Compliance GuideAPAC

Australia Cyber Security Act 2024 Statement of Compliance and Recordkeeping

Every in-scope smart device supplied in Australia must be accompanied by a statement of compliance prepared by or on behalf of the manufacturer. The Australia Cyber Security Act 2024 statement of compliance must include all fields prescribed by Section 9(3) of the Security Standards for Smart Devices Rules 2025, and both manufacturers and suppliers must retain a copy for 5 years under Section 10.

The Australia Cyber Security Act 2024 statement of compliance is a controlled legal artifact that connects product identity, manufacturer declarations, the defined support period, and signatory accountability into one document. Getting the statement of compliance wrong can trigger compliance notices, stop notices, recall notices, and public notification of failure.

Author
Sorena AI
Published
Mar 4, 2026
Updated
Mar 4, 2026
Sections
13

Structured answer sets in this page tree.

Primary sources
3

Cited legal and guidance references.

Publication metadata
Sorena AI
Published Mar 4, 2026
Updated Mar 4, 2026
Overview

The Australia Cyber Security Act 2024 statement of compliance is the central documentary obligation for smart devices under the Act. Section 16(1) of the Cyber Security Act 2024 requires manufacturers to provide a statement of compliance for every relevant connectable product supplied in Australia. Section 16(3) requires suppliers to supply the product with the Australia Cyber Security Act 2024 statement of compliance. Both manufacturers and suppliers must retain their copy for 5 years under Section 10 of the Security Standards for Smart Devices Rules 2025. The Australia Cyber Security Act 2024 statement of compliance is not a marketing document. It is the primary evidence that the regulator uses to verify that a manufacturer has met its obligations under the Act and Rules. The Secretary may engage an independent expert under Section 23 to examine whether the product complies with the security standard and whether the Australia Cyber Security Act 2024 statement of compliance itself meets the requirements of Section 16. This page covers every prescribed element, who must prepare and retain the statement of compliance, the 5 year retention period, evidence pack structure, template design, audit preparation, common mistakes, and enforcement consequences.

Section 1

What the Australia Cyber Security Act 2024 statement of compliance must contain under Section 9(3)

Section 9(3) of the Cyber Security (Security Standards for Smart Devices) Rules 2025 prescribes seven mandatory elements that every Australia Cyber Security Act 2024 statement of compliance must include. The statement of compliance must be prepared by, or on behalf of, the manufacturer of the product under Section 9(2). There is no prescribed format or template, but every Australia Cyber Security Act 2024 statement of compliance must include all seven elements to satisfy the Rules. Omitting any single element means the statement of compliance does not meet the requirements, which means the product is not lawfully supplied with a compliant document.

The Explanatory Statement for the Rules clarifies the purpose of each element. Product type and batch identifier are required to differentiate between products that may appear similar. For example, two products with different manufacturing dates may have different security updates installed by default. The manufacturer details provide the regulator with a point of contact if there are concerns with the Australia Cyber Security Act 2024 statement of compliance. The defined support period at the date of issue locks the manufacturer into a commitment that cannot be shortened after publication.

  • Element (a): Product type and batch identifier. This links the Australia Cyber Security Act 2024 statement of compliance to the specific product configuration in the market and distinguishes it from similar products with different manufacturing dates or firmware versions.
  • Element (b): Name and address of the manufacturer, an authorised representative of the manufacturer, and each (if any) of the manufacturer's other authorised representatives that are in Australia. All authorised representatives located in Australia must be listed.
  • Element (c): A declaration that the Australia Cyber Security Act 2024 statement of compliance has been prepared by, or on behalf of, the manufacturer of the product.
  • Element (d): A declaration that, in the opinion of the manufacturer, the product has been manufactured in compliance with the requirements of the security standard and the manufacturer has complied with any other obligations relating to the product in the security standard. This covers password controls, security issue reporting, and defined support period obligations.
  • Element (e): The defined support period for the product at the date the Australia Cyber Security Act 2024 statement of compliance is issued. The Explanatory Statement specifies that this should include a fixed end date, for example 'no later than 30 June 2027'.
  • Element (f): The signature, name, and function of the signatory of the manufacturer. The signatory must be identified by full name, job title or role, and must sign the document.
  • Element (g): The place and date of issue of the Australia Cyber Security Act 2024 statement of compliance. Both the location where the document was issued and the exact date must appear.
Recommended next step

Keep Australia Cyber Security Act 2024 Statement of Compliance and Recordkeeping in one governed evidence system

SSOT can take Australia Cyber Security Act 2024 Statement of Compliance and Recordkeeping from reusing this material inside a governed evidence system to a reusable workflow inside Sorena. Teams working on Australia Cyber Security Act 2024 can keep owners, evidence, and next steps aligned without copying this guide into separate documents.

Section 2

Manufacturer obligations for the Australia Cyber Security Act 2024 statement of compliance

Section 16(1) of the Australia Cyber Security Act 2024 places the primary statement of compliance obligation on manufacturers. An entity that manufactures a relevant connectable product must provide, for the supply of the product in Australia, a statement of compliance with the security standard. This obligation applies when the product is included in a class covered by the Rules and the manufacturer is aware, or could reasonably be expected to be aware, that the product will be acquired in Australia in the specified circumstances.

Section 9(2) of the Rules reinforces that the Australia Cyber Security Act 2024 statement of compliance must be prepared by, or on behalf of, the manufacturer. This means the manufacturer can delegate the preparation of the statement of compliance to an authorised representative or other agent, but the manufacturer remains responsible for the accuracy and completeness of the document. The declaration in Element (c) explicitly attributes the Australia Cyber Security Act 2024 statement of compliance to the manufacturer regardless of who drafted it.

The compliance declaration in Element (d) of Section 9(3) requires the manufacturer to state their opinion that the product was manufactured in compliance with the security standard and that the manufacturer has complied with any other obligations in the security standard. This means the manufacturer must have verified all three pillars of the smart device security standard before signing the Australia Cyber Security Act 2024 statement of compliance: password controls are correct, the security issue reporting channel is published and accessible, and the defined support period is published with an end date.

Manufacturers operating across multiple jurisdictions should note that the Australia Cyber Security Act 2024 statement of compliance is for the use of the regulator to ensure the responsible entity has met its obligations under the Act and Rules. The Explanatory Statement confirms that statements of compliance are not required to be provided with the product at point of sale. However, responsible entities may provide or publish statements of compliance with their product if they wish.

  • The manufacturer bears the primary obligation to provide an Australia Cyber Security Act 2024 statement of compliance under Section 16(1) of the Act.
  • The manufacturer must retain a copy of every Australia Cyber Security Act 2024 statement of compliance for at least 5 years under Section 16(2).
  • The Australia Cyber Security Act 2024 statement of compliance must be prepared by, or on behalf of, the manufacturer under Section 9(2) of the Rules.
  • Delegation of statement preparation to an authorised representative does not transfer responsibility from the manufacturer.
  • Before signing the Australia Cyber Security Act 2024 statement of compliance, verify password compliance, security issue reporting publication, and defined support period publication.
  • Do not shorten a published defined support period after it appears in a statement of compliance. The Rules prohibit shortening the defined support period after publication under Clause 4(4) of Schedule 1.
  • The Australia Cyber Security Act 2024 statement of compliance is not required at point of sale. It is primarily for regulator use to verify compliance.
Section 3

Supplier obligations for the Australia Cyber Security Act 2024 statement of compliance

Section 16(3) of the Australia Cyber Security Act 2024 creates a separate obligation for suppliers. An entity that supplies a relevant connectable product in Australia must supply the product with the Australia Cyber Security Act 2024 statement of compliance. This obligation applies when the product is included in a class covered by the security standard and the supplier is aware, or could reasonably be expected to be aware, that the product will be acquired in Australia in the specified circumstances.

Section 16(4) requires the supplier to retain a copy of the Australia Cyber Security Act 2024 statement of compliance for the period specified in the Rules. Under Section 10 of the Rules, the retention period for suppliers is the same as for manufacturers: 5 years. This means every entity in the Australian supply chain that handles the product has an independent obligation to retain the Australia Cyber Security Act 2024 statement of compliance for 5 years.

A supplier who is aware, or could reasonably be expected to be aware, that the product will be acquired in Australia by a consumer cannot lawfully supply a product that was not manufactured in compliance with the security standard under Section 15(3) of the Act. This means the supplier should have a process to confirm that the Australia Cyber Security Act 2024 statement of compliance exists, that it covers the correct product type and batch, and that the defined support period and declarations appear complete before the product enters the Australian supply chain. Supply chain contracts should address statement of compliance handoff, verification, and retention responsibilities explicitly.

  • Section 16(3) requires every supplier of a relevant connectable product in Australia to supply the product with the Australia Cyber Security Act 2024 statement of compliance.
  • Section 16(4) requires every supplier to retain a copy of the Australia Cyber Security Act 2024 statement of compliance for 5 years.
  • The supplier retention obligation is independent of the manufacturer retention obligation. Both must hold their own copies.
  • Do not rely on verbal assurances from the manufacturer. Obtain and inspect the actual Australia Cyber Security Act 2024 statement of compliance document before supply.
  • If a product variant or new batch is shipped, verify that the statement of compliance covers that specific variant or batch. A statement of compliance issued for a different product configuration does not satisfy the supply obligation.
  • Build a receiving checklist that verifies the presence and completeness of the Australia Cyber Security Act 2024 statement of compliance at goods inward or import clearance.
  • Supply chain contracts should specify statement of compliance handoff procedures, verification steps, and retention responsibilities.
Section 4

Defined support period declaration in the Australia Cyber Security Act 2024 statement of compliance

Element (e) of Section 9(3) requires the Australia Cyber Security Act 2024 statement of compliance to include the defined support period for the product at the date the statement of compliance is issued. The defined support period is the period, expressed as a period of time with an end date, for which the manufacturer will provide security updates for the product. The Explanatory Statement specifies that the defined support period should include a fixed end date rather than just a duration, for example 'no later than 30 June 2027'.

Schedule 1, Clause 4 of the Rules governs the defined support period. The manufacturer must publish the defined support period in a location that is accessible, free of charge, does not require the creation of an account, is in English, and does not require the provision of personal information. If the manufacturer offers the product on its website, the defined support period must be prominently published alongside the main product characteristics with equal prominence. Once published, the manufacturer must not shorten the defined support period under Clause 4(4). If the manufacturer extends the defined support period, the new period must be published as soon as practicable under Clause 4(5).

The Australia Cyber Security Act 2024 statement of compliance locks the defined support period at the date of issue. If the statement of compliance declares a support period ending 30 June 2027, the manufacturer cannot later reduce that commitment. The support period on the manufacturer's public website must match the support period declared in the Australia Cyber Security Act 2024 statement of compliance. Any mismatch between these two records is a compliance failure that the regulator can identify through a straightforward comparison.

  • The defined support period in the Australia Cyber Security Act 2024 statement of compliance must include a fixed end date, not just a duration.
  • The manufacturer must publish the defined support period in a location that is accessible, free of charge, in English, and does not require account creation or personal information.
  • If the product is sold on the manufacturer's website, the defined support period must appear alongside the main product characteristics with equal prominence.
  • The manufacturer must not shorten the defined support period after publication under Clause 4(4) of Schedule 1.
  • Extensions to the defined support period must be published as soon as practicable under Clause 4(5).
  • The support period on the public website must match the support period in the Australia Cyber Security Act 2024 statement of compliance at the date of issue.
  • A mismatch between the published support period and the Australia Cyber Security Act 2024 statement of compliance is one of the most easily detected compliance failures.
Section 5

Signatory and authorised representative requirements for the Australia Cyber Security Act 2024 statement of compliance

Element (f) of Section 9(3) requires the Australia Cyber Security Act 2024 statement of compliance to include the signature, name, and function of the signatory of the manufacturer. This creates personal accountability within the manufacturer's organization. The signatory must be identified by full name and by their role or job title, and must sign the Australia Cyber Security Act 2024 statement of compliance. The Explanatory Statement acknowledges that the signatory's personal information will be disclosed in the statement of compliance, and accepts this as a proportionate limitation on privacy rights given the public safety purpose of the smart device regime.

Element (b) requires the Australia Cyber Security Act 2024 statement of compliance to include the name and address of the manufacturer, an authorised representative of the manufacturer, and each (if any) of the manufacturer's other authorised representatives that are in Australia. This means the statement of compliance must identify all authorised representatives, not just one. Manufacturers with multiple authorised representatives in Australia must list each one. The authorised representative details give the regulator alternative contact points within the Australian jurisdiction.

Manufacturers should define internal signatory authority rules that specify which individuals are authorised to sign the Australia Cyber Security Act 2024 statement of compliance on behalf of the manufacturer. The signatory register should be maintained as a controlled document, updated when personnel changes occur. If the signatory has left the organisation or changed roles, the register should be updated and future statements of compliance should be signed by a currently authorised person.

  • The Australia Cyber Security Act 2024 statement of compliance must include the signature, name, and function (role or title) of the manufacturer's signatory.
  • The signatory's personal information will be disclosed in the Australia Cyber Security Act 2024 statement of compliance as acknowledged in the Explanatory Statement.
  • The statement of compliance must list the name and address of the manufacturer.
  • The statement of compliance must list the name and address of an authorised representative of the manufacturer.
  • The statement of compliance must list each authorised representative located in Australia, if any exist.
  • Manufacturers should maintain an internal signatory authority register that specifies who can sign the Australia Cyber Security Act 2024 statement of compliance.
  • Update the signatory register when personnel leave or change roles. Verify current authority before each statement of compliance is signed.
Section 6

Recordkeeping and the 5 year retention period under Section 10

Section 10 of the Cyber Security (Security Standards for Smart Devices) Rules 2025 sets the retention period for the Australia Cyber Security Act 2024 statement of compliance at 5 years. This period applies to both manufacturers under Section 16(2) of the Act and suppliers under Section 16(4) of the Act. The obligation to retain the Australia Cyber Security Act 2024 statement of compliance for 5 years applies equally across the supply chain.

The 5 year retention period was reduced from a proposed 10 years following industry consultation. The Explanatory Statement records that stakeholders recommended reducing the retention period to 5 years because it is consistent with the average lifespan of a relevant connectable product and reduces administrative burden on industry. This recommendation was accepted and incorporated into the final Rules.

Retaining the Australia Cyber Security Act 2024 statement of compliance alone is necessary but may not be sufficient for a robust compliance position. The statement of compliance declares that the product meets the security standard and states the defined support period. If the regulator or an independent expert under Section 23 examines the statement of compliance, the manufacturer should be able to produce the evidence that supported the declarations at the time of issue. This means test reports, vulnerability assessment records, support period publication evidence, and signatory approval records should all be retained alongside the Australia Cyber Security Act 2024 statement of compliance.

The 5 year retention period for the Australia Cyber Security Act 2024 statement of compliance should be reflected in the organisation's document retention schedule and records management system. The obligation is not just to store the statement of compliance. The obligation is to be able to retrieve it on demand. If the Secretary requests the Australia Cyber Security Act 2024 statement of compliance under Section 23 of the Act, the entity must be able to produce the document within the period specified in the written notice.

  • Manufacturers must retain each Australia Cyber Security Act 2024 statement of compliance for at least 5 years under Section 16(2) of the Act and Section 10 of the Rules.
  • Suppliers must retain each Australia Cyber Security Act 2024 statement of compliance for at least 5 years under Section 16(4) of the Act and Section 10 of the Rules.
  • The 5 year retention period was reduced from a proposed 10 years after industry consultation confirmed it aligns with the average smart device lifespan.
  • Record the start date and expected disposal date for each Australia Cyber Security Act 2024 statement of compliance in the retention schedule.
  • Store the statement of compliance in a system that supports immutable records or locked copies so the document cannot be altered after issue.
  • Retain the product test evidence, support period publication records, and signatory approval evidence alongside each Australia Cyber Security Act 2024 statement of compliance.
  • Test retrieval procedures so the business can produce both the Australia Cyber Security Act 2024 statement of compliance and its supporting evidence promptly on request.
  • If statements of compliance are stored across different business units or geographies, maintain a central index mapping each product type, batch, and statement of compliance to its storage location.
Section 7

Evidence pack structure for each Australia Cyber Security Act 2024 statement of compliance

The Australia Cyber Security Act 2024 statement of compliance is a declaration document. The evidence pack is the technical and operational record that proves the declarations in the statement of compliance were justified at the time of issue. A complete evidence pack for each Australia Cyber Security Act 2024 statement of compliance should cover all three pillars of the smart device security standard in Schedule 1 of the Rules: password controls, security issue reporting, and defined support period and security updates. Each pillar should have its own section within the evidence pack.

The evidence pack should also include records related to the signatory, the product identity, and the date alignment between the defined support period in the statement of compliance and the published defined support period on the manufacturer's website. If the regulator or an independent expert under Section 23 asks why the manufacturer declared compliance in the Australia Cyber Security Act 2024 statement of compliance, the answer should be a retrievable evidence pack, not a recollection or a verbal explanation.

Organisations should assign a unique reference number to each Australia Cyber Security Act 2024 statement of compliance and use the same reference number to identify the corresponding evidence pack. This linkage ensures that the statement of compliance and its evidence can always be retrieved together. The evidence pack should be retained for the same 5 year period as the statement of compliance itself.

  • Password evidence: test reports confirming passwords are unique per product or user defined, test reports confirming factory default passwords are not based on incremental counters or public information, and test reports confirming that serial number derivation (if used) uses accepted encryption or keyed hashing as required by good industry practice.
  • Security issue reporting evidence: archive copies or screenshots of the published security issue reporting page, confirmation that the page includes at least one contact point, confirmation that the page explains when the reporter will receive acknowledgement and status updates, and confirmation that the page is accessible without prior request, in English, free of charge, and without requiring personal information.
  • Defined support period evidence: archive copies or screenshots of the published defined support period page, confirmation that the support period is expressed as a period of time with an end date, confirmation that the page is accessible and free of charge and in English and does not require personal information, and if the product is offered for sale on the manufacturer's website confirmation that the support period is published alongside the main product characteristics with equal prominence.
  • Date alignment evidence: confirmation that the defined support period in the Australia Cyber Security Act 2024 statement of compliance matches the defined support period published on the manufacturer's website on the date of issue.
  • Signatory authority evidence: the internal approval record showing that the signatory was authorised to sign the Australia Cyber Security Act 2024 statement of compliance on behalf of the manufacturer, including any delegation of authority documents.
  • Product identity evidence: the product specification sheet, model number, hardware revision, firmware version, and batch or lot identifier that corresponds to the product type and batch identifier in the Australia Cyber Security Act 2024 statement of compliance.
  • Assign a unique reference number to each Australia Cyber Security Act 2024 statement of compliance and use it to link the statement to its evidence pack for joint retrieval.
Section 8

Template guidance for the Australia Cyber Security Act 2024 statement of compliance

Organisations should use a single approved template for the Australia Cyber Security Act 2024 statement of compliance. The template should contain all mandatory fields from Section 9(3) of the Rules as labelled placeholders. Teams should not modify the wording or layout without compliance review. The template itself should be a controlled document with its own version number and approval record so that all issued statements of compliance can be traced back to the template version in force at the time of issue.

The template for the Australia Cyber Security Act 2024 statement of compliance should be connected to the product release or supply approval workflow. The statement of compliance should not be issued until the evidence pack is complete, the defined support period page is live and verified, and the signatory has reviewed and approved the content. Automating the generation of the Australia Cyber Security Act 2024 statement of compliance from approved source data (product database, legal entity register, defined support period system) reduces the risk of transcription errors, stale data, and inconsistencies across product families.

If the organisation manufactures multiple product families, maintain one master template for the Australia Cyber Security Act 2024 statement of compliance and populate it from a central product data source rather than maintaining separate templates per product. This approach ensures consistency and simplifies template governance.

  • Include a labelled field for every Section 9(3) requirement: product type, batch identifier, manufacturer name and address, authorised representative name and address, additional Australian authorised representatives, preparation declaration, compliance declaration, defined support period with end date, signatory signature, signatory name, signatory function, place of issue, and date of issue.
  • Add a template version number and a template approval date to the footer of the Australia Cyber Security Act 2024 statement of compliance template.
  • Add a validation step that compares the defined support period in the Australia Cyber Security Act 2024 statement of compliance against the live published defined support period page before the document is signed.
  • Add a validation step that confirms the product type and batch identifier in the statement of compliance match the product records in the manufacturer's system.
  • Require digital or wet ink signature from an authorised signatory listed on the current signatory register. The template should not allow the Australia Cyber Security Act 2024 statement of compliance to be finalised without a signature.
  • Store a final locked copy of each issued Australia Cyber Security Act 2024 statement of compliance with immutable metadata (hash, timestamp, signatory identity) where the organisation's systems support it.
  • Do not allow teams to freestyle the wording of declarations. Use the exact language required by Section 9(3)(c) and Section 9(3)(d) for the preparation and compliance declarations.
Section 9

Connecting the Australia Cyber Security Act 2024 statement of compliance to release and supply controls

The Australia Cyber Security Act 2024 statement of compliance should not be treated as an afterthought that happens outside the product release process. It should be gated into the release approval or supply approval workflow so that no product enters the Australian market without a valid statement of compliance. For manufacturers, the statement of compliance issue step should sit after final test approval and after the defined support period page is confirmed live. For suppliers and importers, the Australia Cyber Security Act 2024 statement of compliance verification step should sit at goods inward or import clearance before the product is released into Australian distribution.

Automated validation should check product version, batch identifier, legal entity name, authorised representative details, defined support period consistency, and signatory authority before the Australia Cyber Security Act 2024 statement of compliance is finalised. A manual process creates opportunities for mismatched identifiers, stale support period data, and unauthorized signatories. If a product variant or firmware update changes the security posture of the product, the organisation should assess whether a new Australia Cyber Security Act 2024 statement of compliance is required for the updated configuration.

  • Block product release to the Australian market if the evidence pack is incomplete or if any of the three security standard pillars (password, security issue reporting, defined support period) have not been verified.
  • Block Australia Cyber Security Act 2024 statement of compliance issue if the defined support period published on the manufacturer's website does not match the defined support period listed in the statement.
  • Block statement of compliance issue if the signatory is not listed on the current authorised signatory register.
  • For suppliers: block product receipt into Australian inventory if the Australia Cyber Security Act 2024 statement of compliance is missing, if the product type and batch do not match, or if any required field is blank.
  • Log every issue event with the statement of compliance reference number, the product batch, the signatory identity, and a timestamp. This log becomes part of the recordkeeping evidence.
  • If a product variant or firmware update changes the security posture, assess whether a new Australia Cyber Security Act 2024 statement of compliance is required for the updated configuration.
Section 10

Audit preparation for the Australia Cyber Security Act 2024 statement of compliance

Section 23 of the Cyber Security Act 2024 gives the Secretary the power to engage an appropriately qualified and experienced expert to carry out an independent examination of a product to determine whether the product complies with the security standard and whether the Australia Cyber Security Act 2024 statement of compliance complies with the requirements of Section 16. The Secretary can issue a written notice under Section 23(3) requesting the entity to provide the product, the statement of compliance, or both.

The written notice under Section 23(4) must specify the product, the manufacturer of the product (if known to the Secretary), a reasonable period within which the entity must respond, the period for which the product will be retained for testing, the requirements of the security standard the product will be tested against, and the kind of testing or analysis that will be performed. The expert may examine the product by opening packaging, operating the product, testing or analysing the product using electronic equipment, reading records or documents contained in the product, and taking photographs or video recordings. Entities are entitled to reasonable compensation from the Commonwealth for complying with an examination request under Section 23(5).

Audit preparation for the Australia Cyber Security Act 2024 statement of compliance means being able to respond to a Section 23 notice quickly and completely. The organisation should be able to locate the correct statement of compliance for any product batch, produce the supporting evidence pack, and explain the compliance declaration and the defined support period declaration without delay. Organisations should run an internal rehearsal at least once per year to test their readiness.

Select a product at random, locate its Australia Cyber Security Act 2024 statement of compliance, pull the corresponding evidence pack, confirm the defined support period still matches the published page, verify the signatory was authorised at the date of issue, and measure the total time from request to production. If the process takes more than a few business days, the retrieval workflow needs improvement.

  • Maintain an index of all issued Australia Cyber Security Act 2024 statements of compliance, mapped to product type, batch identifier, date of issue, signatory name, and evidence pack location.
  • Store the Australia Cyber Security Act 2024 statement of compliance and its evidence pack in the same retrieval system or link them with a shared reference number so they can be produced together.
  • Confirm that the records management system retains all documents for at least 5 years and that automated disposal rules do not delete statements of compliance or evidence packs before the retention period expires.
  • Train the compliance and product security teams on the Section 23 examination process so they know what the Secretary can request and what response timeframe is expected.
  • Include the Australia Cyber Security Act 2024 statement of compliance in the scope of internal compliance audits. Verify that every product currently supplied in Australia has a valid statement of compliance on file.
  • Run an internal retrieval rehearsal at least once per year. Simulate a Section 23 request for a randomly selected product and measure response time.
  • If the organisation receives a compliance notice (Section 17) related to the Australia Cyber Security Act 2024 statement of compliance, the response should include the statement of compliance, the evidence pack, and a description of corrective actions taken. Prepare a response template in advance.
  • Keep contact details for the authorised signatory current. If the signatory has left the organisation, update the signatory register and confirm that future statements of compliance are signed by a currently authorised person.
Section 11

Cross-jurisdictional recognition of UK PSTI statements of compliance

The Explanatory Statement for the Rules confirms that responsible entities operating across jurisdictions with similar compliance frameworks can reuse the same information for the Australian statement of compliance. The most significant example is the United Kingdom. Products supplied to the UK market under the Product Security and Telecommunications Infrastructure (Security Requirements for Relevant Connectable Products) Regulations 2023 can provide the same statement of compliance for the Australian market, provided all requirements in Section 9 of the Australian Rules are met.

This cross-jurisdictional recognition reduces the compliance burden for manufacturers who already sell into the UK market. The Australian security standards in Schedule 1, Part 1 of the Rules closely follow the UK PSTI Regulations, which are themselves based on the first three provisions of ETSI EN 303 645. Because the underlying security requirements are substantially aligned, a UK PSTI statement of compliance may already contain most of the information required by Section 9(3) of the Australian Rules. Manufacturers should verify that the UK statement includes all seven Australian elements, particularly the Australian authorised representative details and the place and date of issue.

  • The Explanatory Statement confirms that UK PSTI statements of compliance can be reused for the Australian market if all Section 9 requirements are met.
  • The Australian security standards closely follow the UK PSTI Regulations, both based on ETSI EN 303 645 provisions.
  • Manufacturers already selling into the UK should verify their UK statement covers all seven elements required by Section 9(3) of the Australian Rules.
  • Australian authorised representative details (Element (b)) may need to be added to a UK statement of compliance for it to qualify as a valid Australia Cyber Security Act 2024 statement of compliance.
  • The defined support period format should be verified against the Australian requirement for a fixed end date.
Section 12

Common mistakes with the Australia Cyber Security Act 2024 statement of compliance

Most failures with the Australia Cyber Security Act 2024 statement of compliance are process failures, not template failures. The template may contain all seven required elements, but the data populating those elements may be wrong, stale, or inconsistent. Fixing these weaknesses requires process design, not legal drafting. Teams should audit the data sources feeding the Australia Cyber Security Act 2024 statement of compliance and verify that handoff controls between manufacturing, product security, legal, and supply chain functions are reliable.

Every mistake listed below can lead to a non-compliant Australia Cyber Security Act 2024 statement of compliance, which means the product is not lawfully supplied with a compliant document. Under the enforcement provisions of the Act, this can trigger a compliance notice (Section 17), a stop notice (Section 18), or a recall notice (Section 19). The most detectable failure is a mismatch between the defined support period published on the manufacturer's website and the defined support period declared in the statement of compliance, because the regulator can identify this failure through a simple comparison without requesting any internal records.

  • Defined support period mismatch: the support period on the public website does not match the support period in the Australia Cyber Security Act 2024 statement of compliance. This is the most easily detected failure.
  • Premature issuance: the Australia Cyber Security Act 2024 statement of compliance is issued before final test results or conformity assessment results are approved, leaving the compliance declaration unsupported.
  • Product variant mismatch: a product variant ships under an Australia Cyber Security Act 2024 statement of compliance that was issued for a different configuration, batch, or firmware version.
  • Missing authorised representatives: the statement of compliance does not list all authorised representatives in Australia as required by Element (b) of Section 9(3).
  • Supply chain handoff failure: suppliers cannot demonstrate that the Australia Cyber Security Act 2024 statement of compliance accompanied the product when supplied in Australia.
  • Orphaned statement: the Australia Cyber Security Act 2024 statement of compliance is stored but the supporting test evidence, signatory approval, and support period records cannot be located.
  • Signatory authority gap: the statement of compliance is signed by an individual who was not authorised to sign on behalf of the manufacturer at the date of issue.
  • Missing place or date of issue: the Australia Cyber Security Act 2024 statement of compliance does not include the place of issue or the date of issue as required by Element (g) of Section 9(3).
  • Template inconsistency: multiple teams in different regions issue Australia Cyber Security Act 2024 statements of compliance using different templates or different wording, creating inconsistencies across the same product family.
  • Non-retrievable format: the Australia Cyber Security Act 2024 statement of compliance is stored as a scanned image that is not searchable or quickly retrievable from the records management system.
Section 13

Enforcement consequences for non-compliant Australia Cyber Security Act 2024 statements of compliance

Division 3 of Part 2 of the Cyber Security Act 2024 provides a graduated enforcement model for failures related to the Australia Cyber Security Act 2024 statement of compliance. The Act does not impose a direct monetary penalty for statement of compliance deficiencies. Instead, the Secretary operates a staged enforcement escalation that can result in compliance notices, stop notices, recall notices, and public notification of failure. Before issuing any notice, the Secretary must notify the entity and provide at least 10 days for the entity to make representations. This pre-notice representation right applies at every stage of the enforcement path.

The enforcement path begins when the Secretary is reasonably satisfied that an entity is not complying with Section 15 (security standards) or Section 16 (Australia Cyber Security Act 2024 statement of compliance obligations), or becomes aware of information suggesting possible non-compliance. Section 23 gives the Secretary the separate power to engage an independent expert to examine whether the product complies with the security standard and whether the Australia Cyber Security Act 2024 statement of compliance complies with the requirements of Section 16. This examination power can be used at any time, not only after a notice has been issued.

If the entity fails to comply with a recall notice, the Minister may publish the entity's identity, details of the product, details of the non-compliance, and the risks posed by the product on the Department's website or in any other way the Minister considers appropriate under Section 20 of the Act. Monitoring powers under Part 2 of the Regulatory Powers (Standard Provisions) Act 2014 also apply to Sections 15 and 16, and enforceable undertakings under Part 6 of the Regulatory Powers Act allow the Secretary to accept formal compliance commitments.

  • Compliance notice (Section 17): the Secretary issues a written notice specifying the non-compliance and requiring corrective action within a reasonable period. The entity must be given at least 10 days to make representations before the compliance notice is issued.
  • Stop notice (Section 18): issued after a compliance notice if the entity has not complied or if corrective actions are inadequate. The stop notice can require the entity to take or refrain from taking specified actions.
  • Recall notice (Section 19): issued after a stop notice if the entity still has not complied. The recall notice can require the entity to ensure the product is not acquired in Australia, not supplied to suppliers, and is returned to the manufacturer.
  • Public notification (Section 20): if the entity fails to comply with a recall notice, the Minister may publish the identity of the entity, product details, non-compliance details, and risks posed by the product.
  • Independent examination (Section 23): the Secretary can request the product and the Australia Cyber Security Act 2024 statement of compliance for expert examination at any time.
  • Monitoring powers under Part 2 of the Regulatory Powers Act apply to Sections 15 and 16, including entry and inspection of business premises.
  • Enforceable undertakings under Part 6 of the Regulatory Powers Act apply to Sections 15 and 16, allowing the Secretary to accept formal compliance commitments from entities.
Primary sources

References and citations

legislation.gov.au
Referenced sections
  • Section 16 creates the obligation for manufacturers and suppliers regarding the Australia Cyber Security Act 2024 statement of compliance. Sections 17 to 20 set out the enforcement powers. Section 23 authorises examination of products and statements of compliance.
Related guides

Explore more topics

Australia Cyber Security Act 2024 Applicability Test | Who Must Comply
Complete Australia Cyber Security Act 2024 applicability test covering smart device security standards, ransomware payment reporting obligations.
Australia Cyber Security Act 2024 Compliance Checklist
Comprehensive Australia Cyber Security Act 2024 compliance checklist covering smart device security standards, ransomware payment reporting.
Australia Cyber Security Act 2024 Compliance Guide | Implementation Playbook
A detailed Australia Cyber Security Act 2024 compliance guide covering smart device security standards, statement of compliance requirements.
Australia Cyber Security Act 2024 Compliance Templates | Statement of Compliance, Ransomware Report, Evidence Pack, Vulnerability Disclosure, Support Period
Comprehensive Australia Cyber Security Act 2024 compliance templates with every required field.
Australia Cyber Security Act 2024 Deadlines and Compliance Calendar | Commencement Dates
Complete Australia Cyber Security Act 2024 deadlines and compliance calendar with all commencement dates: 30 November 2024 Royal Assent.
Australia Cyber Security Act 2024 FAQ | Frequently Asked Questions
Get detailed answers to frequently asked questions about the Australia Cyber Security Act 2024.
Australia Cyber Security Act 2024 Requirements | Smart Device and Ransomware Reporting Obligations
Complete guide to Australia Cyber Security Act 2024 requirements covering smart device password rules, vulnerability disclosure.
Australia Cyber Security Act 2024 Timeline and Commencement Dates | Full Schedule
Complete Australia Cyber Security Act 2024 timeline with every commencement date from Royal Assent on 29 November 2024.
Australia Cyber Security Act 2024 vs EU Cyber Resilience Act | Full CRA Comparison
Detailed comparison of the Australia Cyber Security Act 2024 and the EU Cyber Resilience Act covering scope, product categories, security requirements.
Australia Cyber Security Act 2024 vs UK PSTI Act | Product Security Comparison
Detailed product security comparison of the Australia Cyber Security Act 2024 and the UK PSTI Act covering scope, ETSI EN 303 645, password requirements.
Australia Smart Device Compliance Checklist | Cyber Security Act 2024 | Sorena
Complete Australia Cyber Security Act 2024 smart device compliance checklist covering Schedule 1 password security, vulnerability disclosure.
Penalties and fines | Australia Cyber Security Act 2024 | 60 Penalty Units, Smart Device Enforcement, Ransomware Reporting
Australia Cyber Security Act 2024 penalties explained: 60 penalty units (AUD 19,800) per contravention for individuals.
Ransomware Payment Reporting in 72 Hours | Australia Cyber Security Act 2024
Complete guide to the 72 hour ransomware payment reporting obligation under Part 3 of the Australia Cyber Security Act 2024.
Scope and Definitions | Australia Cyber Security Act 2024
Complete guide to the Australia Cyber Security Act 2024 scope and definitions.
Smart device security standards | Australia Cyber Security Act 2024
Complete technical guide to the three Australia Cyber Security Act 2024 smart device security standards: password security under Clause 2.