Web Content Filtering Policy

Owner: Chief Security Officer Applies to: All Staff & Contractors
Contents
  1. Purpose
  2. Scope
  3. Policy Authority and Ownership
  4. Regulatory and Framework Alignment
  5. Web Content Filtering Controls
  6. Acceptable Use of Internet Access
  7. Monitoring, Logging, and Audit
  8. Exception Management
  9. Policy Violations and Incident Reporting
  10. Training and Awareness
  11. Policy Review and Maintenance
01 Purpose

This Web Content Filtering Policy establishes the requirements and controls governing access to internet-based content from Elexon Group's corporate ICT environment. It supports compliance with the Australian Signals Directorate (ASD) Essential Eight at Maturity Level 2 (ML2) and the Defence Industry Security Program (DISP) Entry Level membership requirements under DSPF Principle 16, Control 16.1.

This policy is intended to:

02 Scope

This policy applies to:

This policy does not apply to personal devices used solely for personal purposes and not connected to the corporate network, unless such devices are used to access corporate resources or Defence-related information.
03 Policy Authority and Ownership
RoleResponsibility
Chief Security Officer (CSO)Policy owner; accountable for approval, review, and compliance reporting to DISP.
Security Officer (SO)Day-to-day management, exception handling, and evidence maintenance.
IT Manager / MSSPTechnical implementation, monitoring, and reporting of web content filtering controls.
All StaffCompliance with this policy; reporting of suspected policy violations or security incidents.
04 Regulatory and Framework Alignment
Framework / ControlReferenceRelevance to This Policy
ASD Essential Eight ML2User Application HardeningBrowser hardening; blocking Java, ads, and malicious content
ASD ISMISM-1485, ISM-1486, ISM-1412Specific controls for web browser configuration and content filtering
DISP Entry LevelDSPF Principle 16, Control 16.1Mandatory cyber security requirements for DISP membership
ACSC GuidanceStrategies to Mitigate Cyber Security IncidentsBaseline mitigation strategies informing browser and web controls
Privacy Act 1988 (Cth)Australian Privacy PrinciplesGoverns monitoring and logging of user web activity
05 Web Content Filtering Controls

The following controls must be implemented and maintained on all in-scope systems. These controls reflect the minimum requirements for ASD Essential Eight ML2 (User Application Hardening) and must be documented with supporting technical evidence for DISP assurance activities.

5.1 Browser Hardening Requirements

In accordance with ISM-1412, all web browsers deployed on corporate workstations must be hardened using ASD and vendor hardening guidance. Where ASD and vendor guidance conflict, the most restrictive requirement takes precedence.

Mandatory browser hardening controls include:

5.2 Blocking of Java from the Internet

In accordance with ISM-1486, web browsers must not process Java content originating from the internet. This control applies to all browser-based Java plugins and applets. Specifically:

5.3 Blocking of Web Advertisements

In accordance with ISM-1485, web browsers must not process web advertisements from the internet. Advertising content represents a significant vector for malvertising attacks and drive-by downloads. Required controls include:

5.4 Web Content Category Filtering

A web content filtering solution (proxy, DNS filtering, or Secure Web Gateway) must be deployed to enforce category-based access controls. The following categories must be blocked by default for all users:

Blocked CategoryRationale
Malware / Phishing / Command & ControlDirect threat to organisational security and Defence-related information
Hacking / Exploit ToolsProhibited activity; significant security risk
Anonymisers / Proxy Bypass ToolsCircumvention of security controls; policy violation
Illegal / Criminal ActivityLegal obligation and DISP security requirement
Adult / Explicit ContentInappropriate for workplace; potential legal liability
GamblingNon-business use; potential legal liability
Peer-to-Peer / TorrentingData exfiltration risk; intellectual property concerns
Newly Registered / Uncategorised DomainsHigh-risk category frequently associated with malicious activity
Unauthorised Cloud Storage / File SharingData exfiltration and information handling risk
Personal Email Services (where not approved)Potential for data exfiltration and bypassing email controls

The following categories are permitted by default, subject to business justification and this policy's acceptable use requirements:

5.5 HTTPS Inspection

Where technically feasible and proportionate to the organisation's risk profile, SSL/TLS inspection (HTTPS decryption) should be implemented on the web proxy or Secure Web Gateway to:

Where HTTPS inspection is implemented, users must be notified via an acceptable use notice or privacy notice consistent with applicable obligations under the Privacy Act 1988 (Cth). Inspection must not apply to personal banking, health services, or other sensitive categories, and appropriate exclusions must be documented and approved by the CSO.
5.6 DNS-Layer Filtering

DNS-layer filtering must be implemented as a defence-in-depth control. All DNS queries from corporate endpoints must be routed through an organisation-controlled or approved DNS filtering service. This must:

Use of public or alternative DNS resolvers (e.g., 8.8.8.8) must be restricted on corporate endpoints, unless specifically approved and documented.

06 Acceptable Use of Internet Access

Internet access is provided for business purposes. Limited, reasonable personal use is permitted during lunch breaks and outside business hours, provided it does not:

Users must not attempt to circumvent web content filtering controls, including through the use of VPNs, proxy services, Tor, or other anonymisation tools not approved by the organisation.
07 Monitoring, Logging, and Audit

To satisfy ASD Essential Eight ML2 requirements and support DISP assurance activities, the following monitoring and logging controls must be implemented:

Users are advised that web activity conducted on corporate systems and networks is monitored and logged. This monitoring is conducted for security, compliance, and operational purposes and is consistent with the organisation's privacy notice and applicable law.
08 Exception Management

Where a business requirement exists to access content or websites that would otherwise be blocked by this policy, an exception may be requested through the following process:

StepActionDetail
1Request SubmissionUser or manager submits a written exception request to the SO, detailing the business justification, specific URL/domain/category, required duration, and risk acknowledgement.
2Risk AssessmentSO assesses the security risk of granting the exception, including threat intelligence checks on the requested domain.
3ApprovalCSO (or delegate) approves or rejects the exception. Exceptions involving Defence-related activities require CSO approval.
4ImplementationIT Manager implements approved exceptions in the filtering system, scoped to the minimum required users, duration, and scope.
5RecordingAll exceptions must be recorded in the Web Content Filtering Exception Register, including approval details, duration, and periodic review dates.
6Periodic ReviewExceptions are reviewed quarterly by the SO. Expired or unjustified exceptions must be revoked promptly.
Emergency exceptions required to support an active security incident response may be implemented immediately by the IT Manager and must be documented within 24 hours of implementation.
09 Policy Violations and Incident Reporting

Violations of this policy — including attempts to circumvent web filtering controls — may result in disciplinary action in accordance with the organisation's Human Resources policies and Code of Conduct. Serious violations may be referred to relevant authorities.

Any user who becomes aware of a suspected security incident attributable to web-based content (including malware downloads, phishing attempts, or data exfiltration) must report it immediately to the SO in accordance with the organisation's Incident Response Plan. Incidents involving Defence-related information must also be reported to the ASD and to DISP as required under DSPF obligations.

10 Training and Awareness

All staff must receive security awareness training that covers:

Training must be conducted upon induction and at least annually thereafter. Completion records must be maintained as evidence for DISP assurance activities.

11 Policy Review and Maintenance

This policy must be reviewed at least annually by the CSO and SO, and also reviewed following:

Review outcomes must be documented, and any required changes must be actioned within a timeframe agreed with the CSO. The policy version history must be maintained.