessor may request that the applicant demonstrate the control is implemented at any time. For example, you may ask for a screenshot of an applicant’s policy deployment.
Unacceptable example: “We will implement application control.”
Acceptable example: “We will utilise Microsoft EndPoint Manager to deploy Microsoft Defender Application Control (MDAC) to all endpoints used to correspond with Defence”.