Defence Security Principles Framework (DSPF)
The Defence Security Principles Framework sets out security principles and controls for the Australian Department of Defence and its industry partners. It is a principles-based framework supporting a progressive protective security culture. All Defence personnel, contractors, consultants and outsourced service providers must adhere to the DSPF.
Framework summaries on this platform are AI-assisted interpretations for educational and compliance planning purposes. They do not reproduce or replace the official standards. Refer to the authoritative source for the definitive text. Framework names and trademarks belong to their respective organisations.
Framework Domains (6)
Defence Industry Security
DSPF Principle 16 — Security requirements for Defence industry partners
| Code | Title |
|---|---|
| DSPF-IND-1 | Defence Industry Security Program Membership |
| DSPF-IND-2 | Security Performance Assessment |
| DSPF-IND-3 | Supply Chain Security Risk |
ICT and Cyber Security
Requirements for securing ICT systems and managing cyber risks
| Code | Title |
|---|---|
| DSPF-ICT-1 | ICT Systems Security |
| DSPF-ICT-2 | Security Authorisation |
| DSPF-ICT-3 | Cyber Security Monitoring |
| DSPF-ICT-4 | Cyber Incident Response |
| DSPF-ICT-5 | Supply Chain Cyber Security |
Information Security
VDA ISA information security requirements
| Code | Title |
|---|---|
| 37.1401(a) | General Security Requirements for SEFs |
| 38.1051(a) | General Security Requirements for DCMs |
| 39.18(a) | General Security Requirements for DCOs |
| 49.24(a) | General Security Requirements for SDRs |
| DSPF-INFO-1 | Information Classification |
| DSPF-INFO-2 | Information Handling |
| DSPF-INFO-3 | Information Access Controls |
| DSPF-INFO-4 | Security Markings |
| EIOPA-GL-10 | ICT Operations Security |
| EIOPA-GL-11 | Security Monitoring |
| EIOPA-GL-12 | Information Security Reviews, Assessment and Testing |
| EIOPA-GL-13 | Information Security Training and Awareness |
| EIOPA-GL-6 | Information Security Policy |
| EIOPA-GL-7 | Information Security Function |
| EIOPA-GL-8 | Logical Security |
| EIOPA-GL-9 | Physical Security |
| GLI33-4.1 | Information Security System Assessment |
| GLI33-4.2 | Penetration Testing |
| GLI33-4.3 | Data Protection and Encryption |
| GLI33-4.4 | Audit Trail and Logging |
| PSPF-INFO-1 | Sensitive and Classified Information |
| PSPF-INFO-2 | Security Classification System |
| PSPF-INFO-3 | Information Holdings |
| PSPF-INFO-4 | Information Disposal |
| PSPF-INFO-5 | Information Sharing |
| PSPF-INFO-6 | Security Caveated Information |
| PSPF-INFO-7 | Accountable Material |
| TISAX-IS-01 | ISMS Requirements |
| TISAX-IS-02 | Prototype Protection |
| TISAX-IS-03 | Third-Party Risk Management |
| TSSR-INFO-1 | Network Data Protection |
| TSSR-INFO-2 | Stored Communications Security |
| TSSR-INFO-3 | Lawful Interception Capability |
Personnel Security
Requirements for ensuring personnel suitability and managing insider threats
| Code | Title |
|---|---|
| AEO-PS-1 | Employee Vetting |
| AEO-PS-2 | Security Awareness Training |
| AEO-PS-3 | Access Management |
| CTPAT-PE-1 | Pre-Employment Verification |
| CTPAT-PE-2 | Employee Screening |
| CTPAT-PE-3 | Education and Training |
| DSPF-PERS-1 | Personnel Suitability |
| DSPF-PERS-2 | Security Clearances |
| DSPF-PERS-3 | Ongoing Personnel Assessment |
| DSPF-PERS-4 | Insider Threat Management |
| DSPF-PERS-5 | Security Awareness and Training |
| ISM-0252 | Cyber Security Awareness Training |
| ISM-0414 | System Access Revocation |
| ISM-0434 | Privileged User Access Restriction |
| ISM-1146 | Targeted Cyber Security Training |
| ISM-1175 | Temporary Access |
| ISM-1503 | Separate Privileged Operating Environments |
| ISM-1507 | Privileged Access Limitation |
| ISM-1508 | Privileged Access Review |
| PSPF-PERS-1 | Eligibility and Suitability |
| PSPF-PERS-2 | Security Clearances |
| PSPF-PERS-3 | Ongoing Suitability |
| PSPF-PERS-4 | Separation and Transfer |
Physical Security
Requirements for physical protection of Defence facilities, information and assets
| Code | Title |
|---|---|
| DSPF-PHYS-1 | Physical Security Management |
| DSPF-PHYS-2 | Facility Security Zones |
| DSPF-PHYS-3 | Physical Access Controls |
| DSPF-PHYS-4 | Security Equipment |
| DSPF-PHYS-5 | Visitor Management |
| PSPF-PHYS-1 | Physical Security Management |
| PSPF-PHYS-2 | Facility Security Zones |
| PSPF-PHYS-3 | Physical Access Controls |
| PSPF-PHYS-4 | Physical Security of ICT |
| SEMD-PS-1 | Critical Infrastructure Protection |
| SEMD-PS-2 | Site Security Measures |
| SEMD-PS-3 | Supply Chain Security |
Security Governance
Governance principles covering security accountability, culture, risk management, planning, assurance, and incident response
| Code | Title |
|---|---|
| DSPF-GOV-1 | Security Culture |
| DSPF-GOV-2 | Security Risk Management |
| DSPF-GOV-3 | Security Planning |
| DSPF-GOV-4 | Security Assurance |
| DSPF-GOV-5 | Security Investigations and Reporting |
| DSPF-GOV-6 | Security Accountability |
| PSPF-GOV-1 | Role of the Accountable Authority |
| PSPF-GOV-10 | Non-Compliance Mitigation |
| PSPF-GOV-2 | Management Structures and Responsibilities |
| PSPF-GOV-3 | Security Planning and Risk Management |
| PSPF-GOV-4 | Security Maturity Monitoring |
| PSPF-GOV-5 | Reporting on Security |
| PSPF-GOV-6 | Security Risk Management for Procurement |
| PSPF-GOV-7 | International Arrangements |
| PSPF-GOV-8 | Foreign Interference and Espionage |
| PSPF-GOV-9 | Business Continuity |
Maps to 640 other frameworks
Frequently Asked Questions
What is Defence Security Principles Framework (DSPF)?
Defence Security Principles Framework (DSPF) is a compliance framework from Australia with 6 domains and 92 controls. The Defence Security Principles Framework sets out security principles and controls for the Australian Department of Defence and its industry partners. It is a principles-based framework supporting a progressive protective security culture. All Defence personnel, contractors, consultants and outsourced service providers must adhere to the DSPF. It is used by organisations to establish and maintain compliance with industry standards and regulatory requirements.
How many controls does Defence Security Principles Framework (DSPF) have?
Defence Security Principles Framework (DSPF) has 92 controls organised across 6 domains. The largest domains are Information Security (33 controls), Personnel Security (23 controls), Security Governance (16 controls). Each control defines specific requirements that organisations must implement to achieve compliance.
What frameworks does Defence Security Principles Framework (DSPF) map to?
Defence Security Principles Framework (DSPF) maps to 640 other compliance frameworks. The top mapping partners are TISAX — Trusted Information Security Assessment Exchange (42% coverage), Protective Security Policy Framework (PSPF) Release 2024 (40% coverage), NIST SP 800-171A Rev 3 — Assessing CUI Security Requirements (39% coverage). Use our comparison tool to explore control-level mappings between frameworks.
How do I get started with Defence Security Principles Framework (DSPF) compliance?
Start your Defence Security Principles Framework (DSPF) compliance journey by running a self-assessment on our platform to identify your current compliance posture. Our AI advisory can answer specific questions about Defence Security Principles Framework (DSPF) requirements, and cross-framework mapping helps you leverage existing controls from other frameworks you may already comply with. Create a free account to access all 92 controls and track your progress.
Start Your Compliance Journey
Create a free account to run self-assessments, get AI advisory, and track your compliance progress across 692 frameworks.
Get Started Free →Free forever — no credit card required