Skip to main content
Strategy & Architecture · Financial Services

Securing
financial data:
a strategy that
survives scrutiny.

Most financial data security strategies are compliance checklists dressed as strategy. They list controls, reference frameworks, and produce a document that satisfies the board pack but does not actually reduce risk. When a breach occurs, the strategy turns out to be a collection of intentions that nobody tested and nobody maintained.

A defensible strategy for securing financial data in Australia now operates under a layered regulatory stack: APRA CPS 234, CPS 230, the Privacy Act, the SOCI Act, and the Cyber Security Act 2024. These obligations overlap, interact, and create compounding accountability. Getting the strategy right is not optional. Getting it wrong has consequences that go beyond fines.

Written by practitioners who are ISO 27001 certified and advise APRA-regulated entities on security strategy, architecture, and CPS 234 compliance.

01 / Why the conversation has changed

Financial data security has moved from a technology problem to an accountability problem. The regulatory and threat environment of 2024 to 2026 leaves no room for vague commitments.

Three forces are reshaping how Australian financial institutions approach data security, and they are converging simultaneously.

The regulatory stack has expanded. Between 2024 and 2025, Australian financial services experienced the most significant expansion of cybersecurity regulation in a decade. CPS 230 came into force on 1 July 2025, replacing the outsourcing standard and adding operational resilience requirements. The Cyber Security Act 2024 introduced mandatory ransomware payment reporting. The Financial Accountability Regime (FAR) made individual executives personally accountable for risk management failures, including cybersecurity. Each of these instruments interacts with CPS 234's existing information security obligations.

The breach consequences have escalated. After the Medibank data breach in 2022, APRA imposed a $250 million capital charge, not a fine, an additional capital requirement that directly constrained the insurer's business operations. The subsequent MediSecure incident in 2024 demonstrated that third-party supply chain compromises can destroy an entire business. These are not hypothetical scenarios. They are the new enforcement baseline.

The threat actors have adapted. ASD's 2023-24 Annual Cyber Threat Report recorded over 1,100 cybersecurity incidents across Australia, with financial services remaining one of the most targeted sectors. State-sponsored actors and organised criminal groups increasingly target financial data not through direct network penetration but through third-party access, credential compromise, and business email attacks.

The shift: Financial data security is no longer about whether you have controls. It is about whether you can demonstrate those controls work, explain your risk decisions to a regulator, and prove that your board understood what it was approving. The organisations that will struggle are those whose strategy exists as a document rather than a capability.

02 / The Australian regulatory stack for financial data

Financial institutions do not operate under a single cybersecurity regulation. They operate under a stack, and the interactions between layers create the real complexity.

Understanding each regulation in isolation is straightforward. The challenge is that they overlap, and compliance with one does not guarantee compliance with another. A financial institution processing personal information through third-party cloud services is simultaneously subject to CPS 234 (information security), CPS 230 (operational risk and third-party management), the Privacy Act (personal information handling), and potentially the SOCI Act (critical infrastructure).

CPS 234
Since July 2019
Mandatory for all APRA-regulated entities. Requires board-level accountability for information security, asset classification, controls commensurate with risk, systematic testing, incident notification within 72 hours, and control weakness notification within 10 business days. Enforced through intensified supervision, remediation directives, and additional capital charges. Read the full CPS 234 guide.
CPS 230
Since July 2025
Operational risk management and resilience. Replaced CPS 231 Outsourcing and added critical operations identification, tolerance setting, and enhanced third-party risk management. Explicitly requires entities to meet CPS 234 requirements when managing technology risks. Tightened oversight of material service providers.
Privacy Act
APP since 2014
Applies to all organisations with $3M+ annual turnover (and all health service providers). The Notifiable Data Breaches (NDB) scheme requires notification to the OAIC and affected individuals when a data breach is likely to result in serious harm. The Privacy Act Review (ongoing) is expected to introduce stronger enforcement powers, a tort for serious privacy invasions, and expanded individual rights.
SOCI Act
Enhanced 2022
Covers critical financial market infrastructure. Imposes positive security obligations including risk management programmes, mandatory incident reporting to the Australian Signals Directorate within 12 hours for critical incidents, and government assistance measures for significant cyber incidents affecting critical infrastructure.
Cyber Security Act
Since Nov 2024
Mandatory ransomware payment reporting. Organisations with annual turnover above $3 million must report ransomware payments to the Australian Signals Directorate within 72 hours. Also established the Cyber Incident Review Board and minimum security standards for smart devices.

The compounding problem: Each regulation has its own notification timeline, reporting format, and evidence standard. A single data breach involving personal financial information could trigger CPS 234 notification (72 hours to APRA), NDB notification (as soon as practicable to OAIC), SOCI reporting (12 hours to ASD), and potentially ransomware payment reporting (72 hours to ASD). Your strategy needs to handle all of these simultaneously, not sequentially.

03 / Six pillars of a defensible strategy

A financial data security strategy that works under scrutiny covers six domains, not just technical controls.

The most common failure in financial data security strategy is treating it as a technology problem. Technology controls are necessary but insufficient. A strategy that will survive a regulatory inquiry, a board challenge, or a real incident needs to address governance, classification, controls, third parties, response, and assurance as an integrated system.

01
Governance and accountability

Under CPS 234, the board is ultimately responsible for information security. This is not a figurative statement; APRA holds boards accountable for ensuring the entity maintains information security commensurate with its threat environment. Under FAR, individual executives can be personally held accountable for failures in their area of responsibility.

A defensible governance model requires: a clear risk appetite statement that defines what level of residual risk the board is willing to accept; defined roles and responsibilities for information security from board level through to operational teams; regular reporting that gives the board meaningful visibility into security posture, not just green traffic lights; and documented decision records showing why security investments were approved or deferred.

Where this fails

Boards that receive only aggregated risk scores and compliance percentages. When APRA asks why a known vulnerability was not remediated, the answer needs to be more substantial than "the dashboard was green."

02
Information asset classification

CPS 234 Paragraph 15 requires entities to classify information assets by criticality and sensitivity. This sounds straightforward, but APRA's own tripartite assessment findings in 2023 identified incomplete identification and classification of information assets as one of the six most common compliance gaps. You cannot protect what you have not classified, and you cannot classify what you have not found.

Effective classification covers: data discovery across structured and unstructured repositories, cloud services, and third-party environments; sensitivity categorisation aligned to regulatory requirements (personal information under the Privacy Act, financial information under CPS 234); and data flow mapping showing how financial data moves between systems, environments, and third parties.

03
Technical controls architecture

The technical controls layer is where most organisations focus, often to the exclusion of the other five pillars. A defensible security architecture for financial data is built around defence in depth: no single control failure should expose sensitive data. The architecture should address access management (identity, authentication, authorisation, and privilege management), encryption (at rest and in transit, with key management aligned to the data classification scheme), network segmentation (isolating sensitive financial data processing environments from general corporate networks), and monitoring and detection (SIEM, endpoint detection and response, and anomaly detection calibrated to financial data access patterns).

APRA has increasingly referenced the ASD Essential Eight as a de facto technical baseline. While CPS 234 is principles-based and does not prescribe specific controls, failure to implement foundational controls like multi-factor authentication is now likely to be treated as a notifiable material control weakness.

04
Third-party risk management

This pillar has become significantly more important since CPS 230 took effect. Financial institutions routinely share sensitive data with payment processors, cloud providers, managed service providers, and fintech partners. Each of these relationships introduces risk that the institution remains accountable for, regardless of contractual arrangements.

CPS 234 requires entities to assess the information security capability of third parties managing information assets. CPS 230 extends this with detailed requirements for managing material service providers, including maintaining registers, conducting due diligence, and ensuring operational resilience. Third-party risk management requires ongoing monitoring, not just point-in-time assessments at contract signing.

The lesson from recent breaches

Both the Medibank breach and the MediSecure incident involved third-party access vectors. The regulatory consequence fell on the regulated entity, not the third party. Your third-party risk management capability needs to match the sensitivity of the data you share.

05
Incident response and regulatory notification

An incident response plan that has never been tested is not a plan; it is a document. Financial institutions operate under multiple concurrent notification obligations: 72 hours to APRA under CPS 234, as soon as practicable to the OAIC under the NDB scheme, 12 hours to ASD for critical infrastructure incidents, and 72 hours for ransomware payment reporting.

A defensible incident response capability requires: tested playbooks for the most likely incident scenarios (ransomware, data exfiltration, credential compromise, third-party breach); regulatory notification workflows that can execute in parallel across multiple regulators; evidence preservation procedures that maintain forensic integrity; and communication templates for board, executive, customer, and media notifications. Regular tabletop exercises are the minimum standard for testing these capabilities.

06
Continuous assurance and testing

CPS 234 requires testing of information security controls through a systematic testing programme. APRA's tripartite assessment findings identified inadequate control testing programmes, incomplete coverage, inconsistent methodology, and lack of independence, as a widespread compliance gap.

A mature assurance programme includes: regular penetration testing of systems processing financial data; vulnerability management with risk-based prioritisation and defined remediation timeframes; independent audit of critical security controls, not conducted by the team responsible for those controls; and evidence-based reporting that translates technical findings into business risk language for the board. The testing programme should be commensurate with the criticality and sensitivity of the assets being tested.

04 / The threat landscape for financial data

Understanding who targets financial data and how they operate is not academic. It directly shapes which controls matter and where your investment delivers the most protection.

Financial data attracts a spectrum of threat actors, from opportunistic criminals deploying commodity ransomware to state-sponsored groups conducting long-term espionage campaigns. The distinction matters because different adversaries require different defensive responses.

The primary threat vectors

Credential compromise and identity-based attacks have become the dominant initial access vector. Attackers acquire valid credentials through phishing, infostealer malware, credential stuffing, or purchasing them from initial access brokers. Once authenticated, they operate within legitimate access boundaries, making detection harder. Multi-factor authentication remains the single most impactful control against this vector, which is why APRA has specifically called it out in supervisory communications.

Business email compromise (BEC) continues to cause significant financial losses across Australian organisations. ASD data shows BEC consistently accounts for some of the highest dollar-value losses in reported cyber incidents. For financial institutions, BEC targeting payment authorisation workflows, supplier account changes, and executive impersonation represents a direct financial risk.

Ransomware and data extortion have evolved from encryption-focused attacks to double and triple extortion models where attackers exfiltrate data before encrypting systems, then threaten public release or regulatory notification. For financial institutions holding sensitive customer data, the extortion leverage is substantial. The Cyber Security Act 2024 now requires reporting of ransomware payments, adding a regulatory dimension to what was previously a purely operational decision.

Supply chain and third-party compromise has become an increasingly effective attack path. Rather than attacking a well-defended financial institution directly, adversaries target less mature vendors, managed service providers, or software suppliers with access to the institution's data or systems.

Practical implication: These threat vectors do not require exotic defences. They require well-implemented fundamentals: strong identity and access management, security awareness programmes that go beyond compliance ticking, systematic patching, network segmentation, and continuous monitoring. The organisations that suffer breaches are rarely missing an advanced tool. They are missing consistent execution of basic controls.

05 / Where financial data strategies fail

The failure patterns are consistent, well documented, and entirely avoidable. Most of them are governance failures disguised as technical problems.

After a decade of advising financial institutions on security strategy and architecture, the failure patterns repeat with remarkable consistency. They are not exotic or surprising. They are organisational failures that manifest as security incidents.

  • Strategy without testing

    The strategy document exists, the board has approved it, and nobody has verified whether the controls it describes actually work. The gap between documented controls and implemented controls is often significant. APRA's tripartite assessments consistently find this gap. A strategy that has not been tested is a compliance artefact, not a security capability.

  • Compliance-driven rather than risk-driven

    Organisations that build their strategy around satisfying audit requirements rather than reducing actual risk end up with controls that look good on paper but do not address their most significant threat vectors. CPS 234 is deliberately principles-based precisely because APRA wants entities to think about their own risk profile rather than following a prescriptive checklist.

  • Third-party risk treated as a procurement exercise

    Security questionnaires at contract signing, then no ongoing monitoring. The security posture of a third party can change dramatically during a multi-year contract. Point-in-time assessments create a false sense of assurance that degrades immediately after completion.

  • Board reporting that obscures rather than informs

    Aggregated risk scores, traffic-light dashboards, and compliance percentages that tell the board everything is fine until a breach proves otherwise. Boards need to understand the material risks, the residual risk after controls, and what decisions they are being asked to make. Under FAR, individual accountability means board members need to demonstrate they understood the risks they were governing.

  • Incident response that only exists on paper

    An incident response plan that has never been exercised through a tabletop exercise will fail under the pressure of a real incident. The multi-regulator notification requirements compound this, organisations that have not practised parallel notification workflows will miss critical timelines when it matters most.

  • Security architecture built around perimeter defence

    Legacy security architectures that rely on network perimeter controls are fundamentally misaligned with modern threat vectors. When attackers use valid credentials, operate through legitimate cloud services, or compromise trusted third parties, perimeter defences provide minimal protection. A modern security architecture assumes breach and focuses on detection, containment, and data protection at every layer.

06 / Third-party risk: the expanding attack surface

CPS 230 has transformed third-party risk from a compliance checkbox into a core operational requirement. Most financial institutions are not ready for what this means.

The combination of CPS 234 and CPS 230 creates one of the most demanding third-party risk management frameworks in the Asia-Pacific region. CPS 234 requires assessing the information security capability of third parties managing information assets. CPS 230, effective 1 July 2025, adds detailed operational resilience requirements including identification of critical operations, tolerance setting, and formal service provider management.

What this means in practice:

Requirement What most organisations do What the regulation expects
Due diligence Security questionnaire at onboarding Ongoing capability assessment proportionate to the criticality and sensitivity of the information assets managed
Monitoring Annual vendor review Continuous monitoring with escalation triggers, including right to audit and independent testing
Incident management Contractual notification clause Tested end-to-end incident response workflow that includes third-party breach scenarios
Exit planning Not addressed Documented substitutability assessment and transition plans for material service providers
Fourth-party risk Not addressed Understanding of material subcontractors and their security posture

Building a third-party risk management programme that meets these requirements is a multi-year investment. The organisations that started early have a significant advantage. Those that are starting now need to prioritise by criticality: identify your material service providers first, then build the framework outward.

07 / What a defensible strategy looks like

A financial data security strategy that will stand up to regulatory scrutiny, board challenge, and a real incident has specific characteristics.

The difference between a strategy that works and one that does not is usually not the controls listed in the document. It is whether the organisation treats the strategy as a living capability or a static artefact.

Characteristics of a defensible strategy

Risk-driven, not compliance-driven. The strategy starts with the organisation's actual threat profile and risk appetite, then selects controls proportionate to identified risks. Compliance is a consequence of good security, not the objective. CPS 234 is deliberately principles-based because APRA expects entities to exercise judgement about their own circumstances.

Board-owned, not IT-owned. Information security risk is a business risk. The board sets the risk appetite, receives meaningful reporting on security posture, and makes informed decisions about residual risk. Under FAR, this is not a preference; it is a legal requirement. A virtual CISO can help organisations that lack dedicated senior security leadership bridge this gap.

Tested regularly. Controls are verified through independent testing, not self-assessment. Incident response plans are exercised at least annually. Third-party risk assessments are ongoing, not point-in-time. The testing programme is documented, consistent, and covers all material information assets.

Integrated with the regulatory stack. The strategy explicitly maps controls and activities to regulatory obligations across CPS 234, CPS 230, the Privacy Act, and any sector-specific requirements. Notification workflows are designed to handle concurrent multi-regulator reporting. Evidence collection is structured to satisfy multiple regulatory evidence standards simultaneously.

Maintained as a living capability. The strategy is reviewed and updated when the threat environment changes, when the regulatory landscape changes, when the organisation's risk profile changes (through acquisition, new products, new markets), and after significant incidents. An annual review cycle is the minimum; quarterly updates to the risk assessment are more defensible.

The honest test: If your CISO were hit by a bus tomorrow, could the rest of the organisation execute the strategy? If your most critical third party suffered a breach at 2am on a Saturday, could your team execute the incident response plan without guidance? If APRA sent a letter asking for evidence that your board understood the residual risk it was accepting, could you produce that evidence within a week? If the answer to any of these is no, the strategy needs work.

08 / How Cliffside helps

We help financial institutions build, test, and maintain security strategies that work under real pressure, not just in board presentations.

Our approach starts with the Lighthouse Assessment: a comprehensive, multi-specialist evaluation of your current security posture against CPS 234 requirements, the broader regulatory stack, and your actual threat environment. The output is not a vendor sales pitch disguised as an assessment. It is an honest, evidence-based picture of where you stand and what needs to change.

We will tell you honestly:

  • Where your current strategy has gaps that would be exposed by a regulator, an auditor, or an adversary
  • Whether your controls are commensurate with your threat profile, or whether you are over-investing in some areas and under-investing in others
  • How your third-party risk management stands up against CPS 230 requirements
  • Whether your incident response capability would actually work under pressure
  • What your board reporting should contain and what it should not
  • A prioritised, costed remediation roadmap that aligns security investment to actual risk reduction

If the honest answer is "your existing strategy is sound but your testing programme is inadequate," we will say that. If the honest answer is "this strategy will not survive an APRA inquiry," we will say that too.

Financial data security

Know where
you actually
stand, first.

The Cliffside Lighthouse Assessment gives you an independent, evidence-based picture of your financial data security posture against CPS 234, CPS 230, and your actual threat environment. No vendor theatre. No pre-determined recommendations. Just an honest assessment of where you stand and what needs to change.

What you get from the Lighthouse Assessment
  • Gap analysis against CPS 234, CPS 230, and relevant regulatory obligations
  • Threat-informed assessment of your current security architecture
  • Third-party risk posture evaluation against CPS 230 requirements
  • Prioritised remediation roadmap aligned to actual risk reduction
  • Transferable report, yours to use with any provider