Cyber Security Act 2024: What Australian Financial Institutions Need to Know

Updated March 2026 | 14 min read | By GoComply

The Cyber Security Act 2024 is Australia's first standalone cyber security legislation. Passed in November 2024 and entering force in stages through 2025-2026, it introduces mandatory ransomware payment reporting, a Cyber Incident Review Board, minimum security standards for IoT devices, and safe harbour protections that encourage incident disclosure. For financial services firms already navigating APRA CPS 234, SOCI Act obligations, and the Notifiable Data Breaches scheme, the Cyber Security Act adds another layer of mandatory reporting with tight timelines.

This guide covers every obligation relevant to APRA-regulated entities and explains how the Act interacts with your existing cyber compliance framework.

Have a question about how the Cyber Security Act intersects with CPS 234 or SOCI? Ask GoComply's AI chatbot - it covers the full regulatory framework with specific section references.

Why This Act Matters for Financial Services

Financial services firms face a unique convergence of cyber obligations:

A single cyber incident at an ADI or super fund could trigger four parallel reporting obligations, each with different timelines, different regulators, and different thresholds. Understanding the Cyber Security Act is essential to coordinating your incident response without missing a deadline.

Mandatory Ransomware Payment Reporting

The centrepiece obligation for most businesses. Under sections 12-16 of the Act:

Small Business Exemption

Entities with annual turnover below $3 million are exempt from mandatory reporting. This is irrelevant for APRA-regulated entities, all of which exceed this threshold.

Practical Implications for Financial Institutions

Most large ADIs and insurers have policies prohibiting ransomware payments. However, the obligation extends beyond direct payments. If your cyber insurer negotiates and pays a ransom on your behalf, or if a third-party incident responder facilitates a payment, you must still report within 72 hours of becoming aware. Your incident response plan needs to account for this.

Safe Harbour Provisions

The Act's safe harbour is designed to overcome the historical reluctance of Australian businesses to report cyber incidents. Under sections 18-22:

For financial institutions, this is significant. The safe harbour means you can report a ransomware payment to ASD without that report being used by APRA to impose licence conditions or capital charges. This is a deliberate policy choice to prioritise national threat intelligence over individual enforcement.

Cyber Incident Review Board (CIRB)

The CIRB is modelled on the US Cyber Safety Review Board and the Australian Transport Safety Bureau (ATSB). Under sections 28-38:

The April 2025 coordinated super fund cyber attacks (AustralianSuper, Rest, Hostplus, Cbus) are exactly the type of incident the CIRB is designed to review. Expect CIRB reports to set de facto standards that APRA then incorporates into supervisory expectations.

IoT Security Standards

Under sections 39-46, the Act introduces mandatory minimum security standards for internet-connected devices sold in Australia:

While this primarily affects manufacturers, financial institutions that deploy IoT devices (ATMs, smart building systems, branch security cameras, connected POS terminals) should verify that their procurement standards align with the new baseline.

Interaction with Existing Obligations

ObligationRegulatorTimelineThreshold
Ransomware payment report (Cyber Security Act)ASD72 hoursAny payment made or known
Material incident notification (CPS 234)APRA72 hoursMaterial information security incident
Critical infrastructure incident (SOCI)ASD / Home Affairs12-72 hoursSignificant or relevant impact on critical asset
Notifiable data breach (Privacy Act)OAIC30 days (assessment) then ASAPEligible data breach likely to cause serious harm
Continuous disclosure (ASX)ASX / ASICImmediatelyMaterial price-sensitive information

A ransomware attack on an ADI that involves data exfiltration could trigger all five reporting streams simultaneously. Your incident response plan needs a reporting coordinator who understands each threshold and timeline.

CPS 234 and the Cyber Security Act: Coordination Points

APRA CPS 234 requires entities to:

The Cyber Security Act does not replace CPS 234 obligations. You must report to both ASD (for ransomware payments) and APRA (for material incidents) on the same 72-hour timeline. However, the safe harbour means the ASD report cannot be used by APRA against you.

After the April 2025 Super Fund Attacks

APRA mandated CPS 234 self-assessments by August 2025 for all super funds and is now conducting special reviews. The Cyber Security Act's CIRB will likely review the incident separately, producing recommendations that may inform future APRA guidance. Entities should prepare for tighter supervisory expectations on credential stuffing defences, API security, and member notification processes.

Compliance Checklist for Financial Institutions

  1. Update incident response plans to include ASD ransomware reporting alongside APRA CPS 234, SOCI, and NDB notification procedures
  2. Designate a reporting coordinator who understands all four parallel reporting obligations and their thresholds
  3. Review cyber insurance policies to ensure ransomware payment reporting obligations are addressed if the insurer pays on your behalf
  4. Document your ransomware payment policy (whether prohibition or case-by-case assessment) and ensure it addresses the 72-hour reporting requirement
  5. Prepare CIRB cooperation procedures so your organisation can respond to information requests without compromising legal privilege
  6. Audit IoT device procurement against the new minimum security standards for any connected devices in your environment
  7. Train incident response teams on the safe harbour provisions so staff are not deterred from reporting by fear of regulatory consequences
  8. Tabletop exercise a scenario that triggers all five reporting streams to test coordination and identify gaps

Scan Your Cyber Security Policies

Upload your incident response plan or cyber security framework. GoComply checks against the Cyber Security Act 2024, CPS 234, SOCI, and 200+ other regulation sources in seconds.

Run a free scan

Key Dates and Timeline

DateMilestone
November 2024Cyber Security Act 2024 receives Royal Assent
Early 2025Ransomware payment reporting obligations commence
Mid 2025IoT security standards take effect for new devices
2025-2026CIRB becomes operational, first reviews commence
OngoingMandatory vulnerability disclosure obligations phased in

Penalties

Failure to report a ransomware payment within 72 hours attracts civil penalties. The Act does not impose criminal penalties for late reporting, but persistent non-compliance could trigger enforcement action. For APRA-regulated entities, the more significant risk is that a failure to report indicates broader weaknesses in incident response capability, which could prompt APRA supervisory action under CPS 234.

This guide is for informational purposes and does not constitute legal advice. Consult qualified cyber security and compliance professionals for specific obligations. GoComply covers 200+ Australian regulatory sources - ask the chatbot for instant clause-level answers on the Cyber Security Act 2024, CPS 234, SOCI, and all related frameworks.