The Australian Signals Directorate (ASD) and its Australian Cyber Security Centre (ACSC) have released a new publication, CI Fortify, outlining cybersecurity recommendations for Australian critical infrastructure (CI) operators. The document is designed to help organizations strengthen their security posture and resilience before a crisis or major service disruption occurs.
Read the guidance on cyber.gov.au ›
ASD and ACSC released CI Fortify in response to a rapidly evolving threat landscape for operational technology (OT) systems that underpin critical services such as energy, water, transportation, and communications.
The publication notes that state-sponsored actors are actively targeting Australian CI networks—both for espionage and to establish potential footholds for disruption in times of conflict. Cybercriminals continue to exploit these same systems for ransomware and data theft. With most CI environments relying on interconnected IT and OT systems and complex supply chains, even a single compromise can cause cascading effects on essential services.
CI Fortify provides high-level, actionable steps for operators to build readiness before an incident occurs. It focuses on preparation, isolation, and recovery, helping organizations ensure that vital OT and enabling systems can be maintained, disconnected, and rebuilt safely during periods of disruption.
At Industrial Defender, we welcome the release of CI Fortify and its clear call for stronger OT resilience. The guidance starts exactly where every effective cybersecurity program should, with an accurate, up-to-date inventory of OT assets and enabling systems.
This principle aligns closely with our long-standing view that visibility is the foundation for security, reliability, and recovery. Without knowing what assets exist, how they connect, and what configurations they depend on, it’s impossible to isolate or rebuild critical systems effectively.
We’re encouraged to see ASD and ACSC reinforce this approach and believe that CI Fortify gives operators a practical roadmap for strengthening their environments in line with global OT security best practices.
CI Fortify is organized around three preparatory steps and two planned actions—a structure that emphasizes building the fundamentals first, then developing advanced resilience capabilities.
ASD notes that building these capabilities delivers value beyond cyber incidents. Organizations that plan for isolation and recovery are also better prepared for natural disasters, safety events, and supply-chain disruptions. Regularly testing these processes reduces downtime and financial loss while improving confidence in operational continuity.
CI Fortify gives Australia’s CI operators a clear strategic direction for improving OT security maturity. Turning that strategy into daily practice begins with visibility—the same foundation Industrial Defender was built on.
By maintaining a complete and trustworthy inventory of OT assets, tracking configuration changes, and preserving historical baselines, organizations can confidently plan for isolation and rebuild scenarios. These are the same building blocks that enable compliance with international frameworks like IEC 62443 and national standards such as the AESCSF.
As ASD and ACSC make resilience a national priority, Industrial Defender stands ready to help CI operators operationalize those principles—starting with the accurate visibility that CI Fortify identifies as step one.