Artifact GuideAPAC

Australia Cyber Security Act 2024 Cyber Security Act vs UK PSTI Act

A detailed product security comparison of the Australia Cyber Security Act 2024 and the UK PSTI Act for manufacturers and suppliers of connectable products.

Both regimes target the same three baseline controls (passwords, vulnerability disclosure, and support periods) but differ in scope exclusions, enforcement mechanisms, statement of compliance requirements, and civil penalty structures.

Author
Sorena AI
Published
Mar 4, 2026
Updated
Mar 4, 2026
Sections
12

Structured answer sets in this page tree.

Primary sources
5

Cited legal and guidance references.

Publication metadata
Sorena AI
Published Mar 4, 2026
Updated Mar 4, 2026
Overview

The Australia Cyber Security Act 2024 and the UK PSTI Act both establish mandatory product security baselines for consumer connectable products. Both regimes share a common origin in the ETSI EN 303 645 standard and require manufacturers to address the same three core controls: eliminating weak default passwords, publishing a vulnerability disclosure route, and declaring a defined support period. However, the Australia Cyber Security Act 2024 and the UK PSTI Act differ in important ways. They have different product scope exclusions, different enforcement escalation paths, different statement of compliance requirements, and different penalty structures. This product security comparison page explains exactly where the Australia Cyber Security Act 2024 and the UK PSTI Act overlap, where they diverge, and how manufacturers and suppliers can build one product security baseline that satisfies both markets with minimal rework.

Section 1

Shared ETSI EN 303 645 foundation for the Australia Cyber Security Act 2024 and the UK PSTI Act

Both the Australia Cyber Security Act 2024 and the UK PSTI Act derive their technical security requirements from the first three provisions of the ETSI EN 303 645 standard (Cyber Security for Consumer Internet of Things: Baseline Requirements). The Australian Government Explanatory Statement confirms that Schedule 1, Part 1 of the Cyber Security (Security Standards for Smart Devices) Rules 2025 closely follows the Product Security and Telecommunications Infrastructure (Security Requirements for Relevant Connectable Products) Regulations 2023 (UK). This shared origin is the most important fact in any product security comparison of the Australia Cyber Security Act 2024 and the UK PSTI Act.

The three mandated ETSI EN 303 645 provisions are Provision 5.1 (no universal default passwords), Provision 5.2 (implement a means to manage reports of security vulnerabilities), and Provision 5.3 (keep software updated with a defined support period). UK modelling found that implementing these three provisions could reduce the probability of attacks on consumer smart devices by between 20 and 70 per cent. The Australian Signals Directorate confirmed these are also the highest priority technical controls for the Australian market.

Product teams that already comply with the UK PSTI Act will find that most of their engineering controls transfer directly to the Australia Cyber Security Act 2024 product security comparison. The practical strategy is to build one shared evidence pack covering product design, testing, vulnerability handling, and update support, then add separate compliance documentation for each market.

  • Both the Australia Cyber Security Act 2024 and UK PSTI Act mandate ETSI EN 303 645 Provision 5.1: no universal default passwords.
  • Both regimes mandate ETSI EN 303 645 Provision 5.2: a published vulnerability disclosure policy with contact channels and response commitments.
  • Both regimes mandate ETSI EN 303 645 Provision 5.3: defined support periods for security updates with a fixed end date.
  • The Australian Explanatory Statement confirms the Smart Devices Rules 2025 closely follow the UK PSTI Regulations 2023.
  • UK modelling estimated a 20 to 70 per cent reduction in smart device attack probability from these three controls.
  • The Australian Signals Directorate confirmed the same three ETSI EN 303 645 provisions are the highest priority technical controls.
Section 2

Product scope: what the Australia Cyber Security Act 2024 and the UK PSTI Act each cover

Both the Australia Cyber Security Act 2024 and the UK PSTI Act apply to products that can connect directly or indirectly to the internet. The Australia Cyber Security Act 2024 defines these as relevant connectable products and splits them into two categories. Internet-connectable products are products capable of connecting to the internet using a communication protocol that forms part of the internet protocol suite to send and receive data over the internet (Section 13(4) of the Act). Network-connectable products are products capable of both sending and receiving data by means of electrical or electromagnetic energy that are not internet-connectable products but that can connect directly to an internet-connectable product via an internet protocol or can connect directly to two or more products at the same time via a non-internet protocol and also to an internet-connectable product (Section 13(5) to (7) of the Act). The UK PSTI Act uses materially similar definitions for its two categories of connectable products.

The Australia Cyber Security Act 2024 security standard applies specifically to consumer grade relevant connectable products. Under Section 8 of the Cyber Security (Security Standards for Smart Devices) Rules 2025, a consumer grade product is one that is intended by the manufacturer to be used, or is of a kind likely to be used, for personal, domestic or household use or consumption, and that is acquired in Australia by a consumer. The term consumer is defined by reference to section 3 of the Australian Consumer Law.

The product security comparison of the Australia Cyber Security Act 2024 and the UK PSTI Act becomes critical at the exclusion list. The Australia Cyber Security Act 2024 Rules exclude desktop computers, laptops, tablet computers, smartphones, therapeutic goods (under the Therapeutic Goods Act 1989), road vehicles, and road vehicle components (under the Road Vehicle Standards Act 2018). The UK PSTI Act has its own set of exceptions under the 2023 Regulations. Manufacturers must check both exclusion lists independently because a product excluded from the Australia Cyber Security Act 2024 may still be in scope for the UK PSTI Act, and the reverse. Consumer energy resources such as solar inverters and connected batteries are within scope of the Australia Cyber Security Act 2024, and the Australian Government found that all major CER original equipment manufacturers examined also supplied products to the UK market.

  • The Australia Cyber Security Act 2024 applies to relevant connectable products that are internet-connectable or network-connectable, manufactured or supplied (not second hand) on or after commencement of Part 2.
  • The Australia Cyber Security Act 2024 consumer grade security standard excludes desktops, laptops, tablets, smartphones, therapeutic goods, road vehicles, and road vehicle components.
  • The UK PSTI Act covers relevant connectable products in the UK market with its own separate exclusion list under the 2023 Regulations.
  • Consumer energy resources (solar inverters, batteries) are within scope of the Australia Cyber Security Act 2024.
  • Smart meters are outside scope in Australia because they are not acquired by consumers but supplied and installed by electricity retailers.
  • Manufacturers must maintain a product inventory that tags each SKU for Australia Cyber Security Act 2024 scope and UK PSTI Act scope independently.
Section 3

Password security requirements under the Australia Cyber Security Act 2024 vs UK PSTI Act

Password security is the first shared requirement under both the Australia Cyber Security Act 2024 and the UK PSTI Act. Both regimes require that passwords for consumer smart devices must be either unique per product or defined by the user. Neither regime permits universal or factory default passwords that are the same across all units of a product model.

Under the Australia Cyber Security Act 2024, Schedule 1 Clause 2 of the Smart Devices Rules 2025 specifies that passwords must be unique per product or user-defined. Passwords that are unique per product must not be based on incremental counters (such as password1 and password2), must not be based on or derived from publicly available information, must not be based on or derived from unique product identifiers (such as serial numbers) unless encrypted or hashed using an encryption method or keyed hashing algorithm that is accepted as part of good industry practice, and must not be otherwise guessable in a manner unacceptable under good industry practice. The Rules define specific terms: a keyed hashing algorithm means an algorithm that uses a data input and a secret key to produce a value which cannot be guessed or reproduced without knowledge of both. Good industry practice means the exercise of that degree of skill, diligence, prudence and foresight which would reasonably and ordinarily be expected from a skilled and experienced cryptographer engaged in the same type of activity.

The password requirements under the Australia Cyber Security Act 2024 apply to passwords for hardware of the product when the product is not in factory default state, software that is preinstalled on the product at the point of consumer supply when the product is not in factory default state, and software that must be installed for all of the manufacturer's intended purposes. The UK PSTI Act Regulations 2023 contain equivalent requirements covering the same product and software categories. One password implementation can satisfy both the Australia Cyber Security Act 2024 and the UK PSTI Act simultaneously.

  • Both the Australia Cyber Security Act 2024 and the UK PSTI Act prohibit universal default passwords across product units.
  • Passwords must be unique per product or defined by the user under both product security frameworks.
  • Unique-per-product passwords must not be based on incremental counters (e.g., password1, password2) under the Australia Cyber Security Act 2024.
  • Passwords must not be derived from publicly available information or unencrypted product identifiers under the Australia Cyber Security Act 2024.
  • The Australia Cyber Security Act 2024 defines good industry practice by reference to the skill expected of an experienced cryptographer.
  • One password implementation designed for the UK PSTI Act will satisfy the Australia Cyber Security Act 2024.
Recommended next step

Use Australia Cyber Security Act 2024 Cyber Security Act vs UK PSTI Act as a cited research workflow

Research Copilot can take Australia Cyber Security Act 2024 Cyber Security Act vs UK PSTI Act from how this topic compares with adjacent regulations or standards to a reusable workflow inside Sorena. Teams working on Australia Cyber Security Act 2024 can keep owners, evidence, and next steps aligned without copying this guide into separate documents.

Section 4

Vulnerability disclosure requirements in the Australia Cyber Security Act 2024 vs UK PSTI Act

Both the Australia Cyber Security Act 2024 and the UK PSTI Act require manufacturers to publish a vulnerability disclosure policy that tells security researchers and members of the public how to report security issues. This is the second shared ETSI EN 303 645 control in the product security comparison.

Under the Australia Cyber Security Act 2024, Schedule 1 Clause 3 of the Smart Devices Rules 2025 requires the manufacturer to publish at least one point of contact for reporting security issues, and to state when a person who makes such a report will receive an acknowledgement of the receipt of the report and status updates until the resolution of the reported security issues. The vulnerability disclosure obligation covers hardware of the product, software that is preinstalled at the point of consumer supply, software that must be installed for all of the manufacturer's intended purposes, and software used for or in connection with any of the manufacturer's intended purposes of the product.

The published vulnerability disclosure information under the Australia Cyber Security Act 2024 must be accessible, clear and transparent. It must be made available to a person without prior request, in English, free of charge, and without requesting personal information about the person. The UK PSTI Act contains equivalent vulnerability reporting requirements. For manufacturers already compliant with the UK PSTI Act, the same vulnerability disclosure policy, contact channels, and acknowledgement workflows will satisfy the Australia Cyber Security Act 2024 requirements.

  • Both the Australia Cyber Security Act 2024 and the UK PSTI Act require at least one published point of contact for security vulnerability reports.
  • Manufacturers must acknowledge receipt and provide status updates until resolution under both product security frameworks.
  • Vulnerability reporting information must be free, accessible, and available without requiring personal data under the Australia Cyber Security Act 2024.
  • Published information must be in English and accessible without prior request under the Australian Smart Devices Rules 2025.
  • Coverage extends to hardware, preinstalled software, installable software, and connected software under the Australia Cyber Security Act 2024.
  • The same vulnerability disclosure policy satisfies both the Australia Cyber Security Act 2024 and the UK PSTI Act.
Section 5

Support period and security update obligations under the Australia Cyber Security Act 2024 vs UK PSTI Act

Both the Australia Cyber Security Act 2024 and the UK PSTI Act require manufacturers to publish a defined support period for security updates. Under the Australia Cyber Security Act 2024, Schedule 1 Clause 4 of the Smart Devices Rules 2025 defines a security update as a software update that protects or enhances the security of the product, including a software update that addresses a security issue which has been discovered by or reported to the manufacturer. The defined support period is the period, expressed as a period of time with an end date, for which security updates will be provided by or on behalf of the manufacturer.

The Australia Cyber Security Act 2024 imposes specific rules on the defined support period. The manufacturer must not shorten the defined support period after it is published. If the manufacturer extends the defined support period, the new period must be published as soon as practicable. The defined support period information must be accessible, clear and transparent. It must be made available to a person without prior request, in English, free of charge, without requesting personal information, and in such a way that is understandable by a reader without prior technical knowledge.

If the manufacturer offers to supply the product on its website or another website under its control, the Australia Cyber Security Act 2024 requires that the defined support period information must be prominently published with the other information intended to inform consumers' decisions to acquire the product. For each instance on the website where the main characteristics of the product are published, the support period must be published alongside or otherwise given equal prominence to the publication of the main characteristics. The UK PSTI Act contains comparable requirements for defined support period publication. One support period publication can serve both the Australia Cyber Security Act 2024 and the UK PSTI Act.

  • Both the Australia Cyber Security Act 2024 and the UK PSTI Act require a defined support period expressed as a time period with a fixed end date.
  • The defined support period must not be shortened once published but may be extended under both product security frameworks.
  • If extended, the new defined support period must be published as soon as practicable under the Australia Cyber Security Act 2024.
  • Support period information must be prominently displayed alongside product characteristics on manufacturer websites under the Australia Cyber Security Act 2024.
  • Information must be free, in English, and understandable without technical knowledge under the Australian Smart Devices Rules 2025.
  • Security updates are defined as software updates that protect or enhance product security under the Australia Cyber Security Act 2024.
Section 6

Statement of compliance: how the Australia Cyber Security Act 2024 differs from the UK PSTI Act

The statement of compliance is where the product security comparison shows the most significant procedural difference between the Australia Cyber Security Act 2024 and the UK PSTI Act. Section 16 of the Australia Cyber Security Act 2024 requires manufacturers to provide a statement of compliance for every in-scope product supplied in Australia, and requires suppliers to supply each product accompanied by that statement. Both manufacturers and suppliers must retain a copy of the statement of compliance for the period specified in the Rules.

Under Section 9 of the Cyber Security (Security Standards for Smart Devices) Rules 2025, the statement of compliance must be prepared by or on behalf of the manufacturer. It must include the product type and batch identifier, the name and address of the manufacturer, the name and address of an authorised representative of the manufacturer, the names and addresses of any other authorised representatives of the manufacturer that are in Australia, a declaration that the statement was prepared by or on behalf of the manufacturer, a declaration that in the opinion of the manufacturer the product was manufactured in compliance with the requirements of the security standard and the manufacturer has complied with any other obligations relating to the product in the security standard, the defined support period for the product at the date the statement of compliance is issued, the signature and name and function of the signatory of the manufacturer, and the place and date of issue of the statement of compliance.

The retention period for the statement of compliance is 5 years under Section 10 of the Rules. This applies to both manufacturers (who must retain the statement they prepared) and suppliers (who must retain a copy of the statement that accompanied the product). The UK PSTI Act requires compliance documentation under its own regime, but the specific fields, format, and retention period differ. The Australian Government Explanatory Statement confirms that products supplied to the UK market under the UK PSTI Regulations 2023 can reuse the same information for the Australian statement of compliance as long as all Australian requirements are met.

  • The Australia Cyber Security Act 2024 requires a statement of compliance with prescribed fields including product type, batch identifier, manufacturer details, authorised representative details, compliance declarations, defined support period, signatory details, and date and place of issue.
  • Under the Australia Cyber Security Act 2024, manufacturers must retain the statement of compliance for 5 years.
  • Under the Australia Cyber Security Act 2024, suppliers must also retain a copy of the statement of compliance for 5 years.
  • The statement of compliance must be prepared by or on behalf of the manufacturer under Section 9 of the Smart Devices Rules 2025.
  • Products already compliant with the UK PSTI Act can reuse the same information for the Australian statement if all Australian requirements are met.
  • The UK PSTI Act has its own compliance documentation requirements with different prescribed fields.
Section 7

Enforcement escalation: compliance notice, stop notice, and recall notice under the Australia Cyber Security Act 2024

The Australia Cyber Security Act 2024 establishes a three-step enforcement escalation path for product security in Part 2, Division 3 of the Act. This enforcement model differs from the UK PSTI Act enforcement regime and is an important part of this product security comparison.

The first step is a compliance notice under Section 17 of the Australia Cyber Security Act 2024. The Secretary of the Department of Home Affairs may issue a compliance notice if the Secretary is reasonably satisfied that an entity is not complying with its obligations under Section 15 (compliance with the security standard) or Section 16 (statement of compliance), or if the Secretary is aware of information that suggests the entity may not be complying. The compliance notice must set out the name of the entity, brief details of the non-compliance or possible non-compliance, specify action within the entity's control that the entity must take, specify a reasonable period for taking that action, and explain what may happen if the entity does not comply. Before issuing the compliance notice, the Secretary must notify the entity and give the entity at least 10 days to make representations.

The second step is a stop notice under Section 18 of the Australia Cyber Security Act 2024. The Secretary may issue a stop notice if the entity has already been given a compliance notice and has not complied with it, or if the actions taken to address the non-compliance are inadequate. The stop notice can require the entity to take or refrain from taking specific actions within a reasonable period. The third step is a recall notice under Section 19 of the Australia Cyber Security Act 2024. The Secretary may issue a recall notice if the entity has already been given a stop notice and has not complied with it. The recall notice can require the entity to ensure the product is not acquired in Australia, ensure the product is not supplied to suppliers for supply in Australia, and arrange for the return of the product within a specified reasonable period. If the entity fails to comply with the recall notice, the Minister may publish the entity's identity, product details, non-compliance details, and the risks posed by the product under Section 20 of the Australia Cyber Security Act 2024.

The UK PSTI Act is enforced by the Office for Product Safety and Standards (OPSS) and also uses compliance notices, stop notices, and recall notices. Under the Australia Cyber Security Act 2024, entities may apply for internal review of a decision to issue any notice within 30 days after the notice was given (Section 22). The decision-maker must review the decision and affirm, vary, or revoke it within 30 days of the application.

  • Australia Cyber Security Act 2024 enforcement Step 1: Compliance notice under Section 17 requiring the entity to address the non-compliance within a specified period, with at least 10 days to make representations before issuance.
  • Australia Cyber Security Act 2024 enforcement Step 2: Stop notice under Section 18 if the compliance notice was not followed or the response was inadequate.
  • Australia Cyber Security Act 2024 enforcement Step 3: Recall notice under Section 19 requiring the entity to stop supply and arrange product returns.
  • Failure to comply with a recall notice may result in public notification by the Minister under Section 20, including the entity's identity and product details.
  • The UK PSTI Act enforcement is administered by the Office for Product Safety and Standards (OPSS).
  • Under the Australia Cyber Security Act 2024, entities may apply for internal review of a notice decision within 30 days.
Section 8

Civil penalties and regulatory powers: Australia Cyber Security Act 2024 vs UK PSTI Act

The Australia Cyber Security Act 2024 uses the Regulatory Powers (Standard Provisions) Act 2014 as its penalty and enforcement framework. Under Part 6 of the Australia Cyber Security Act 2024, each civil penalty provision is subject to monitoring powers (Part 2 of the Regulatory Powers Act), investigation powers (Part 3), civil penalty orders from a relevant court (Part 4), infringement notices (Part 5), enforceable undertakings (Part 6), and injunctions (Part 7). Sections 15 and 16 of the Australia Cyber Security Act 2024, which contain the core product security obligations (security standard compliance and statement of compliance), are specifically subject to monitoring and enforceable undertakings.

The Secretary of the Department of Home Affairs may also engage an appropriately qualified and experienced expert to carry out an independent examination of any product to determine whether it complies with the security standard and whether the statement of compliance meets the requirements (Section 23 of the Australia Cyber Security Act 2024). The expert may open product packaging, operate the product, test or analyse the product using electronic equipment, read records or documents contained in the product, and take photographs or video recordings. An entity is entitled to reasonable compensation from the Commonwealth for complying with such a request.

The UK PSTI Act empowers OPSS to impose financial penalties of up to GBP 10 million or 4% of qualifying worldwide revenue, whichever is greater, for each compliance failure. The UK PSTI Act also allows daily penalties of up to GBP 20,000 for ongoing non-compliance. In this product security comparison, the UK PSTI Act penalty structure is more explicitly quantified with specific maximum amounts, while the Australia Cyber Security Act 2024 relies on the general civil penalty regime of the Regulatory Powers Act, which calculates maximum penalties based on penalty units.

  • The Australia Cyber Security Act 2024 applies civil penalty orders, infringement notices, enforceable undertakings, and injunctions through the Regulatory Powers (Standard Provisions) Act 2014.
  • The Australia Cyber Security Act 2024 authorises the Secretary to commission independent product examinations by qualified experts under Section 23.
  • Independent examiners under the Australia Cyber Security Act 2024 may open, operate, test, analyse, and photograph products.
  • The UK PSTI Act allows financial penalties of up to GBP 10 million or 4% of qualifying worldwide revenue per compliance failure.
  • The UK PSTI Act also allows daily penalties of up to GBP 20,000 for ongoing non-compliance.
  • Both the Australia Cyber Security Act 2024 and the UK PSTI Act have meaningful penalty exposure, but the calculation methodology differs.
Section 9

Timeline comparison: when the Australia Cyber Security Act 2024 and the UK PSTI Act each apply

The timeline differences in this product security comparison are critical for planning. The UK PSTI Act security requirements have been in force since 29 April 2024. Any manufacturer or supplier placing relevant connectable products on the UK market must already comply with the UK PSTI Act.

The Australia Cyber Security Act 2024 received Royal Assent on 29 November 2024. Part 1 (preliminary provisions and definitions) commenced on 30 November 2024. Part 2 (security standards for smart devices) commenced on 29 November 2025. The substantive security standard is in the Cyber Security (Security Standards for Smart Devices) Rules 2025, which were registered on 4 March 2025 with a 12 month transition period. Part 2 of the Rules and Schedule 1, which contains the actual password, vulnerability disclosure, and defined support period requirements, commenced on 4 March 2026. Part 3 (ransomware reporting obligations) commenced on 29 May 2025. Part 4 (coordination of significant cyber security incidents) commenced on 30 November 2024. Part 5 (Cyber Incident Review Board) commenced on 29 May 2025. Parts 6 and 7 (regulatory powers and miscellaneous) commenced on 30 November 2024.

This means that as of 4 March 2026, both the Australia Cyber Security Act 2024 and the UK PSTI Act are actively enforceable for their respective markets. Manufacturers that already comply with the UK PSTI Act should have most of the technical controls in place for the Australia Cyber Security Act 2024 and need to focus on the statement of compliance documentation, product scope analysis against the Australian exclusion list, and assessment of whether the broader business triggers ransomware reporting obligations under Part 3 of the Australia Cyber Security Act 2024.

  • UK PSTI Act: security requirements in force since 29 April 2024.
  • Australia Cyber Security Act 2024: Royal Assent 29 November 2024, Part 1 commenced 30 November 2024.
  • Australia Cyber Security Act 2024: Part 2 (security standards for smart devices) commenced 29 November 2025.
  • Australia Cyber Security Act 2024: Security Standards Rules registered 4 March 2025, Schedule 1 security standard commenced 4 March 2026.
  • Australia Cyber Security Act 2024: Ransomware reporting obligations (Part 3) commenced 29 May 2025.
  • Both the Australia Cyber Security Act 2024 and the UK PSTI Act are now actively enforceable in their respective markets.
Section 10

Broader statutory context: ransomware reporting under the Australia Cyber Security Act 2024

An important dimension of this product security comparison that does not exist in the UK PSTI Act is the ransomware reporting obligation in Part 3 of the Australia Cyber Security Act 2024. While the product security controls in Part 2 of the Australia Cyber Security Act 2024 apply to manufacturers and suppliers of consumer connectable products, Part 3 introduces separate reporting duties for any reporting business entity that makes a ransomware payment in connection with a cyber security incident.

Under Section 26 of the Australia Cyber Security Act 2024, a reporting business entity is an entity carrying on a business in Australia with an annual turnover for the previous financial year that exceeds the prescribed threshold, that is not a Commonwealth body or State body, and that is not a responsible entity for a critical infrastructure asset. Alternatively, an entity that is a responsible entity for a critical infrastructure asset to which Part 2B of the Security of Critical Infrastructure Act 2018 applies is also a reporting business entity under the Australia Cyber Security Act 2024. If a reporting business entity provides or is aware that another entity has provided a ransomware payment to an extorting entity in connection with a cyber security incident, the entity must report the payment under Section 27 of the Australia Cyber Security Act 2024. Failure to report carries a civil penalty of 60 penalty units.

Information in ransomware payment reports is protected under the Australia Cyber Security Act 2024. Ransomware payment reports may only be used or disclosed for permitted cyber security purposes (Section 29). Certain information is not admissible in evidence in proceedings against the reporting business entity (Section 32). This protection is designed to encourage reporting without exposing entities to additional legal risk. The UK PSTI Act does not contain any ransomware reporting obligation. Manufacturers entering the Australian market should assess whether their broader business, beyond product security, is captured by the ransomware reporting obligations of the Australia Cyber Security Act 2024.

  • The Australia Cyber Security Act 2024 Part 3 requires reporting business entities to report ransomware payments, with a civil penalty of 60 penalty units for non-compliance.
  • The UK PSTI Act does not contain any ransomware reporting obligation.
  • A reporting business entity under the Australia Cyber Security Act 2024 includes businesses carrying on a business in Australia with annual turnover above the prescribed threshold.
  • Responsible entities for critical infrastructure assets under Part 2B of the Security of Critical Infrastructure Act 2018 are also reporting business entities.
  • Information in ransomware payment reports is protected and may only be used for permitted cyber security purposes under the Australia Cyber Security Act 2024.
  • Manufacturers entering Australia should assess whether their business, beyond product security, is captured by the ransomware reporting obligations of the Australia Cyber Security Act 2024.
Section 11

Cross-market dual compliance strategy for the Australia Cyber Security Act 2024 and the UK PSTI Act

Because the Australia Cyber Security Act 2024 and the UK PSTI Act both derive their core controls from ETSI EN 303 645, manufacturers can build one product security baseline that satisfies the technical requirements of both regimes. The practical dual compliance strategy has three layers: a shared engineering baseline, an Australia Cyber Security Act 2024 compliance wrapper, and a UK PSTI Act compliance wrapper.

The shared engineering baseline should implement the three mandated controls. For password security, implement unique-per-product passwords or user-defined passwords and document the generation method, including the encryption or keyed hashing algorithm used. For vulnerability disclosure, publish a contact point, acknowledgement timeline, and status update commitment on the manufacturer's website in English, free of charge. For support period transparency, publish the defined support period with an end date alongside product characteristics on the manufacturer's website with equal prominence. Retain all design evidence, test reports, and published content centrally in one evidence repository.

The Australia Cyber Security Act 2024 compliance wrapper should include the formal statement of compliance with all prescribed fields from Section 9 of the Smart Devices Rules 2025 (product type, batch identifier, manufacturer name and address, authorised representative details, compliance declarations, defined support period, signatory details, date and place of issue). Both the manufacturer and any supplier must retain the statement of compliance for 5 years. The wrapper should also include a regulatory response plan that addresses the compliance notice, stop notice, and recall notice escalation path under the Australia Cyber Security Act 2024, and an assessment of whether the business is a reporting business entity for ransomware reporting under Part 3.

The UK PSTI Act compliance wrapper should include the required compliance documentation under the 2023 Regulations, a regulatory response plan that addresses OPSS enforcement actions, and financial penalty exposure analysis based on the UK PSTI Act penalty structure (up to GBP 10 million or 4% of qualifying worldwide revenue). Product teams should run a single governance review before each market launch that checks both the Australia Cyber Security Act 2024 and the UK PSTI Act compliance packs are complete and current.

  • Shared layer: one product security baseline implementing passwords, vulnerability disclosure, and defined support period controls from ETSI EN 303 645.
  • Shared layer: one evidence repository with design documents, test results, published vulnerability disclosure policy, and published support period information.
  • Australia wrapper: formal statement of compliance with all prescribed fields under the Cyber Security (Security Standards for Smart Devices) Rules 2025, plus 5 year retention by both manufacturers and suppliers.
  • Australia wrapper: regulatory response plan covering compliance notice, stop notice, and recall notice escalation under the Australia Cyber Security Act 2024.
  • UK wrapper: compliance documentation under the UK PSTI Act 2023 Regulations, OPSS enforcement response plan, and financial penalty exposure analysis.
  • Governance: single pre-launch review that signs off both the Australia Cyber Security Act 2024 and the UK PSTI Act compliance packs before product release.
Section 12

Summary of key differences in this product security comparison

This product security comparison of the Australia Cyber Security Act 2024 and the UK PSTI Act can be summarised across seven dimensions. On scope, both regimes cover consumer connectable products, but the Australia Cyber Security Act 2024 explicitly excludes desktops, laptops, tablets, smartphones, therapeutic goods, road vehicles, and road vehicle components, while the UK PSTI Act has its own exclusion list. On security requirements, both regimes mandate the same three ETSI EN 303 645 controls (passwords, vulnerability disclosure, support periods). On compliance documentation, the Australia Cyber Security Act 2024 requires a prescribed statement of compliance with specific fields and a 5 year retention period, while the UK PSTI Act has its own documentation requirements. On enforcement, the Australia Cyber Security Act 2024 uses a compliance notice, stop notice, recall notice escalation administered by the Secretary of the Department of Home Affairs, while the UK PSTI Act is enforced by the Office for Product Safety and Standards (OPSS). On penalties, the Australia Cyber Security Act 2024 applies civil penalties under the Regulatory Powers (Standard Provisions) Act 2014, while the UK PSTI Act allows fines of up to GBP 10 million or 4% of global revenue. On product examination, the Australia Cyber Security Act 2024 authorises independent expert examinations of products under Section 23. On broader obligations, the Australia Cyber Security Act 2024 includes ransomware reporting duties in Part 3 that have no equivalent in the UK PSTI Act.

  • Scope: both cover consumer connectable products, but exclusion lists differ between the Australia Cyber Security Act 2024 and the UK PSTI Act.
  • Security requirements: identical three-control baseline (passwords, vulnerability disclosure, support periods) derived from ETSI EN 303 645.
  • Compliance documentation: Australia Cyber Security Act 2024 requires a prescribed statement of compliance with 5 year retention; UK PSTI Act has its own documentation requirements.
  • Enforcement authority: Australia Cyber Security Act 2024 administered by the Secretary of the Department of Home Affairs; UK PSTI Act administered by OPSS.
  • Penalties: Australia Cyber Security Act 2024 uses civil penalty provisions under the Regulatory Powers Act; UK PSTI Act allows fines up to GBP 10 million or 4% of global revenue.
  • Product examination: the Australia Cyber Security Act 2024 authorises independent expert examinations of products under Section 23.
  • Broader obligations: the Australia Cyber Security Act 2024 includes ransomware reporting in Part 3 with a civil penalty of 60 penalty units, which has no equivalent in the UK PSTI Act.
Primary sources

References and citations

legislation.gov.au
Referenced sections
  • Primary source for the Australia Cyber Security Act 2024 including Part 2 (security standards for smart devices), Part 3 (ransomware reporting), Part 6 (regulatory powers and civil penalties), and enforcement provisions (compliance notice, stop notice, recall notice).
Related guides

Explore more topics

Australia Cyber Security Act 2024 Applicability Test | Who Must Comply
Complete Australia Cyber Security Act 2024 applicability test covering smart device security standards, ransomware payment reporting obligations.
Australia Cyber Security Act 2024 Compliance Checklist
Comprehensive Australia Cyber Security Act 2024 compliance checklist covering smart device security standards, ransomware payment reporting.
Australia Cyber Security Act 2024 Compliance Guide | Implementation Playbook
A detailed Australia Cyber Security Act 2024 compliance guide covering smart device security standards, statement of compliance requirements.
Australia Cyber Security Act 2024 Compliance Templates | Statement of Compliance, Ransomware Report, Evidence Pack, Vulnerability Disclosure, Support Period
Comprehensive Australia Cyber Security Act 2024 compliance templates with every required field.
Australia Cyber Security Act 2024 Deadlines and Compliance Calendar | Commencement Dates
Complete Australia Cyber Security Act 2024 deadlines and compliance calendar with all commencement dates: 30 November 2024 Royal Assent.
Australia Cyber Security Act 2024 FAQ | Frequently Asked Questions
Get detailed answers to frequently asked questions about the Australia Cyber Security Act 2024.
Australia Cyber Security Act 2024 Requirements | Smart Device and Ransomware Reporting Obligations
Complete guide to Australia Cyber Security Act 2024 requirements covering smart device password rules, vulnerability disclosure.
Australia Cyber Security Act 2024 Timeline and Commencement Dates | Full Schedule
Complete Australia Cyber Security Act 2024 timeline with every commencement date from Royal Assent on 29 November 2024.
Australia Cyber Security Act 2024 vs EU Cyber Resilience Act | Full CRA Comparison
Detailed comparison of the Australia Cyber Security Act 2024 and the EU Cyber Resilience Act covering scope, product categories, security requirements.
Australia Smart Device Compliance Checklist | Cyber Security Act 2024 | Sorena
Complete Australia Cyber Security Act 2024 smart device compliance checklist covering Schedule 1 password security, vulnerability disclosure.
Penalties and fines | Australia Cyber Security Act 2024 | 60 Penalty Units, Smart Device Enforcement, Ransomware Reporting
Australia Cyber Security Act 2024 penalties explained: 60 penalty units (AUD 19,800) per contravention for individuals.
Ransomware Payment Reporting in 72 Hours | Australia Cyber Security Act 2024
Complete guide to the 72 hour ransomware payment reporting obligation under Part 3 of the Australia Cyber Security Act 2024.
Scope and Definitions | Australia Cyber Security Act 2024
Complete guide to the Australia Cyber Security Act 2024 scope and definitions.
Smart device security standards | Australia Cyber Security Act 2024
Complete technical guide to the three Australia Cyber Security Act 2024 smart device security standards: password security under Clause 2.
Statement of Compliance and Recordkeeping | Australia Cyber Security Act 2024 | Section 9, Section 10, 5 Year Retention
Australia Cyber Security Act 2024 statement of compliance explained: all mandatory fields under Section 9(3) of the Smart Device Rules 2025.