Achieve IRAP Compliance

Complete Infosec Registered Assessors Program (IRAP) guidance, from documentation to continuous monitoring. Our local team has specialized expertise and will work with you during your business hours, whichever hemisphere you’re in.

38North Security has successfully taken organizations through the whole IRAP journey —
the first step to opening up new markets.

Trust Us to Get You There.

38North logo

Get Expert IRAP Guidance

As former Australian defense insiders, FedRAMP staffers, and experts in other compliance frameworks, the depth and breadth of our capability is unparalleled. 38North Security’s experience ensures the elimination of common errors in the authorization process, cutting down on expenses and reducing compliance risk. We stay on top of shifts in the compliance landscape, so you’re never blindsided by changes in the process. Let us streamline your path to IRAP certification — and beyond.

The IRAP Compliance Assessment Process

The Australian IRAP compliance assessment process is deceptively long and complex, with updates to the Information Security Manual (ISM) being published by the Australian Cyber Security Centre (ACSC) on a quarterly basis. The applicant and the assessor determine the size and scope of the assessment, meaning there can be a great deal of variability. Fortunately, 38North is an established cloud security compliance advisory firm — providing expert guidance and support — to help you define your boundary and ensure that your compliance posture is clear when undergoing an IRAP assessment. No matter where you are in your IRAP compliance assessment process, 38North can make it easier.

IRAP Assessment Challenges

Undergoing an IRAP assessment can be a challenging process due to the complexity and rigor of the security requirements, as well as the quarterly updates to the ISM. Overall, these challenges can cause delays and increased costs in pursuing Australian Federal customers and contracts.

38North IRAP Services

38North can help you demonstrate ISM compliance, no matter where you are in the process.

Boundary Scoping

We start by helping you understand what data you have that must be protected . This lets us know what assets are in scope, and excludes those that aren’t.

Workshops

Our workshops get you started — with control requirement training and consulting. We also help by using Australian Federal Government practices to design systems and approaches that will withstand IRAP assessments.

ISM Requirements Gap Analysis

Gap analyses help cloud providers and contractors understand what they need to do to comply with the ISM. Our gap analysis will find your gaps against the requirements and deliver a prioritized roadmap of actions required to close compliance gaps.

ISM Advisory Support

38North’s senior security advisors can help you design, deploy, document and maintain a scalable security approach that meets your desired ISM compliance level.

What do I need for my IRAP compliance assessment?

The IRAP assessor will request documentation and artifacts that show the appropriateness and effectiveness of the system’s security controls. This includes policies, procedures, and samplings of artifacts to show procedures are being followed in a consistent and repeatable manner. 38North advisors can work with your teams and help with developing this documentation, in preparation for assessment.

Typically, you should be prepared to present the following documentation, as a baseline:

  • System Overview Document (SOD)
  • Security Risk Management Plan (SRMP)
  • Incident Response Plan (IRP)
  • Media Management Policy (MMP) User Access Management (UAM) Plan
  • Vulnerability and Patch Management Plan (VPM)
  • Audit and Accountability Policy (AAP)
  • Cryptographic Key Management Plan (CKM)
  • System Security Plan (SSP) – including all chapters
  • Statement of Applicability (SOA)
  • Business Impact Level Assessment (BIL) template
  • Configuration Management Plan (CMP)

What do I need for my IRAP authorisation package?

The system owner will compile an Authorisation Package to submit to the authorising authority. In addition to the Security Assessment Report, it should contain:

  • System Security Plan (SSP)
  • Incident Response Plan (IRP)
  • Continuous Monitoring Plan (CMP)
  • Plan Of Action And Milestones (POA&M)
Two people shaking hands at a meeting with package and cloud icon overlay

Your IRAP Compliance Assessment Starts Here

Book an initial IRAP conversation with one of our Australian cloud security experts today and we’ll help you achieve your goal of IRAP compliance — and stronger security.

Contact Us

Name(Required)
(Please do not provide additional PII in this box)
This field is for validation purposes and should be left unchanged.