Refine search Expand filter

Reports

Published

Actions for Machinery of government changes

Machinery of government changes

Premier and Cabinet
Treasury
Whole of Government
Management and administration
Project management

What the report is about

The term ‘machinery of government’ refers to the way government functions and responsibilities are organised.

The decision to make machinery of government changes is made by the Premier. Changes may be made for a range of reasons, including to support the policy and/or political objectives of the government of the day.

Larger machinery of government changes typically occur after an election or a change of Premier.

This report assessed how effectively the Department of Planning, Industry and Environment (DPIE) and the Department of Regional NSW (DRNSW) managed their 2019 and 2020 machinery of government changes, respectively. It also considered the role of the Department of Premier and Cabinet (DPC) and NSW Treasury in overseeing machinery of government changes.

What we found

The anticipated benefits of the changes were not articulated in sufficient detail and the achievement of benefits has not been monitored. The costs of the changes were not tracked or reported.

DPC and NSW Treasury provided principles to guide implementation but did not require departments to collect or report information about the benefits or costs of the changes.

The implementation of the machinery of government changes was completed within the set timeframes, and operations for the new departments commenced as scheduled.

Major implementation challenges included negotiation about the allocation of corporate support staff and the integration of complex corporate and ICT systems.

What we recommended

DPC and NSW Treasury should:

  • consolidate existing guidance on machinery of government changes into a single document that is available to all departments and agencies
  • provide guidance for departments and agencies to use when negotiating corporate services staff transfers as a part of machinery of government changes, including a standard rate for calculating corporate services requirements
  • progress work to develop and implement common processes and systems for corporate services in order to support more efficient movement of staff between departments and agencies.

Fast facts

  • $23.7m is the estimated minimum direct cost of the 2019 DPIE changes to date, noting additional ICT costs will be incurred
  • $4.0m is the estimated minimum direct cost of the 2020 DRNSW changes, with an estimated $2.7 million ongoing annual cost
  • 40+ NSW Government entities affected by the 2019 machinery of government changes

The term ‘machinery of government’ refers to the way government functions and responsibilities are allocated and structured across government departments and agencies. A machinery of government change is the reorganisation of these structures. This can involve establishing, merging or abolishing departments and agencies and transferring functions and responsibilities from one department or agency to another.

The decision to make machinery of government changes is made by the Premier. These changes may be made for a range of reasons, including to support the policy and/or political objectives of the government of the day. Machinery of government changes are formally set out in Administrative Arrangements Orders, which are prepared by the Department of Premier and Cabinet, as instructed by the Premier, and issued as legislative instruments under the Constitution Act 1902.

The heads of agencies subject to machinery of government changes are responsible for implementing them. For more complex changes, central agencies are also involved in providing guidance and monitoring progress.

The NSW Government announced major machinery of government changes after the 2019 state government election. These changes took place between April and June 2019 and involved abolishing five departments (Industry; Planning and Environment; Family and Community Services; Justice; and Finance, Services and Innovation) and creating three new departments (Planning, Industry and Environment; Communities and Justice; and Customer Service). This also resulted in changes to the 'clusters' associated with departments. The NSW Government uses clusters to group certain agencies and entities with related departments for administrative and financial management. Clusters do not have legal status. Most other departments that were not abolished had some functions added or removed as a part of these machinery of government changes. For example, the functions relating to regional policy and service delivery in the Department of Premier and Cabinet were moved to the new Department of Planning, Industry and Environment.

Our Report on State Finances 2019, tabled in October 2019, outlined these changes and identified several issues that can arise from machinery of government changes if risks are not identified early and properly managed. These include: challenges measuring the costs and benefits of machinery of government changes; disruption to services due to unclear roles and responsibilities; and disruption to control environments due to staff, system and process changes.

In April 2020, the Department of Regional NSW was created in a separate machinery of government change. This involved moving functions and agencies related to regional policy and service delivery from the Department of Planning, Industry and Environment into a standalone department.

This audit assessed how effectively the Department of Planning, Industry and Environment (DPIE) and the Department of Regional NSW (DRNSW) managed their 2019 and 2020 machinery of government changes, respectively. It also considered the role of the Department of Premier and Cabinet and NSW Treasury in overseeing machinery of government changes. The audit investigated whether:

  • DPIE and DRNSW have integrated new responsibilities and functions in an effective and timely manner
  • DPIE and DRNSW can demonstrate the costs of the machinery of government changes
  • The machinery of government changes have achieved or are achieving intended outcomes and benefits.
Conclusion

It is unclear whether the benefits of the machinery of government changes that created the Department of Planning, Industry and Environment (DPIE) and the Department of Regional NSW (DRNSW) outweigh the costs. The anticipated benefits of the changes were not articulated in sufficient detail and the achievement of directly attributable benefits has not been monitored. The costs of the changes were not tracked or reported. The benefits and costs of the machinery of government changes were not tracked because the Department of Premier and Cabinet (DPC) and NSW Treasury did not require departments to collect or report this information. The implementation of the machinery of government changes was completed within the set timeframes, and operations for the new departments commenced as scheduled. This was achieved despite short timelines and no additional budget allocation for the implementation of the changes.

The rationale for establishing DPIE was not documented at the time of the 2019 machinery of government changes and the anticipated benefits of the change were not defined by the government or the department. For DRNSW, the government’s stated purpose was to provide better representation and support for regional areas, but no prior analysis was conducted to quantify any problems or set targets for improvement. Both departments reported some anecdotal benefits linked to the machinery of government changes. However, improvements in these areas are difficult to attribute because neither department set specific measures or targets to align with these intended benefits. Since the machinery of government changes were completed, limited data has been gathered to allow comparisons of performance before and after the changes.

DPC and NSW Treasury advised that they did not define the purpose and benefits of the machinery of government changes, or request affected departments to do so, because these were decisions of the government and the role of the public service was to implement the decisions.

We have attempted to quantify some of the costs of the DPIE and DRNSW changes based on the information the audited agencies could provide. This information does not capture the full costs of the changes because some costs, such as the impact of disruption on staff, are very difficult to quantify, and the costs of ICT separation and integration work may continue for several more years. Noting these limitations, we estimate the initial costs of these machinery of government changes are at least $23.7 million for DPIE and $4.0 million for DRNSW. For DPIE, this is predominantly made up of ICT costs and redundancy payments made around the time of the machinery of government change. For DRNSW it includes ICT costs and an increase in senior executive costs for a standalone department, which we estimate is an ongoing cost of at least $1.9 million per year.

For the DPIE machinery of government change, there were risks associated with placing functions and agencies that represent potentially competing policy interests within the same 'cluster', such as environment protection and industry. We did not see evidence of plans to manage these issues being considered by DPIE as a part of the machinery of government change process.

The efficiency of machinery of government changes could be improved in several ways. This includes providing additional standardised guidance on the allocation of corporate functions and resources when agencies are being merged or separated, and consolidating guidance on defining, measuring and monitoring the benefits and costs of machinery of government changes.

Appendix one – Response from agencies

Appendix two – About the audit

Appendix three – Performance auditing

 

Copyright notice

© Copyright reserved by the Audit Office of New South Wales. All rights reserved. No part of this publication may be reproduced without prior consent of the Audit Office of New South Wales. The Audit Office does not accept responsibility for loss or damage suffered by any person acting on or refraining from action as a result of any of this material.

 

Parliamentary reference - Report number #359 - released (17 December 2021).

Published

Actions for COVID Intensive Learning Support Program

COVID Intensive Learning Support Program

Education
Management and administration
Project management
Service delivery
Workforce and capability

What the report is about

This audit examined a state-wide program to provide small-group tuition to students disadvantaged by the move to learning from home during 2020.

The audit assessed the design and implementation of the program.

What we found

The program design was based on research and data showing learning loss during 2020. 

The department rapidly planned and developed the policy design and guidelines for schools. 

Governance arrangements matured during program delivery.

The department changed the models for funding schools but did not clearly explain the reasons for doing so.

Government schools with over 900 students were disadvantaged by the funding model compared to smaller schools. 

Guidelines, resources and professional learning helped schools implement the program.

Staff eligibility for the program was expanded after reported difficulties in recruiting qualified teachers in some areas. 

Online tuition and third-party provider options were developed throughout the program.

There were issues with the quality and timeliness of data used to monitor school progress. 

Evaluation arrangements were developed early in the program.

Data limitations mean the evaluation will not be able to fully assess all program objectives.

What we recommended

  1. Distributing funds between schools more equitably and improving communication of the funding methods. 
  2. Clearer communication about the intended targeted group of students.
  3. Reviewing the time needed to administer the program.
  4. Improve support for educators other than qualified teachers.
  5. Offer the online tuition program to more schools.
  6. Analysis of the effects of learning from home during 2021 across equity groups and geographic areas.
  7. Working with universities to increase use of pre-service teachers in the program.

The report also identifies lessons learned for future programs.
 

Fast facts

  • $337m in total program funding. $289 million for government schools and $31 million for non government schools
  • 12 days to develop the policy and provide costings to Treasury 
  • 290,000 targeted students in government schools and 31,000 in non government schools
  • 80% of schools were providing small group tuition by the target start date of Week 6, Term 1
  • 2–4 months was the estimated student learning loss from the move to learning from home during 2020
  • 7,600 tutors engaged in the program as at September 2021.

The NSW Government announced the COVID Intensive Learning Support Program on 10 November 2020, as part of the 2020–21 NSW Budget. The primary goal of the $337 million program was to deliver intensive small group tuition for students who were disadvantaged by the move to remote and/or flexible learning, helping to close the equity gap. It included:

  • $306 million to provide small-group tuition for eligible students across every NSW Government primary, secondary and special purpose school
  • $31.0 million for around 400 non-government schools to provide small-group tuition to students with the greatest levels of need.

The objective of this audit was to assess the effectiveness of the design and implementation of the COVID Intensive Learning Support Program (the program). To address this objective, the audit assessed whether the Department of Education (the department):

  • effectively designed the program and supporting governance arrangements
  • is effectively implementing the program.

This audit focuses on activities between October 2020 and August 2021, which aimed to address the first session of learning from home in New South Wales. From August to October 2021, students in many areas of New South Wales were learning from home again, but this second period has not been a focus of this audit. On 18 October 2021, the NSW Government announced the program would be extended into 2022.

Conclusion

The COVID Intensive Learning Support Program was effectively designed to help students catch up on learning loss due to the interruptions to schooling caused by COVID-19. The department rapidly stood up a taskforce to implement the program and then developed supporting governance arrangements during implementation.

Most students in New South Wales were required to learn from home for at least seven weeks during 2020 due to the impact of the Novel-Coronavirus (COVID-19). The department researched, analysed and advised government on several options to address the learning loss that resulted. It recommended small group tuition as the preferred option as it was supported by available evidence and could be rolled out at scale with speed. It identified risks of ensuring an adequate supply of educators and options to address those risks. Consistent with its analysis of where the impact of the learning loss was most severe, the department proposed to direct funding to schools with higher concentrations of students from the most disadvantaged backgrounds.

The department established a cross-functional taskforce to conduct detailed planning and support program implementation. Short timeframes meant the taskforce initially sought approval for key decisions from the program sponsor and existing oversight bodies on an as-needed basis before dedicated program governance arrangements were formalised. Once established, the governance body met regularly to oversee program delivery.

The COVID Intensive Learning Support Program is being effectively implemented. The department has refined the program during rollout to respond to risks, issues and feedback from schools. Issues with how schools enter data into department systems have affected the timeliness and accuracy of program monitoring information.

The department provided schools with guidelines, example models of delivery, systems to record student progress and professional learning. Around 80 per cent of schools had begun delivering tuition under the program by the target date. Schools reported issues with sourcing qualified teachers as a key reason they were unable to start the program by the expected date. In response, the department expanded the type of staff schools could employ, developed an online tuition program, and allowed schools to engage third-party providers to help schools that had difficulty finding qualified teachers for the program.

The department used existing systems to monitor school progress in implementing the program. This reduced the administrative burden on schools, but there were several issues with data quality and timeliness. The program included a mid-year review point to check whether schools were on track to spend their funding. This helped focus schools on ensuring funding would be spent and allowed for redistribution between schools.

The department considered program evaluation early in policy design and planning. It embedded an evaluator on the taskforce and expanded a key assessment program to help provide evidence of impact. A process and outcome evaluation is underway which will help inform future delivery. The evaluation will examine educational impacts for students participating in the program but it has not established methods to reliably assess the extent to which the program has met a goal to help 'close the equity gap' for students.

This chapter considers how effectively the COVID Intensive Learning Support Program (the program) was designed and planned for implementation.

This chapter considers how effectively the COVID Intensive Learning Support Program was implemented over our period of review (Terms 1 and 2, 2021).

Appendix one – Response from agency

Appendix two – About the audit

Appendix three – Performance auditing

Copyright notice

© Copyright reserved by the Audit Office of New South Wales. All rights reserved. No part of this publication may be reproduced without prior consent of the Audit Office of New South Wales. The Audit Office does not accept responsibility for loss or damage suffered by any person acting on or refraining from action as a result of any of this material.

 

Parliamentary reference - Report number #358 - released (15 December 2021).

Published

Actions for Compliance with the NSW Cyber Security Policy

Compliance with the NSW Cyber Security Policy

Whole of Government
Compliance
Cyber security
Information technology

What the report is about

This audit assessed nine agencies’ compliance with the NSW Cyber Security Policy (CSP) including whether, during the year to 30 June 2020, the participating agencies:

  • met their reporting obligations under the CSP
  • reported accurate self-assessments of their level of maturity implementing the CSP’s requirements including the Australian Cyber Security Centre’s (ACSC) Essential 8.

What we found

Key elements to strengthen cyber security governance, controls and culture are not sufficiently robust and not consistently applied. The CSP is not achieving the objectives of improved cyber governance, controls and culture because:

  • the CSP does not specify a minimum level for agencies to achieve in implementing the 'mandatory requirements' or the Essential 8
  • the CSP does not require agencies to report their target levels, nor does it require risk acceptance decisions to be documented or formally endorsed
  • each participating agency had implemented one or more of the mandatory requirements in an ad hoc or inconsistent basis
  • none of the participating agencies had implemented all of the Essential 8 controls
  • agencies tended to over-assess their cyber security maturity - all nine participating agencies were unable to support all of their self-assessments with evidence
  • there is no monitoring of the adequacy or accuracy of agencies' self-assessments.

What we recommended

In this report, we repeat recommendations made in the 2019 and 2020 Central Agencies reports, that Cyber Security NSW and NSW Government agencies need to prioritise improvements to cyber security resilience as a matter of urgency.

Cyber Security NSW should:

  • monitor and report compliance with the CSP
  • require agencies to report the target and achieved levels of maturity
  • require agencies to justify why it is appropriate to target a low level of maturity
  • require the agency head to formally accept the residual risk
  • challenge agencies' target maturity levels.

Agencies should resolve discrepancies between their reported level of maturity and the level they are able to support with evidence.

Separately, the agencies we audited requested that we not disclose our audit findings. We reluctantly agreed to anonymise our findings, even though they are more than 12 months old. We are of the view that transparency and accountability to the Parliament of New South Wales are part of the solution, not the problem.

The poor levels of agency cyber security maturity are a significant concern. Improvement requires leadership and resourcing.

Fast facts

The NSW Cyber Security Policy requires agencies to report their level of maturity implementing the mandatory requirements, which includes the ACSC's Essential 8.

  • 100% of audited agencies failed to reach level one maturity for at least three of the Essential 8 controls.

  • 53% of mandatory requirements implemented in an ad hoc or inconsistent manner, or not at all.

  • 89 of the 104 reporting agencies across government met the reporting deadline of 31 August.

This report assesses whether state government agencies are complying with the NSW Cyber Security Policy. The audit was based on the level of compliance reported at 30 June 2020.

Our audit identified non-compliance and significant weaknesses against the government’s policy.

Audited agencies have requested that we not report the findings of this audit to the Parliament of New South Wales, even though the findings are more than 12 months old, believing that the audit report would expose their weaknesses to threat actors.

I have reluctantly agreed to modify my report to anonymise agencies and their specific failings because the vulnerabilities identified have not yet been remedied. Time, leadership and prioritised action should have been sufficient for agencies to improve their cyber safeguards. I am of the view that transparency and accountability to the Parliament is part of the solution, not the problem.

The poor levels of cyber security maturity are a significant concern. Improvement requires dedicated leadership and resourcing. To comply with some elements of the government’s policy agencies will have to invest in technical uplift and some measures may take time to implement. However, other elements of the policy do not require any investment in technology. They simply require leadership and management commitment to improve cyber literacy and culture. And they require accountability and transparency. Transparent reporting of performance is a key means to improve performance.

Cyber security is increasingly a focus of governments around Australia. The Australian Cyber Security Centre (ACSC) is the Australian Government’s lead agency for cyber security and is part of the Australian Signals Directorate, a statutory authority within the Australian Government’s Defence portfolio. The ACSC has advised that government agencies at all levels, as well as individuals and other organisations were increasingly targeted over the 2021 financial year1. The ACSC received over 67,500 cybercrime reports, a 13 per cent increase on the previous year. This equates to one reported cyber attack every eight minutes. They also noted that attacks by cyber criminals and state actors are becoming increasingly sophisticated and complex and that the attacks are increasingly likely to be categorised as ‘substantial’ in impact.

High profile attacks in Australia and overseas have included a sustained malware campaign targeted at the health sector2, a phishing campaign deploying emotet malware, spear phishing campaigns targeting people with administrator or other high-level access, and denial of service attacks. The continuing trend towards digital delivery of government services has increased the vulnerability of organisations to cyber threats.

The COVID-19 pandemic has increased these risks. It has increased Australian dependence on the internet – to work remotely, to access services and information, and to communicate and continue our daily lives. Traditional security policies within an organisation’s perimeter are harder to enforce in networks made up of home and other private networks, and assets the organisation does not manage. This has increased the cyber risks for NSW Government agencies.

In March 2020, Service NSW suffered two cyber security incidents in short succession. Technical analysis undertaken by the Department of Customer Service (DCS) concluded that these cyber breaches resulted from a phishing exercise through which external threat actors gained access to the email accounts of 47 staff members. These attacks resulted in the breach of a large amount of personal customer information contained in these email accounts. These attacks were the subject of the Auditor-General's report on Service NSW's handling of personal information tabled on 18 December 2020.

This audit also follows two significant performance audits. Managing cyber risks, tabled on 13 July 2021 found Transport for NSW and Sydney Trains were not effectively managing their cyber security risks. Integrity of data in the Births, Deaths and Marriages Register, tabled 7 April 2020 found that although there are controls in place to prevent and detect unauthorised access to, and activity in the register, there were significant gaps in these controls.

The NSW Cyber Security Policy (CSP) was issued by Cyber Security NSW, a business unit within the Department of Customer Service, and took effect from 1 February 2019. It applies to all NSW Government departments and public service agencies, including statutory authorities. Of the 104 agencies in the NSW public sector that self-assessed their maturity implementing the mandatory requirements, only five assessed their maturity at level three or above (on the five point maturity scale). This means that, according to their own self-assessments, 99 agencies practiced requirements within the framework in what the CSP’s maturity model describes as an ad hoc manner, or they did not practice the requirement at all. Cyber Security NSW and NSW Government agencies need to prioritise improvements to their cybersecurity and resilience as a matter of priority.

This audit looks specifically at the compliance of nine key agencies with the CSP. It looks at their achievement implementing the requirements of the policy, the accuracy of their self-assessments and the attestations they made as to their compliance with the CSP.

The CSP outlines the mandatory requirements to which all NSW Government departments and public service agencies must adhere. It seeks to ensure cyber security risks to agencies’ information and systems are appropriately managed. The key areas of responsibility for agencies are:

  • Lead - Agencies must implement cyber security planning and governance and report against the requirements outlined in the CSP and other cyber security measures.
  • Prepare - Agencies must build and support a cyber security culture across their agency and NSW Government more broadly.
  • Prevent - Agencies must manage cyber security risks to safeguard and secure their information and systems.
  • Detect/Respond/Recover - Agencies must improve their resilience including their ability to rapidly detect cyber incidents and respond appropriately.
  • Report - Agencies must report against the requirements outlined in the CSP and other cyber security measures.

DCS has only recommended, but not mandated the CSP for state owned corporations, local councils and universities.

NSW Government agencies must include an attestation on cyber security in their annual report and provide a copy to Cyber Security NSW by 31 August each year stating whether, for the preceding financial year, the agency has:

  • assessed its cyber security risks
  • appropriately addressed cyber security at agency governance forums
  • a cyber incident response plan that is integrated with the security components of business continuity arrangements, and the response plan has been tested during the previous 12 months (involving senior business executives)
  • certified the agency’s Information Security Management System (ISMS) or confirmed the agency’s Cyber Security Framework (CSF)
  • a plan to continuously improve the management of cyber security governance and resilience.

The purpose of the attestation is to focus the agency's attention on its cyber risks and the mitigation of those risks.

Agencies assess their level of compliance in accordance with a maturity model. The CSP does not mandate a minimum maturity threshold for any requirement, including implementation of the Australian Cyber Security Centre's (ACSC) Essential 8 Strategies to Mitigate Cyber Security Incidents (Essential 8).

Agencies are required to set a target maturity level based on their risk appetite for each requirement, seek continual improvement in their maturity, and annually assess their maturity on an ascending scale of one to five for all requirements (refer to Appendix two for the maturity model). Each control within the Essential 8 is assessed on an ascending scale of zero to three reflecting the agency's level of alignment with the strategy (refer to Appendix three for the maturity model).

Scope of this audit

We assessed whether agencies had provided accurate reporting on their level of maturity implementing the requirements of the CSP in a documented way and covering all their systems.

The scope of this audit covered nine agencies (the participating agencies). These agencies were selected because they are the lead agency in their cluster, or have a significant digital presence within their respective cluster. The list of participating agencies is in section 1.2. The audit aimed to determine whether, during the year to 30th June 2020, the participating agencies:

  • met their reporting obligations under the CSP
  • provided accurate reporting in self-assessments against the CSP’s mandatory requirements, including their implementation of the Australian Cyber Security Centre’s (ACSC) Essential 8
  • achieved implementation of mandatory requirements at maturity levels which meet or exceed the ‘level three - defined’ threshold (i.e. are documented and practiced on a regular and consistent basis).

While the audit does assess the accuracy of agency self-assessed ratings, the audit did not assess the appropriateness of the maturity ratings.

Conclusion

Key elements to strengthen cyber security governance, controls and culture are not sufficiently robust and not consistently applied. There has been insufficient progress to improve cyber security safeguards across NSW Government agencies.
The NSW CSP replaced the NSW Digital Information Security Policy from 1 February 2019. New requirements of the CSP were, inter alia, to strengthen cyber security governance, strengthen cyber security controls and improve cyber security culture.
The CSP is not achieving the objective of improved cyber governance, controls and culture because:
  • The CSP does not specify a minimum level for agencies to achieve in implementing the 'mandatory requirements' or the Essential 8 Strategies to Mitigate Cyber Security Incidents.
  • The CSP does not require agencies to report their target levels, nor does it require risk acceptance decisions to be documented or formally endorsed.
  • All of the participating agencies had implemented one or more of the mandatory requirements in an ad hoc or inconsistent basis.
  • None of the participating agencies had implemented all of the Essential 8 controls to at least level one.
  • Agencies tended to over-assess their cyber security maturity, with all nine participating agencies unable to support some of their self-assessments of compliance with one or more mandatory criteria. Optimistic assessment of the current state of cyber resilience undermines effective decision making and risk management in responding to cyber risks.
  • There is no systematised and formal monitoring, by either Cyber Security NSW or another agency, of the adequacy or accuracy of agencies' cyber self-assessment processes.

 

1. Key findings

The CSP allows agencies to determine their own level of maturity to implement the 'mandatory requirements', which can include not practicing a policy requirement or implementing a policy requirement on an ad hoc basis. These determinations do not need to be justified

Agencies can decide not to implement requirements of the CSP, or they can decide to implement them only in an informal or ad-hoc manner. The CSP allows agencies to determine their desired level of maturity in implementing the requirements on a scale of one to five - level one being 'initial – not practiced' and level five being 'optimised'. The desired level of maturity is determined by the agency based on their own assessment of the risk of the services they provide and the information they hold.

The reporting template for the 2019 version of the CSP stated that level three maturity - where a policy requirement is practiced on a regular and consistent basis and its processes are documented - was required for compliance with the CSP. This requirement was removed in the 2020 revision of the reporting template.

This CSP does not require the decisions on risk tolerance, or the timeframes agencies have set to implement requirements to be documented or formally endorsed by the agency head. There is no requirement to report these decisions to Cyber Security NSW.

Some comparable jurisdictions require formal risk acceptance decisions where requirements are not implemented. The NSW CSP does not have a similar formal requirement

Some jurisdictions, with a similar policy framework to NSW, require agencies to demonstrate reasons for not implementing requirements, and require agency heads to formally acknowledge the residual risk. The NSW CSP does not require these considerations to be documented, nor does it require an explicit acknowledgement and acceptance of the residual risk by the agency head or Cyber Security NSW. The NSW CSP does not require that the records of how agencies considered and decided which measures to adopt to be documented and auditable, limiting transparency and accountability of decisions made.

All of the participating agencies had implemented one or more of the mandatory requirements in an ad hoc or inconsistent basis

All of the participating agencies had implemented one or more of the mandatory requirements at level one or two. Maturity below level three typically means not all elements of the requirement have been implemented, or the requirements have been implemented on an ad-hoc or inconsistent basis.

None of the participating agencies has implemented all of the Essential 8 controls at level one – that is, only partly aligned with the intent of the mitigation strategy

Eight of the nine agencies we audited had not implemented any of the Essential 8 strategies to level three – that is, fully aligned with the intent of the mitigation strategy. At the time of this audit the ACSC advised that:

as a baseline organisations should aim to reach to reach Maturity Level Three for each mitigation strategy3.

The Australian Signals Directorate4 currently advises that, with respect to the Essential 8:

[even] level three maturity will not stop adversaries willing and able to invest enough time, money and effort to compromise a target. As such, organisations still need to consider the remainder of the mitigation strategies from the Strategies to Mitigate Cyber Security Incidents and the Australian Government Information Security Manual

All agencies failed to reach even level one maturity for at least three of the Essential 8.

Cyber Security NSW modified the ACSC model for implementation of the Essential 8

The NSW maturity model used for the Essential 8 does not fully align with the ACSC’s model. At the time of this audit the major difference was the inclusion of level zero in the NSW CSP maturity scale. Level zero broadly means that the relevant cyber mitigation strategy is not implemented or is not applied consistently. Level zero had been removed by the ACSC in February 2019 and was not part of the framework at the time of this audit. It was re-introduced in July 2021 when the ACSC revised the detailed criteria for each element of the essential 8 maturity model. The indicators to reach level one on the new ACSC model are more detailed, specific and rigorous than those currently prescribed for NSW Government agencies. Cyber Security NSW asserted the level zero on the CSP maturity scale:

is not identical to the level zero of the ACSC’s previous Essential 8 maturity model, but is a NSW-specific inclusion designed to prevent agencies incorrectly assessing as level one when they have not achieved that level.

Attestations did not accurately reflect whether agencies implemented the requirements

Of the nine participating agencies, seven did not modify the proforma wording in their attestation to reflect their actual situation. Despite known gaps in their implementation of mandatory requirements, these agencies stated that they had 'managed cyber security risks in a manner consistent with the Mandatory Requirements set out in the NSW Government Cyber Security Policy'. Only two agencies modified the wording of the attestation to reflect their actual situation.

Attestations should be accurate so that agencies’ and the government’s response to the risk of cyber attack is properly informed by an understanding of the gaps in agency implementation of the policy requirements and the Essential 8. Without accurate information about these gaps, subsequent decisions as to prioritisation of effort and deployment of resources are unlikely to effectively mitigate the risks faced by NSW Government agencies.

Participating agencies were not able to support all of their self-assessments with evidence and had overstated their maturity assessments, limiting the effectiveness of agency risk management approaches

Seven of the nine participating agencies reported levels of maturity against both the mandatory requirements and the Essential 8 that were not supported by evidence.

Each of the nine participating agencies for this audit had overstated their level of maturity against at least one of the 20 mandatory requirements. Seven agencies were not able to provide evidence to support their self-assessed ratings for the Essential 8 controls.

Where agency staff over-assess the current state of their cyber resilience, it can undermine the effectiveness of subsequent decision making by Agency Heads and those charged with governance. It means that actions taken in mitigating cyber risks are less likely to be appropriate and that gaps in implementing cyber security measures will remain, exposing them to cyber attack.

Agencies' self-assessments across government exposed poor levels of maturity in implementing the mandatory requirements and the Essential 8 controls

We reviewed the data 104 NSW agencies provided to Cyber Security NSW. The 104 agencies includes nine audited agencies referred to in more detail in this report. Our review of the 104 agency self-assessment returns submitted to Cyber Security NSW highlighted that, consistent with previous years, there remains reported poor levels of cyber security maturity. We reported the previous years’ self-assessments in the Central Agencies 2019 Report to Parliament and the Central Agencies 2020 Report to Parliament.

Only five out of the 104 agencies self-assessed that they had implemented all of the mandatory requirements at level three or above (against the five point scale). Fourteen agencies self-assessed that they had implemented each of the Essential 8 controls at level one maturity or higher (using Cyber NSW’s four point scale). The remainder reported at level zero for implementation of one or more of the Essential 8 controls, meaning that for the majority of agencies the cyber mitigation strategy has not been implemented, or is applied inconsistently.

Where agencies had reported in both 2019 and 2020, agencies’ self-assessments showed little improvement over the previous year’s self-assessments:

  • 14 agencies reported improvement across both the Essential 8 and the mandatory requirements
  • 8 agencies reported a net decline in both the Essential 8 and the mandatory requirements.

The poor levels of maturity in implementing the Essential 8 over the last couple of years is an area of significant concern that requires better leadership and resourcing to prioritise the required significant improvement in agency cyber security measures.

2. Recommendations

Cyber Security NSW should:

1. monitor and report compliance with the CSP by:

  • obtaining objective assurance over the accuracy of self-assessments
  • requiring agencies to resolve inaccurate or anomalous self-assessments where these are apparent

2. require agencies to report:

  • the target level of maturity for each mandatory requirement they have determined appropriate for their agency
  • the agency head's acceptance of the residual risk where the target levels are low

3. identify and challenge discrepancies between agencies' target maturity levels and the risks of the information they hold and services they provide

4. more closely align their policy with the most current version of the ACSC model.

Participating agencies should:

5. resolve the discrepancies between their reported level of maturity and the level they are able to demonstrate with evidence, and:

  • compile and retain in accessible form the artefacts that demonstrate the basis of their self-assessments
  • refer to the CSP guidance when determining their current level of maturity
  • ensure the attestations they make refer to departures from the CSP
  • have processes whereby the agency head and those charged with governance formally accept the residual cyber risks.

Repeat recommendation from the 2019 Central Agencies report and the 2020 Central Agencies report

6. Cyber Security NSW and NSW Government agencies need to prioritise improvements to their cyber security and resilience as a matter of urgency.


The objective of the CSP is to ensure cyber security risks are appropriately managed. However, meeting this objective depends on the requirements being implemented at all agencies to a level of maturity that addresses their specific cyber security risks. Agency systems and data are increasingly interconnected. If an agency does not implement the requirements, or implements them only in an ad-hoc or informal way, an agency is more susceptible to their systems and data being compromised, which may affect the confidentiality of citizens' data and the reliability of services, including critical infrastructure services.

Agencies determine their own target level of maturity, which may mean the requirement is not addressed, or is addressed in an ad hoc or inconsistent way

While the CSP is mandatory for all agencies, it does not set a minimum maturity threshold for agencies to meet.

The reporting template issued in 2019 stated that agencies were required to reach level three maturity in order to comply with the CSP. The 2020 revision6 of the CSP and guidance indicates that level three maturity may not be sufficient to mitigate risks. It advises the agency may determine the level to which it believes it is suitable to implement the requirements, and allows for an agency to aim for a target level of maturity less than level three. The agency can set its optimal maturity level with reference to its risk tolerance with the objective that that aim ‘to be as high as possible’. However, ‘as high as possible’ does not necessarily mean ‘fully implemented’. The CSP contemplates that a lower level of maturity is sufficient if it aligns with the agency's risk tolerance.

2019 reporting template 2020 reporting template
‘A Mandatory Requirement is considered met if a maturity level of three is achieved. The Agency may choose to pursue a higher maturity level if required.

There is no mandated level for the Essential 8 Maturity reporting’.

‘There is no mandated maturity level for either the Mandatory Requirement reporting or Essential 8 reporting. Agencies need to risk-assess their optimal maturity and aim to be 'as high as possible’.
Source: Maturity Reporting Template v4.0, February 2019.
Source: CSP Reporting Template 2020, May 2020.

The Department of Customer Service asserts that while the quotes above were part of their annual templates and policy documents, their documents were incorrect. They assert that the policy has never required a minimum level of maturity to be reached. They have responded to our enquiries that:

…a level three maturity was not a requirement of the Policy or Maturity Model’ and ‘it is misleading to suggest it was a requirement of the Policy.

This audit found that, based on the 2020 reporting template there is no established minimum baseline. Consequently, because the Department of Customer Service had not established a minimum baseline agencies are able to target lower levels (providing they were within the agency’s own risk appetite), which includes targeting to not practice a CSP policy requirement, or to practice a CSP policy requirement on an ad hoc basis.

Where requirements are not implemented, documentation of formal acceptance of the residual risks by the agency head is not required

The New Zealand Government has an approach that is not dissimilar to NSW, in that it also identifies 20 mandatory requirements and allows for a risk based approach to implementation. However, the New Zealand approach puts more rigor around risk acceptance decisions.

The New Zealand Government requires that agencies that do not implement the requirements must demonstrate that a measure is not relevant for them. It requires agencies to document the rationale for not implementing the measure, including explicit acknowledgement of the residual risk by the agency head. They require these records to be auditable.

A security measure with a ‘must’ or ‘must not’ compliance requirement is mandatory. You must implement or follow mandatory security measures unless you can demonstrate that a measure is not relevant in your context.

Not using a security measure without due consideration may increase residual risk for your organisation. This residual risk needs to be agreed and acknowledged by your organisation head.

A formal auditable record of how you considered and decided which measures to adopt is required as part of the governance and assurance processes within your organisation.

Source: Overview of Protective Security Requirements, New Zealand Government (PSR-Overview-booklet.pdf (protectivesecurity.govt.nz).

The NSW CSP does not require these considerations to be documented or auditable and does not require an explicit acknowledgement or acceptance of the residual risk by the agency head.

None of the participating agencies achieved level three implementation for all mandatory risk prevention and mitigation requirements

Maturity level three is the minimum level whereby an agency has implemented documented processes that are practiced on a regular basis across their environment. An agency has not reached level three if the requirement is implemented on an ad-hoc or inconsistent basis, or if not all elements of the requirement have been implemented.

None of the participating agencies achieved level three implementation for all mandatory requirements.

The requirements of the CSP are organised into five sections. Agency implementation of these requirements is discussed in the next five sections of this report.

  • Lead: Planning and governance requirements. Section 2.1
  • Prepare: Cyber security culture requirements. Section 2.2
  • Prevent: Managing cyber incident prevention requirements. Section 2.3
  • Detect/Respond/Recover: Resilience requirements. Section 2.4
  • Report: Reporting requirements. Section 2.5.

 


6The reporting template issued in 2019 required agencies to reach level three, but that guidance was removed in the 2020 revision.

Appendix one – Response from agencies

Appendix two – The maturity model for the mandatory requirements

Appendix three – Essential 8 maturity model

Appendix four – About the audit

 

Copyright notice

© Copyright reserved by the Audit Office of New South Wales. All rights reserved. No part of this publication may be reproduced without prior consent of the Audit Office of New South Wales. The Audit Office does not accept responsibility for loss or damage suffered by any person acting on or refraining from action as a result of any of this material.

Published

Actions for Fast-tracked Assessment Program

Fast-tracked Assessment Program

Planning
Industry
Environment
Compliance
Internal controls and governance
Management and administration
Service delivery

What the report is about

This report examines the effectiveness of the Fast-tracked Assessment Program, administered by the Department of Planning, Industry and Environment (DPIE) between April 2020 and October 2020. 

The program aimed to support the construction industry during the COVID-19 crisis by accelerating the final assessment stages for planning proposals and development applications. 

DPIE selected projects and planning proposals for fast tracked assessment that demonstrated the potential to:

  • deliver jobs
  • progress to the next stage of development within six months of determination
  • deliver public benefit.

The audit assessed whether the Fast-tracked Assessment Program achieved its objectives while complying with planning controls.

What we found

Through tranches three to six of the program, DPIE successfully accelerated the final stages of 53 assessments. DPIE reported that 89 per cent of these proceeded to the next stage of development within six months.

Assessment of projects and planning proposals was compliant with legislation and other requirements. However, the audit found gaps in DPIE's management of conflicts of interest.

DPIE has not evaluated or costed the program and is not able to demonstrate the extent to which it provided support to the construction industry during COVID-19. 

Aspects of the program have been incorporated into longer term reforms to create a new level of transparency over the progress and status of planning assessments. 

What we recommended

DPIE should:

  • strengthen controls over conflicts of interest 
  • evaluate the Fast-tracked Assessment Program.

Fast facts

Construction industry support 
  • The program aimed at providing immediate support to the construction industry during the COVID-19 crisis
59 fast-tracked projects 
  • 59 projects and 42 planning proposals projects were assessed in six tranches
89% of all fast-tracked assessments in tranches three to six progressed to the next stage of the planning process within six months of determination

In April 2020, the Department of Planning, Industry and Environment (DPIE) introduced programs aimed at providing immediate support to the construction industry during the COVID-19 crisis. One of these was the Fast-tracked Assessment Program. This program identified planning proposals and development applications (DAs), across six tranches, that were partially-assessed and could be accelerated to determination.

In accordance with the program objectives, the planning proposals and DAs selected for fast-tracked assessment had to:

  • deliver jobs – particularly in the construction industry
  • be capable of progressing to the next stage of development within six months of determination
  • deliver public benefit.

At the same time, the Fast-tracked Assessment Program was to lay a foundation for future reform of the planning system by piloting changes in the assessment process that could be adopted in the medium to long term.

This audit assessed whether the Fast-tracked Assessment Program achieved its objectives while complying with planning controls. The audit focused on tranches three to six of the program, which were determined between July 2020 and October 2020. The rationale for focusing on these four tranches was that the program design had been slightly modified after the first two tranches to address identified risks.

Conclusion

Through tranches three to six of the Fast-tracked Assessment Program, DPIE successfully accelerated the final stages of 53 assessments. DPIE’s internal monitoring indicates that 31 DAs and 16 planning proposals selected in these tranches proceeded to the next stage of development within six months of determination. DPIE achieved this while also successfully managing the risk of non-compliance with planning controls arising from the accelerated process. While DPIE has incorporated components of the Fast-tracked Assessment Program into other longer-term reforms, it has not evaluated the program and is not able to demonstrate the extent to which the program provided support to the construction industry during COVID-19.

Between April and October 2020, DPIE adopted a case management approach to accelerate the final stages of assessment for 42 planning proposals and 59 DAs in six tranches. Tranches three to six were the focus of this audit and included 22 planning proposals and 31 DAs. Applicants involved in the program were expected to progress their projects to the next stage of development within six months of determination. While DPIE had no way of compelling applicants to do this and relied on non-binding commitments obtained from applicants, DPIE’s internal monitoring indicates that 47 of the 53 applicants selected in tranches three to six honoured this commitment.

Fast-tracked assessment only applied to the final stages of assessment and required DPIE staff and other stakeholders to work towards a determination deadline. DPIE effectively used a case management approach to manage the risk that the accelerated timeframe could result in planning controls not being fully compliant with legislation. There is some room for improvement in the process, as four of 28 staff assessing planning proposals and DAs had not lodged current conflict of interest declarations.

Based on the results of and learnings from the Fast-tracked Assessment Program, DPIE has incorporated some elements of the program into other longer-term reforms. There is now increased transparency about when applicants can expect to receive a planning determination and DPIE has also introduced a case management approach for strategic and high priority planning applications. Applicants benefiting from case-managed assessment are now required to commit to a formal service charter that specifies the obligations of both DPIE and the applicant.

DPIE has not evaluated the Fast-tracked Assessment Program to understand the costs and benefits of the program, nor which aspects of the program were most effective as a basis for future reform.

Appendix one – Response from agency

Appendix two – Planning determination pathways

Appendix three – About the audit

Appendix four – Performance auditing

 

© Copyright reserved by the Audit Office of New South Wales. All rights reserved. No part of this publication may be reproduced without prior consent of the Audit Office of New South Wales. The Audit Office does not accept responsibility for loss or damage suffered by any person acting on or refraining from action as a result of any of this material.

Parliamentary reference - Report number #354 - released (27 July 2021).

Published

Actions for Managing cyber risks

Managing cyber risks

Whole of Government
Transport
Cyber security
Information technology
Internal controls and governance
Procurement
Risk

What the report is about

This audit assessed how effectively Transport for NSW (TfNSW) and Sydney Trains identify and manage their cyber security risks.

The NSW Cyber Security Policy (CSP) sets out 25 mandatory requirements for agencies, including implementing the Australian Cyber Security Centre’s Essential 8 strategies to mitigate cyber security incidents, and identifying the agency’s most vital systems, their ‘crown jewels’. 

The audited agencies have requested that we do not disclose detail of the significant vulnerabilities detected during the audit, as these vulnerabilities are not yet remediated. We provided a detailed report to the agencies in December 2020 outlining significant issues identified in the audit. We have conceded to the agencies' request but it is disappointing that transparency to the Parliament and the public on issues that potentially directly affect them needs to be limited in this way.

What we found

TfNSW and Sydney Trains are not effectively managing their cyber security risks.

Both agencies have assessed their cyber security risks as unacceptably high and both agencies had not identified all of the risks we detected during this audit – some of which are significant.

Both agencies have cyber security plans in place that aim to address cyber security risks. TfNSW and Sydney Trains have combined this into the Transport Cyber Defence Rolling Program, part of the Cyber Defence Portfolio (CDP). 

However, neither agency has reached its target ratings for the CSP and the Essential 8 and maturity is low in relation to significant risks and vulnerabilities exposed.

Further, neither agency is fostering a culture where cyber security risk management is an important and valued aspect of decision-making.

TfNSW is not implementing cyber security training effectively across the cluster with only 7.2% of staff having completed basic cyber security training.

What we recommended

TfNSW and Sydney Trains should:

  • develop and implement a plan to uplift the Essential 8 controls to the agency's target state
  • as a matter of priority, address the vulnerabilities identified as part of this audit and previously described in a detailed Audit Office report provided to both agencies
  • ensure cyber security risk reporting to executives and the Audit and Risk Committee
  • collect supporting information for the CSP self assessments 
  • classify all information and systems according to importance and integrate this with the crown jewels identification process
  • require more rigorous analysis to re-prioritise CDP funding 
  • increase uptake of cyber security training.

TfNSW should assess the appropriateness of its target rating for each of the CSP mandatory requirements.

Department of Customer Service should:

  • clarify the requirement for the CSP reporting to apply to all systems
  • require agencies to report the target level of maturity for each mandatory requirement.

Fast facts

  • $42m Total value of the Transport Cyber Defence Rolling Program over three years.
  • 7.2% Percentage of staff across the Transport cluster who had completed introductory cyber security training

Response to requests by audited agencies to remove information from this report

In preparing this audit report, I have considered how best to balance the need to support public accountability and transparency with the need to avoid revealing information that could pose additional risk to agencies’ systems. This has involved an assessment of the appropriate level of detail to include in the report about the cyber security vulnerabilities identified in this audit.

In making this assessment, the audit team consulted with Transport for NSW (TfNSW), Sydney Trains, and Cyber Security NSW to identify content which could potentially pose a threat to the agencies’ cyber security.

In December 2020, my office also provided TfNSW and Sydney Trains with a detailed report of many of the significant vulnerabilities identified in this audit, to enable the agencies to address the cyber security risks identified. The detailed report was produced as a result of a 'red team' exercise, which was conducted with both agencies' knowledge and consent. The scope of this exercise reflected the significant input provided by both agencies. More information on this exercise is at page 12 of this report.

TfNSW and Sydney Trains have advised that in the six months from December 2020 and at the time of tabling this audit report, they have not yet remediated all the vulnerabilities identified. As a result, they, along with Cyber Security NSW, have requested that we not disclose all information contained in this audit report to reduce the likelihood of an attack on their systems and resulting harm to the community. I have conceded to this request because the vulnerabilities identified have not yet been remediated and leave the agencies exposed to significant risk.

It should be stressed that the risks identified in the detailed report exist due to the continued presence of these previously identified vulnerabilities, rather than due to their potential publication. The audited agencies, alone, are accountable for remediating these vulnerabilities and addressing the risks they pose.

It is disappointing that transparency to the Parliament and the public on issues that potentially directly affect them needs to be limited in this way.

That said, the conclusions drawn in this report are significant in terms of risk and remain valid, and the recommendations should be acted upon with urgency.

Cyber security risk is an increasing area of concern for governments in Australia and around the world. In recent years, there have been a number of high-profile cyber security attacks on government entities in Australia, including in New South Wales. Malicious cyber activity in Australia is increasing in frequency, scale, and sophistication. The Audit Office of New South Wales is responding to these risks with a program of audits in this area, which aim to identify the effectiveness of particular agencies in managing cyber risks, as well as their compliance with relevant policy.

Cyber Security NSW, part of the Department of Customer Service (DCS) releases and manages the NSW Cyber Security Policy (CSP). The CSP sets out 25 mandatory requirements for agencies, including making it mandatory for agencies to implement the Australian Cyber Security Centre Essential 8 Strategies to Mitigate Cyber Security Incidents (the Essential 8). The Essential 8 are key controls which serve as a baseline set of protections which agencies can put in place to make it more difficult for adversaries to compromise a system. Agencies are required to self-assess their maturity against the CSP and the Essential 8, and report that assessment to Cyber Security NSW annually.

The CSP makes agencies responsible for identifying and managing their cyber security risks. The CSP sets out responsibilities and governance regarding risk identification, including making agencies responsible for identifying their 'crown jewels', the agency's most valuable and operationally vital systems. Once these risks are identified, agencies are responsible for developing a cyber security plan to mitigate those risks.

This audit focussed on two agencies: Transport for NSW (TfNSW) and Sydney Trains. TfNSW is the lead agency for the Transport cluster and provides a number of IT services to the entire cluster, including Sydney Trains. This audit focussed on the activities of TfNSW's Transport IT function, which is responsible for providing cyber security across the cluster, as well as directly overseeing four of TfNSW's crown jewels. Sydney Trains is one of the agencies in the Transport cluster. While it receives some services from TfNSW, it is also responsible for implementing its own IT controls, as well as controls to protect its Operational Technology (OT) environment. This OT environment includes systems which are necessary for the operation and safety of the train network.

To test the mitigations in place and the effectiveness of controls, this audit involved a 'red team' simulated exercise. A red team involves authorised attackers seeking to achieve certain objectives within the target's environment. The red team simulated a determined external cyber threat actor seeking to gain access to TfNSW's systems. The red team also sought to test the physical security of some Sydney Trains' sites relevant to the agency's cyber security. The red team exercise was conducted with the knowledge of TfNSW and Sydney Trains.

This audit included the Department of Customer Service as an auditee, as they have ownership of the CSP through Cyber Security NSW. This audit did not examine the management of cyber risk in the Department of Customer Service.

This audit assessed how effectively selected agencies identify and manage their cyber security risks. The audit assessed this with the following criteria:

  • Are agencies effectively identifying and planning for their cyber security risks?
  • Are agencies effectively managing their cyber security risks?

Following this in-depth portfolio assessment, the Auditor-General for NSW will also table a report on NSW agencies' compliance with the CSP in the first quarter of 2021–22.

Conclusion

Transport for NSW and Sydney Trains are not effectively managing their cyber security risks. Significant weaknesses exist in their cyber security controls, and both agencies have assessed that their cyber risks are unacceptably high. Neither agency has reached its Essential 8 or Cyber Security Policy target levels. This low Essential 8 maturity exposes both agencies to significant risk. Both agencies are implementing cyber security plans to address identified cyber security risks.
This audit identified other weaknesses, such as low numbers of staff receiving basic cyber security awareness training. Cyber security training is important for building and supporting a cyber security culture. Not all of the weaknesses identified in this audit had previously been identified by the agencies, indicating that their cyber security risk identification is only partially effective.
Agency executives do not receive regular detailed information about cyber risks and how they are being managed, such as information on mitigations in place and the effectiveness of controls for cyber risk. As a result, neither agency is fostering a culture where cyber security risk management is an important and valued aspect of executive decision-making.
TfNSW and Sydney Trains are partially effective at identifying their cyber security risks and both agencies have cyber security plans in place

Both agencies regularly carry out risk assessments and have identified key cyber security risks, including risks that impact on the agencies' crown jewels. These risks have been incorporated into the overall enterprise risk process. However, neither agency regularly reports detailed cyber risk information to agency executives to adequately inform them about cyber risk. The Cyber Security Policy (CSP) requires agencies to foster a culture where cyber security risk management is an important and valued aspect of decision-making. By not informing agency executives in this way, TfNSW and Sydney Trains are not fulfilling this requirement.

Agencies' cyber security risk assessment processes are not sufficiently comprehensive to identify all potential risks. Not all of the weaknesses identified in this audit had previously been identified by the agencies.

To address identified cyber security risks, both agencies have received funding approval to implement cyber security plans. TfNSW first received approval for its cyber security plan in 2017. Sydney Trains received approval for its cyber security plan in February 2020. In 2020–21 TfNSW and Sydney Trains combined their plans into the Transport Cyber Defence Rolling Program business case valued at $42.0 million over three years. This is governed as part of a broader Cyber Defence Portfolio (CDP). The CDP largely takes a risk-based approach to annual funding. The Cyber Defence Portfolio Steering Committee and Board can re-allocate funds from an approved project to a different project. This re-allocation process could be improved by making it more risk-based.

TfNSW and Sydney Trains are not effectively managing their cyber security risks

Neither agency has fully mitigated its cyber security risks. These risks are significant. Neither TfNSW nor Sydney Trains have reduced their cyber risk to levels acceptable to the agencies. Both agencies have set a risk tolerance for cyber security risks, and the identified enterprise-level cyber security risks remain above this rating. Both agencies' self-attested maturity against the Essential 8 remains low in comparison to the agencies' target levels, and in relation to the significant risks and vulnerabilities that are exposed. Little progress was made against the Essential 8 in 2020.

Neither agency has reached its target levels of maturity for the CSP mandatory requirements. Not reaching the target rating of the CSP mandatory requirements risks information and systems being managed inconsistently or not in alignment with good governance principles. The Transport Cyber Defence Rolling Program has a KPI to achieve a target rating of three for all CSP requirements where business appropriate. TfNSW considers this target rating to be its target for all the CSP requirements. However TfNSW has not undertaken analysis to determine whether this target is appropriate to its business.

The CSP makes agencies accountable for the cyber risks of their ICT service providers. While both agencies usually included their cyber security expectations in contracts with third-party suppliers, neither agency was routinely conducting audits to ensure that these expectations were being met.

The CSP requires agencies to make staff aware of cyber security risks and deliver cyber security training. TfNSW is responsible for delivering cyber security training across the Transport cluster, including in Sydney Trains. TfNSW was not effectively delivering cyber security training across the cluster because training was not mandatory for all staff at the time of the audit and completion rates among those staff assigned the training was low. As such, only 7.2 per cent of staff across the Transport cluster had completed introductory cyber security training as at January 2021.

Agencies have assessed their cyber risks as being above acceptable levels

An agency's risk tolerance is the amount of risk which the agency will accept or tolerate without developing further strategies to modify the level of risk. Risks that are within an agency's risk tolerance may not require further mitigation and may be deemed acceptable, while risks which are above the agency's risk tolerance likely require further mitigation before they become acceptable to the agency.

Both agencies have defined their risk tolerance and have identified risks which are above this level, indicating that they are unacceptable to the agency. TfNSW has defined 'very high' risks as generally intolerable and 'high' risks as undesirable. Its risk tolerance is 'medium'. Sydney Trains has four classifications of risk: A, B, C and D. A and B risks are deemed 'unacceptable' and 'undesirable' respectively, while C risks are considered 'tolerable'. This aligns with the TfNSW definition of a medium risk tolerance.

Transport IT reported five enterprise-level cyber security risks through its enterprise risk reporting tool in September 2020, all of which relate to cyber security or have causes relating to cyber security. These risks are in aggregate form, rather than relating to specific vulnerabilities. At the time of the audit, one of these risks was rated as very high and the other four rated as high. At this time, Transport IT had identified a further seven divisional-level risks which were above the agency’s risk tolerance.

Similarly, Sydney Trains has identified one main cyber security risk in its IT enterprise-level risk register and another with a potential cyber cause. Both of these IT risks are deemed to have a residual risk of ‘unacceptable’.

Similarly, two cyber-related OT risks have been determined to be above the agency's risk tolerance. One risk is rated as 'unacceptable'. Another risk, while not entirely cyber rated, is rated 'undesirable' and is deemed to have some causes which may stem from a cyber-attack.

Agencies have assessed their current cyber risk mitigations as requiring improvement

In addition to the risk ratings stated above, at the time of the audit neither agency believed that its controls were operating effectively. Transport IT had rated the control environments for its cyber security enterprise risks as 'requires improvement'. Mitigations were listed in the risk register for these risks but, in some cases, they were unlikely to reduce the risk to the target state or by the target date. For example, one risk had actions listed as 'under review' and no further treatment actions listed, but a due date of July 2021, while another risk was being treated by the CDP with a due date of July 2021. The CDP identified in May 2020 that while the average risk identified as part of that program will be reduced to a medium level by this date, ten high risks will still remain. Given the delays in the program, this number may be higher. As such, it seems unlikely that the enterprise risk will be reduced to below a 'high' level by July 2021.

Sydney Trains’ IT and OT risk registers cross-reference controls and mitigations against the causes and consequences. The IT cyber security risk identified in the register had causes with no mitigations designed for them. Further, some of these causes did not have future mitigations designed for them. This risk also had controls in place which are identified as partially effective. For the unacceptable OT risk noted above, while there was a control designed for each of the potential causes, Sydney Trains had identified all of the controls in place as either partially effective or ineffective. This indicates that Sydney Trains was not effectively mitigating the causes of its cyber risks and, even where it had designed controls or mitigations, these were not always implemented to fully mitigate the cause of the risk.

Additional information on gaps in cyber mitigations which were exposed in the course of this audit has been detailed to both agencies. The Foreword of this report provides information about why this detail is not included here.

Essential 8 maturity is low across TfNSW and Sydney Trains and little progress was made in 2020

CSP mandatory requirement 3.2 states that agencies must implement the ACSC Essential 8. Agencies must also rate themselves against each of the Essential 8 on a maturity scale from zero to three and report this to Cyber Security NSW. A full list of the Essential 8 can be found in Exhibit 1. Both agencies have a low level of maturity against the Essential 8 not just in comparison to the targets they have set, but also in relation to the risks and vulnerabilities exposed. Both agencies have set target maturity ratings for the Essential 8 but none of the Essential 8 ratings across either agency are currently implemented to this level. Having a low level of Essential 8 maturity exposes both agencies to significant risks and vulnerabilities. Little progress was made between the 2019 and 2020 attestation periods.

Transport IT has set a target rating of three across all of the Essential 8. Sydney Trains has set a target rating of three for its IT systems. Sydney Trains had an interim target of two for its OT systems in 2020 and advised that this has since increased to three. It should be noted that not all the Essential 8 are applicable to OT systems.

None of the Essential 8 ratings across either agency are currently implemented to the target levels. Given that the Essential 8 provide the controls which are most commonly able to deter cyber-attacks, having maturity at a low level potentially exposes agencies to a cyber security attack.

Some work is underway across both TfNSW and Sydney Trains to improve the Essential 8 control ratings. The CDP provided some resources to the Essential 8 over 2019–20, with uplift focusing on specific systems. The CDP work in 2019 and 2020 relevant to the Essential 8 largely focussed on determining the current state of the Essential 8 and creating a target state roadmap. As a result, there was little improvement between the 2019 and 2020 attestation periods. The CDP has a workstream for the Essential 8 in its FY 2020–21 funding allocation, however as noted above in Exhibit 6 this was delayed as resources were redeployed to Project La Brea. Regardless, work on some specific aspects of the Essential 8 remain part of the 2020–21 CDP allocation, with workstreams allocated to improving three of the Essential 8. In addition, some work from Project La Brea should lead to an improvement in the Essential 8.

Sydney Trains' Cyber Uplift Program included a workstream which had in scope the uplift in the Essential 8 in IT. There were also other workstreams which aimed to improve some of the Essential 8 for OT systems. Work is also ongoing as part of the CDP to uplift these scores in Sydney Trains.

TfNSW and Sydney Trains have not reached their target maturity across the CSP mandatory requirements and TfNSW has not evaluated its cluster-wide target to ensure it is appropriate

Cyber Security NSW allows each agency to determine its target level of maturity for the first 20 CSP mandatory requirements. Agencies can tailor their target levels to their risk profile. Not reaching the target rating of the CSP mandatory requirements risks information and systems being managed inconsistently or not in alignment with good governance principles.

Sydney Trains has set its target level of maturity for IT and OT. All of Sydney Trains' target maturity levels are at least a three (defined), with a target of four (quantitatively managed) for many of the mandatory requirements. While Cyber Security NSW does not currently mandate a minimum level of maturity, in 2019 there was a requirement for each agency to target a minimum level of three.

Sydney Trains has not met its target ratings across the mandatory requirements.

The Transport Cyber Defence Rolling Program has a program KPI to ensure that the entire cluster reaches a minimum maturity level of three against all the CSP requirements by 2023. TfNSW has not reviewed its CSP mandatory requirement targets to determine if a three is desirable for all requirements or if a higher target level may be more appropriate. It is important for senior management to set cyber security objectives as a demonstration of leadership and a commitment to cyber security.

TfNSW has not met its target ratings across the mandatory requirements for its Group IT ISMS, which was the focus of this audit.

Both agencies claimed progress in their implementation of the mandatory requirements between 2019 and 2020. The audit did not seek to verify the self-assessed results from either agency.

Both agencies operate ISMS in line with the CSP

CSP mandatory requirement 3.1 requires agencies to implement an Information Security Management System (ISMS) or Cyber Security Framework (CSF), with scope at least covering systems identified as the agency's ‘crown jewels’. The ISMS or CSF should be compliant with, or modelled on, one or more recognised IT or OT standard. As noted in the introduction, an ISMS ‘consists of the policies, procedures, guidelines, and associated resources and activities, collectively managed by an organisation, in the pursuit of protecting its information assets.’ Both agencies operate an ISMS compliant with the CSP requirement.

As noted in the introduction, TfNSW operates four ISMS. The Transport IT ISMS is certified against ISO27001, the most common standard for ISMS certification. Three of TfNSW’s six crown jewels are managed within this ISMS. The other ISMS are not certified to relevant standards, though TfNSW claims that they align with relevant controls. This is sufficient for the purposes of the CSP.

Sydney Trains operates two ISMS, one for IT and another for OT. Neither of these are certified to relevant ISMS Standards, however there have been conformance reviews of both IT and OT with relevant standards. These ISMS cover all crown jewels in the agency.

There are currently 11 ISMS in operation across the Transport cluster. TfNSW has proposed moving towards a holistic approach to these ISMS, with the CDP Board responsible for governing the available security controls and directing agency IT and OT teams to implement these.

Agencies are not routinely conducting audits of third-party suppliers to ensure compliance with contractual obligations

CSP mandatory requirement 1.5 makes agencies accountable for the cyber risks of their ICT service providers and ensuring that providers comply with the CSP and any other relevant agency security policies. The ACSC has provided advice on what organisations should do when managing third party suppliers of ICT. The ACSC advises that organisations should use contracts to define cyber security expectations and seek assurance to ensure that these contract expectations are being met. While both agencies usually include specific cyber security expectations in contracts, neither is routinely seeking assurance that these expectations are being met.

The NSW Government has mandated the use of the 'Core& One' contract template for low-value IT procurements and the Procure IT contract template for high-value IT procurements. Both of these contracts contain space for the procuring agency to include cyber security controls for the contractor to implement. The Procure IT contract template also includes a right-to-audit clause which allows agencies to receive assurance around the implementation of these controls. TfNSW and Sydney Trains used the mandated contracts for relevant contracts examined as part of this audit.

TfNSW included security controls in all the contracts examined as part of this audit. Compliance with ISO27001 was the most commonly stated security expectation. Of the contracts examined as part of this audit, only one contract did not have a right-to-audit clause. This contract was signed in October 2016. While these clauses are in place, TfNSW rarely conducted these audits on its third-party providers. Of the eight TfNSW contracts examined in detail, only two of these had been audited to confirm compliance with the stated security controls.

Sydney Trains included security controls in all but one of the contracts examined as part of this audit. Sydney Trains did not require contractors to be compliant with ISO27001, but only required compliance with whole-of-government policies. Sydney Trains does not routinely conduct audits of its third-party suppliers, however it did conduct deep-dive risk analyses of its top ten highest risk IT suppliers. This involved a detailed review of both the suppliers' security posture and also the contract underpinning the relationship with the supplier.

The CDP funding for 2020–21 includes a workstream for strategic third-party contract remediation. This funding is to conduct some foundational work which will allow the CDP to make further improvements in future years. While this funding will not address gaps in contract requirements or management across all contracts, this workstream aims to reduce the risks posed by strategic suppliers covering critical assets. Similarly, work is currently underway as part of the CDP to conduct OT risk assessments for key suppliers to Sydney Trains in a similar way to the work undertaken for IT suppliers.

Sydney Trains has risk assessed its third-party suppliers but TfNSW has not done so

It is important to conduct a risk assessment of suppliers to identify high-risk contractors. This allows agencies to identify those contractors who may require additional controls stated in the contract, those who require additional oversight, and also where auditing resources are best targeted.

Sydney Trains has risk assessed all its IT suppliers and, as noted above, has conducted a deep-dive risk analysis of its top ten highest risk suppliers. TfNSW has not undertaken similar analysis of its key suppliers, however it has identified risks attached to each of its strategic suppliers and has documented these. As a result of not risk assessing its suppliers, TfNSW cannot take a targeted approach to its contract management.

TfNSW demonstrated poor records handling relating to the contracts examined as part of this audit

TfNSW was not able to locate one of the contracts requested as part of the audit's sample. Other documentation, such as contract management plans, could not be located for many of the other contracts requested as part of this audit. These poor document handling practices limits TfNSW's ability to effectively oversee service providers and ensure that they are implementing agreed controls. It also limits public transparency on the effectiveness of these controls.

The Transport cluster is not effectively implementing cyber security awareness training

Agencies are responsible for implementing regular cyber security education for all employees and contractors under mandatory requirement 2.1 in the CSP. TfNSW is responsible for delivering this training to the whole Transport cluster, including Sydney Trains. The Transport cluster has basic cyber awareness training available for all staff. TfNSW also offers additional training provided by Cyber Security NSW targeted at executives and executive assistants. While TfNSW has training available to staff, it is not delivering this effectively. TfNSW does not make training mandatory for most staff nor does it require staff to repeat training regularly. Even among those staff who have been assigned the training, completion rates are low, meaning that delivery is not effectively monitored. Cyber security training is important for building and supporting a cyber security culture.

TfNSW is responsible for creating and rolling out all forms of training to agencies within the Transport cluster. Both TfNSW and Sydney Trains have the same mandatory cyber awareness training that is automatically assigned to new starters. At the time of the audit, this training was not mandatory for ongoing staff. TfNSW does make additional cyber security training available to staff who can choose to undertake the training themselves, or can be assigned the training by their manager. All TfNSW cyber security training is delivered via online modules and it is the responsibility of managers to ensure that it is completed.

Cyber security training completion rates for both TfNSW and Sydney Trains are low. Only 13.5 per cent of staff across the Transport cluster had been assigned the Cyber Safety for New Starters training as of January 2021. Although this course is mandatory for new starters, only 53 per cent of staff assigned the Cyber Safety for New Starters training module had completed the course by January 2021. As a result, only 7.2 per cent of staff across the entire Transport cluster had completed this training at that time. In Sydney Trains, less than one per cent of staff had completed this training as at January 2021 and a further 7.6 per cent of staff have completed the 'Cyber Security: Beyond the Basics' training. These low completion rates indicate that TfNSW is not effectively rolling out cyber security training across the cluster.

In October 2020, the Department of Customer Service released 'DCS-2020-05 Cyber Security NSW Directive - Practice Requirement for NSW Government', which made annual cyber security training mandatory for all staff from 2021. In line with this requirement, TfNSW has advised that it will be gradually implementing mandatory annual training from July 2021 for all staff.

The Transport cluster undertakes activities to build a cyber-aware culture in accordance with the CSP, but awareness remains low

Increasing staff awareness of cyber security risks and maintaining a cyber secure culture are both mandatory requirements of the CSP. While TfNSW does undertake some activities to build a cyber aware culture, awareness of cyber security risks remains low. This can be demonstrated by the low training rates outlined above, and the 'Spot the Scammer' exercise, described in Exhibit 7. TfNSW is responsible for delivering these awareness raising activities across the cluster.

TfNSW frequently communicates with staff across the Transport cluster about various cyber security risks through multiple avenues. Both agencies use the intranet, emails and other awareness raising activities to highlight the importance for staff to be aware of the seriousness of cyber risks. Advice given on the intranet includes tips for spotting scammers on mobile phones, promoting the cluster-wide training courses, as well as various advice that staff could use when dealing with cyber risks in the workplace.

In addition to these awareness raising activities, TfNSW has also undertaken a cluster-wide phishing email exercise called 'Spot the Scammer'. This is outlined in Exhibit 7. This exercise was carried out in 2019 and 2020 and allowed the Transport cluster to measure the degree to which staff were able to identify phishing emails. As can be seen in Exhibit 7, the results of this exercise indicate that staff awareness of phishing emails remains low.

Exhibit 7 - Spot the Scammer exercise
In both 2019 and 2020, TfNSW performed a ‘Spot the Scammer’ exercise in which they sent out over 25,000 emails to staff based on a real phishing attack in order to measure awareness and response. The exercise tested staff 'click through rate', the percentage of staff who clicked on the fake phishing link. In 2019, these results were then compared to industry benchmarks, with over a 20 per cent click through rate being considered 'very high'. Both TfNSW and Sydney Trains were considered to have a ‘very high’ click through rate in comparison to these benchmarks in both 2019 and 2020. This indicates that staff awareness of phishing emails was low. The click through rate for TfNSW was 24 per cent in 2020, an increase from 22 per cent in 2019. For Sydney Trains, the click through rate in 2020 was 32 per cent, which was a decrease from 40 per cent in 2019.
Source: Audit Office analysis of TfNSW documents.

Appendix one – Response from agencies

Appendix two – Cyber Security Policy mandatory requirements

Appendix three – About the audit

Appendix four – Performance auditing

 

© Copyright reserved by the Audit Office of New South Wales. All rights reserved. No part of this publication may be reproduced without prior consent of the Audit Office of New South Wales. The Audit Office does not accept responsibility for loss or damage suffered by any person acting on or refraining from action as a result of any of this material.

Parliamentary reference - Report number #353 - released (13 July 2021).

Published

Actions for Delivering school infrastructure

Delivering school infrastructure

Education
Infrastructure
Management and administration
Project management

The Auditor-General for New South Wales, Margaret Crawford, released a report today examining the planning and delivery of new, redeveloped and upgraded public schools.

School Infrastructure NSW has identified the need to accommodate an additional 180,000 enrolments in public schools by 2039 with a large portion of this growth expected in metropolitan Sydney. It has also identified that around 34,000 teaching spaces will require upgrading to be fit-for-purpose.

Although School Infrastructure NSW has developed a long-term strategic plan that advises government of ongoing funding requirements, it has not presented a list of priorities to meet those needs. Developing a longer-term list of priorities would help signal the areas of greatest need and allow more time to develop the best options to meet those needs.

The audit found that School Infrastructure NSW has focused on delivering existing projects, election commitments and other government announcements. This has diverted attention from identifying and delivering projects that would have better met present and future needs. 

The report makes eight recommendations to improve long-term planning for future needs, strengthen the quality of estimated project costs and benefits, and embed a continuous improvement program. 

In 2016, the Department of Education prepared a School Assets Strategic Plan (2016 SASP) which outlined long-term funding needs to support the expected growth in enrolments to 2031. Following the release of the 2016 SASP, the NSW Government substantially increased funding for new and upgraded schools from $2.4 billion in the 2016–17 State Budget to $4.2 billion in 2017–18.

In 2017, the Department of Education established School Infrastructure NSW (SINSW) to lead the delivery of the 2016 SASP and the 123 new projects announced in the 2017–18 Budget. This significantly larger program of work required rapid development of internal capacity, governance arrangements, and project management systems. This needed to be done at the same time as scoping and planning for the list of announced projects.

As there are limited funds available to meet growing needs across the State, it is important that SINSW has effective methods to prioritise projects to communities with the greatest need. To ensure that projects deliver value for money, business cases need to have robust estimates of project costs and benefits. Business cases also need to account for the inherent risks in delivering infrastructure projects. Unplanned cost escalations can reduce the number of new or modernised classrooms SINSW can deliver. Unforeseen delays may also impact families who make significant life choices based on their expectations that a school will open at the beginning of the school year.

The objective of this audit was to assess the effectiveness of planning and delivery of new, upgraded and redeveloped schools to meet demand for public school education in New South Wales. To address this objective, the audit examined whether the Department:

  • has effective procedures for planning and prioritising school capital works to meet present and future demands
  • develops robust business cases for school capital works that reliably inform decision-making
  • has effective program/project governance and management systems that support delivering projects on-time, within budget and achievement of intended benefits.

The audit examined business cases for 12 projects as case studies. These include a mix of projects initiated before and after the establishment of SINSW.

This audit commenced in June 2020 and examined strategies and demographic projections developed prior to the emergence of COVID-19. This audit did not examine potential longer-term impacts of COVID-19 on future demands for public school education.

Conclusion

School Infrastructure NSW has been focused on delivering existing projects, election commitments and other government announcements. This has diverted attention from identifying and delivering projects that would have better met present and future student and classroom needs. While it has developed a long-term strategic plan that advises government of ongoing funding requirements, it has not presented a list of priorities to meet these needs.

In its first years of operation, SINSW has focused on delivering existing projects and the 123 new projects announced in the 2017–18 Budget. Further NSW Government announcements in the 2018–19 Budget, election commitments in the 2019–20 Budget, and announcements in the 2020–21 Budget, made up the majority of new projects, rather than projects prioritised by SINSW. 

In early 2020, SINSW advised the NSW Government that the currently funded infrastructure program would not meet forecast classroom requirements for 2023 and beyond. The School Asset Strategic Plan 2020 estimates the annual level of investment needed over the next 20 years to meet growth, update and upgrade facilities to meet compliance obligations. However, SINSW’s ten-year Capital Investment Plans for 2018–19, 2019–20 and 2020–21 only identified priorities over a two-year horizon.

Developing a longer-term pipeline of priorities would signal the areas of greatest need and allow greater scope to consider a range of options to best meet those needs.

SINSW has made progress in planning across geographic areas but needs to better prioritise which projects move forward.

Given the current and projected needs for new classrooms, it is vital that SINSW provides long-term advice based on thorough state-wide analysis to help prioritise projects that best meet this demand.

SINSW has improved its capabilities, processes, and systems to support planning in ‘School Community Groups’, which are clusters of between 5 to 15 schools in a geographic area. This addresses a key direction identified in the School Assets Strategic Plan 2016. It has developed a planning tool which allows it to prioritise School Community Groups based on weighted criteria. It has also developed an approach to identify potential projects within School Community Groups but has not yet put in place a structured process to prioritise which projects move to the business case stage to seek funding for delivery.

Business cases we examined established service needs, but several had shortcomings in scope definition, cost estimation and risk identification.

Most business cases we examined demonstrated the service need and consultation with stakeholders helped to incorporate educational requirements. Common templates and specific cost-benefit guidance developed in partnership with NSW Treasury has helped to promote consistency across business cases.

However, there were shortcomings in several business cases we reviewed. Business cases for projects already announced by government presented a limited number of options, and the process for eliminating other options was not transparent. Cost increases and contingency drawdowns for several projects indicate that scoping, costing and risk assessments could be improved, especially for complex projects.

Standard program management systems and governance arrangements support project delivery, however, there is scope for better ongoing oversight of benefits.

SINSW applies standard governance arrangements to projects based on their size. Higher value projects have executive oversight while lower value projects are overseen on a regional basis. SINSW has improved its project management systems to provide more consistent data and greater transparency to senior management over project status, cost and use of contingencies.

SINSW has worked with NSW Treasury to define a consistent set of benefits for new and redeveloped schools. Estimated benefits are currently based on international contexts but SINSW advises it is undertaking further research to improve the evidence base in this area. The current approach to ongoing monitoring, reporting and evaluation of project benefits places responsibility on the infrastructure delivery team. This team is not the most appropriate area to monitor ongoing benefits, which are expected to accrue many years after delivery and depend on actions in other areas of the Department.

1. Key findings

SINSW delivered projects against an established program of works in its first years of operation

At establishment, SINSW inherited a portfolio of existing projects and 123 new projects announced as part of the 2017–18 Budget (to commence over 2017–18 and 2018–19). It has progressively worked through individual project planning to deliver against these projects.

The 2018–19 Budget funded two new projects that had not already been announced. Both projects were identified by SINSW as a priority. The 2018–19 Budget also allocated funding for 'planning' 22 new projects. Seventeen of the 22 projects had been identified by SINSW as a priority.

SINSW identified 31 new priority projects in its Capital Investment Plan for 2019–20. Thirteen of these projects were funded in that year with a further 27 projects included as election commitments. SINSW identified 20 new projects in its Capital Investment Plan for 2020–21 but only two of these were funded. SINSW advised this was due to a constrained budget environment.

There is an anticipated shortfall of classrooms based on the current funded program

Despite increased funding since 2017–18, SINSW advised the NSW Government in early 2020 that the currently funded infrastructure program would not meet forecast classroom requirements for 2023 and beyond. Accordingly, it is vital that new funding is prioritised to projects which best meet demand.

SINSW only identified specific priorities over a two-year horizon in its Capital Investment Plans for 2018–19, 2019–20 and 2020–21. The School Assets Strategic Plan 2016 and the 2020 update make the case for sustained funding for school building and redevelopment. These plans estimate annual funding requirements and show geographic areas with increasing forecast enrolments. Detailing how priorities over a ten-year timeframe fit within a ten-year capital planning limit would create more certainty about meeting growth demands.

There has been progress in formalising prioritisation frameworks, data tools and supporting governance arrangements

SINSW committed to planning for new and redeveloped schools in 'School Community Groups' in the School Assets Strategic Plan 2016. This is a new way of planning which considers the educational needs over a defined geographical area. It has developed a planning tool to prioritise School Community Groups based on weighted criteria. It has also established governance frameworks to improve transparency over decisions to reprioritise this list.

SINSW has refined its approach to planning in School Community Groups over the past four years. It now prepares Service Needs Reports to investigate needs, identify projects, prioritise, determine scope and timing, and assess non-capital options. SINSW has yet to finalise arrangements for how needs identified in Service Needs Reports progress to the strategic business case stage.

Projects announced prior to developing a business case have less opportunity to consider a range of options to meet the service needs

Business cases for projects already announced by government (or announced for planning) go through the same process of determining the service need and impacts on surrounding schools. However, for some announced projects, the range of options considered in the business case is influenced by the parameters of the announcement. This makes it more difficult to genuinely pursue alternate options that could better meet the identified service need.

Projects identified by SINSW have a more rigorous process of considering options. Service Needs Reports explore a wide range of asset and non-asset interventions across the School Community Group. Options are narrowed as the projects move through the strategic and final business case stages. SINSW uses its Investment Review Committee to engage key stakeholders early in the process so that they are informed about how non-asset solutions have been considered and why SINSW is progressing the business case for a capital solution for particular projects.

Several business cases underestimated project costs and risks, leading to scope and budget increases

Several business cases we reviewed did not adequately identify the initial scope requirements, project-specific risks or the likely project cost. For two business cases, this appeared to be due to an attempt to fit the project within a predetermined amount. Announcing a project’s scope, budget and timeframe before proper planning increases risks to successful delivery against expectations.

Several of the projects we examined required drawdowns on contingency funds due to inadequate consideration of scope, costs and project risks at the planning stage. Contingency funds are intended for unanticipated extra costs rather than those that could have or should have been identified at the planning stage.

Guidance on benefit calculations has provided a consistent framework for business cases

Business cases we examined presented a consistent set of benefits based on guidance developed in partnership with NSW Treasury. Following this guidance helps to compare cost-benefit analyses across business cases. However, the evidence for the estimated benefits is based on contexts outside of NSW. SINSW has the tools and data sources to calculate benefits more suited to the context of particular schools. Doing so would improve the accuracy of cost-benefit analyses. SINSW advised that it is currently updating the guidance in partnership with NSW Treasury.

SINSW involves school principals, executives and teaching staff in developing education rationales when commencing projects. These documents help align projects with education outcomes. They also provide a baseline for post-occupancy evaluation, which is important to determine whether the new school infrastructure is being used in the ways that were anticipated in the business case.

SINSW could elevate its existing assurance review process to consolidate lessons learned

SINSW engages external peer reviewers to conduct assurance reviews on its projects at multiple stages of planning and delivery. It has established a Community of Practice for external reviewers to keep them up to date on new developments and requirements. Higher value projects are also subject to review by Infrastructure NSW under the Investor Assurance Framework.

By looking at all projects at all stages, assurance reviews can identify systematic issues across the full portfolio of projects. A recent assurance review analysed common findings from reviews of strategic and final business cases. This provides a helpful way to improve internal processes. SINSW advised that it is implementing a continuous improvement program, which will be able to take findings from assurance reviews to build organisational capabilities.

2. Recommendations

By September 2021, the Department of Education should:

  1. finalise the investment prioritisation approach with agreement from key stakeholders
  2. finalise and update on an ongoing basis a ten-year list of priorities to meet the forecast demand for new classrooms and contemporary fit for purpose learning environments, which identifies individual projects and programs in the short-term and priority geographic areas and programs in the medium-term
  3. seek a ten-year Capital Planning Limit from NSW Treasury to ensure the needs identified in the ten-year list of priorities are met and are coordinated with the forward capital programs of other agencies
  4. improve the quality of data on cost benchmarks that underpin the annual ten-year Capital Investment Plan and updates to the School Assets Strategic Plan
  5. embed an evidence-based cost benefit analysis framework for school investment, in consultation with NSW Treasury, by:
    • validating benefits estimated in previous business cases with actual results
    • building the evidence base in relation to contemporary learning environments
  6. regularly share data on forecast needs with relevant planning agencies to promote strategic opportunities for servicing education needs
  7. implement the continuous improvement program for service planning, options assessment, business case development, project delivery and handover. The program should be informed by findings from assurance reviews, post-occupancy evaluations and project lessons learned
  8. establish benefits realisation processes and practices that:
    • ensure business cases set baselines and targets for benefits
    • review benefits during delivery, prior to handover and as part of Post Occupancy Evaluations
    • identify which part(s) of the Department are best placed to develop, manage and evaluate benefits on an ongoing basis.

Note:

The Department's formal response to this report at Appendix one states that while it 'supports the recommendations, it considers the proposed six-month timeframe to be an unreasonably short period for a large and complex organisation to effectively implement many of these recommendations'. It suggests 12 months would be needed to implement the recommendations.

The recommendations stemming from this audit are core business for SINSW. The Audit Office considers it important for SINSW to place priority on implementing the recommendations in time to inform the 2022–23 budget cycle. Extending the deadline to April 2022 would place action outside of that budget cycle.

There have been significant increases in funding for education infrastructure since the 2017–18 Budget and further growth in demand for places in schools is forecast. SINSW has the challenge, not only of meeting the need for new classrooms due to population growth, but also upgrading facilities to enable modern teaching techniques. In addition, community expectations of what constitutes a vibrant and successful school community continues to increase.

Given growing demand and budget constraints, projects must be selected to best meet the needs of the community and planning and prioritisation are vital. SINSW has been progressing planning for announced projects as well as implementing a new type of strategic state-wide planning and prioritisation, cluster planning, where options are developed for School Community Groups.

The primary role of a business case is to reliably inform an investment and/or policy decision. Over the period of review, the NSW Government's guidelines for business cases have established this requires recommendations based on convincing arguments, sufficient evidence, and accurate costing of alternatives and expected benefits. Business case guidelines are underpinned by guides for economic appraisal and cost-benefit analysis.

As SINSW moves to prioritise business cases for interventions in School Community Groups, it will increasingly need to demonstrate rigour in its assessment of all options. It will also need to ensure that scope identification, cost and risk planning and the setting of contingencies are accurate. This will help decision-makers better understand, plan for and manage the investment required to meet the demand for school infrastructure.

For this audit, we examined business cases and related documentation for 12 projects. Several of these projects were developed before School Infrastructure NSW was established in mid-2017.

Over the period of review, NSW Government policies for business case development and submission have emphasised that effective governance arrangements are critical to a proposal's successful implementation.

SINSW's guidance similarly highlight the importance of effective governance and project management for achieving good outcomes. It prescribes a general governance structure managed by SINSW that can be tailored to the planning and delivery of school infrastructure projects.

Appendix one – Response from agency
 
Appendix two – About the audit 

Appendix three – Performance auditing 


Copyright Notice

© Copyright reserved by the Audit Office of New South Wales. All rights reserved. No part of this publication may be reproduced without prior consent of the Audit Office of New South Wales. The Audit Office does not accept responsibility for loss or damage suffered by any person acting on or refraining from action as a result of any of this material.

Parliamentary reference - Report number #347 - released (8 April 2021).

Auditor-General’s Report to Parliament on Delivering School Infrastructure 

This corrigendum has been prepared to amend the following text within my Auditor-General’s Report to Parliament on Delivering School Infrastructure, dated 8 April 2021. 

On page two, the original text was as follows: 

Further NSW Government announcements in the 2018–19 Budget and election commitments in the 2019–20 Budget made up the majority of new projects, rather than projects prioritised by SINSW. 

The original text has now been changed to 

Further NSW Government announcements in the 2018–19 Budget, election commitments in the 2019–20 Budget, and announcements in the 2020–21 Budget, made up the majority of new projects, rather than projects prioritised by SINSW. 

On page three, the original text was as follows: 

The 2018–19 Budget funded three new projects that had not already been announced. One of the three projects was identified by SINSW as a priority. 

The original text has now been changed to: 

The 2018–19 Budget funded two new projects that had not already been announced. Both projects were identified by SINSW as a priority. 

On page three the original text was as follows: 

SINSW identified 33 priority projects in its Capital Investment Plan for 2019–20.

The original text has now been changed to  

SINSW identified 31 new priority projects in its Capital Investment Plan for 2019–20. 

On page eleven, in Exhibit 4, the original text was as follows: 

The 2018–19 NSW Budget announced funding for an additional 43 new and upgraded schools to commence works in 2018–19. Of the 43 projects: 

•    1 was identified by SINSW as a priority in its Capital Investment Plan (SINSW requested funding for one new project)
•    40 had already been announced
•    2 were new announcements (not identified as a priority by SINSW in its Capital Investment Plan).

The original text has now been changed to: 

The 2018–19 NSW Budget announced funding for an additional 42 new and upgraded schools to commence works in 2018–19. Of the 42 projects: 

•    2 were identified by SINSW as a priority in its Capital Investment Plan (SINSW requested funding for two new projects)
•    40 had already been announced.

On page eleven, the original text was as follows: 

The 2019–20 NSW Budget announced funding for an additional 40 new and upgraded schools as election commitments. Of the 40 election commitment projects: 

•    13 were identified by SINSW as priorities in its Capital Investment Plan (SINSW requested funding for a total of 33 new projects)
•    27 were new announcements (not identified as a priority by SINSW in its Capital Investment Plan).

The original text has now been changed to: 

The 2019–20 NSW Budget announced funding for an additional 40 new and upgraded schools as election commitments. Of the 40 election commitment projects: 

•    13 were identified by SINSW as priorities in its Capital Investment Plan (SINSW requested funding for a total of 31 new projects)
•    27 were new announcements (not identified as a priority by SINSW in its Capital Investment Plan).

The above changes will be reflected in the version of the report published on the Audit Office website and should be considered the true and accurate version.  

 

Published

Actions for Energy rebates for low income households

Energy rebates for low income households

Planning
Industry
Compliance
Fraud
Internal controls and governance
Management and administration

The Department of Planning and Environment provides more than $245 million in energy rebates to around 27 percent of NSW households. This report highlights that the department is not monitoring the rebate schemes to understand whether they are delivering the best outcomes.

Most rebates are ongoing payments applied directly to energy bills reducing the amount payable by the householder. The structure of these rebates is complex and can be inequitable. Some households are eligible for four different rebates, each with its own eligibility criteria.  Also, some households in very similar circumstances receive different levels of support depending on what type of energy is used in their home or which adult in the house is the energy account holder. For example, a household using both electricity and gas receives more assistance than a household with electricity alone even if total energy bills are the same. 

The Department of Planning and Environment (Department) administers five energy rebate schemes targeted to low-income households. The five rebates are of two key types:

1. Ongoing support to pay energy bills
2. Crisis Support  

More than one million rebates are paid each year to over 800,000, or around 27 per cent, of NSW households. Households learn about rebates from a variety of sources including: Service NSW, government and energy retailer websites, energy retailer welcome packs, Department marketing efforts, information on energy bills, and Centrelink.  

The budget for energy rebates is increasing every year and in 2017–18 is more than $245 million. The Department delivers most rebates through a network of partnership arrangements with:

  • energy retailers, who apply rebates directly onto energy bills
  • more than 340 charities and other NGOs who assess households' eligibility for crisis support and distribute support through the Energy Accounts Payment Assistance scheme (EAPA)
  • Service NSW, who informs NSW households about rebates through their call centre.

The energy rebates budget is substantial and the distribution arrangements are complex. The objective of the audit was to assess whether the current design and distribution of energy rebates schemes is effective.

Conclusion
The Department administers the rebate schemes using partners to ensure funds are directed towards energy bills as intended. Ongoing support schemes provide assistance to low-income households as intended, but have no measurable objectives or outcome measures and therefore can't be assessed for their effectiveness. Crisis support (EAPA) has a clear objective, to keep households experiencing financial crisis connected to energy services, but the Department does not monitor the performance of EAPA against this objective.  

The structure of rebates providing ongoing support is complex and can be inequitable for some households. Reducing the number of separate schemes and simplifying eligibility requirements offers the most scope for improving effectiveness of ongoing support schemes.  

The growth of embedded networks1 represents a future administrative risk to the Department.

Partnering with energy retailers, charities and NGOs delivers advantages, but stronger oversight is required over partner organisations.

The Department and partner organisations administer the rebate schemes as designed

The Department oversees a complex package of rebate schemes in partnership with 25 retailers and around 340 charities and NGOs. The partnership arrangements ensure that funds are distributed directly to energy bills as intended. The schemes provide support to recipients and are administered in line with government decisions about eligibility.  

Communication about rebates does not reach all eligible households

Households learn about rebate schemes through a mix of communication channels including retailer websites and call centres, Department websites, Centrelink, financial counsellors, EAPA Providers, the Energy and Water Ombudsman and Service NSW. Some low-income groups, such as those with poor English language skills, do not find out about energy rebates.

Scheme objectives are not measurable

Rebate schemes that provide ongoing support do not have measurable objectives or outcome measures. Without clear and measurable objectives, the Department cannot report to government on whether the schemes are achieving the intended policy outcomes, nor recommend improvements to ensure the schemes deliver the greatest benefit to the most financially vulnerable households.

The EAPA crisis support scheme has a clearer objective in that it aims to keep households experiencing financial crisis connected to energy services. However, the Department does not measure outcomes from providing this type of support, and does not know if the crisis support achieves this objective.  

The structure of rebate schemes for ongoing support is complex

The Low Income Household Rebate accounts for 80 per cent of the budget for ongoing support rebates. The remaining 20 per cent of the budget is administered through four separate schemes: Gas Rebate, Medical Energy Rebate, Family Energy Rebate and Life Support Rebate.

Each of these rebates has its own eligibility criteria and some require separate application processes. The Family Energy Rebate is complex to access and apply for, and around one third of households do not reapply each year. Eligible households that receive energy through embedded networks apply directly to the Department for rebates, which are paid by the Department into bank accounts. Embedded networks are energy supply arrangements where the manager of a residential facility such as a caravan park, retirement village or apartment block, buys energy in bulk and then on-sells it to residents. The Department is yet to develop strategies to address a forecast increase in such households.

The design of the rebate schemes creates some inequities

Households in similar circumstances can receive different levels of assistance depending on which adult in the house is the energy account holder, the mix of energy types used in the home, or the EAPA Provider they turn to when in financial crisis.

Households with both gas and electricity connections receive more assistance than those with only electricity. Households in rural and regional areas receive the same value rebate as households closer to Sydney, despite higher distribution charges. Family Energy Rebate is a two-tier payment, with a higher amount available to families with greater means. Lower-income families receive a much smaller Family Energy Rebate on the assumption that they already receive Low Income Household Rebate. Charities and NGOs distributing EAPA crisis support apply inconsistent standards when assessing household need, which leads to inequitable levels of assistance.

Departmental oversight of energy retailers and EAPA Providers is not strong enough

While partnering with energy retailers and EAPA Providers delivers advantages, stronger management is needed to ensure that partners follow Departmental guidelines and to minimise the potential for fraud. The Department's accreditation process for potential EAPA Providers does not consider the applicant's financial governance standards and the most recent audit of EAPA Providers was 2013.


[1] Embedded networks are energy supply arrangements where the manager of a residential facility such as a caravan park, retirement village or apartment block, buys energy in bulk and then on-sells it to residents.

By September 2018, the Department of Planning and Environment should:

  1. Ensure effective strategies are in place to make information about rebates available to all eligible, low-income households
     
  2. Evaluate alternative models and develop advice for government to reduce complexity and improve equity of ongoing rebates
     
  3. Establish measurable objectives for schemes that provide ongoing support, and monitor and measure performance of all schemes against objectives and outcome measures
     
  4. Assess the impacts of the forecast increase in embedded networks and develop strategies to manage any increased administrative risk
     
  5. Strengthen assurance that EAPA is being provided in accordance with its objectives and guidelines by implementing accreditation and compliance programs
     
  6. Ensure those eligible for EAPA financial support are not disadvantaged by inflexible payments, inconsistent provider practices, or inability to access an EAPA provider in a timely manner. Options include:
    • moving from a fixed-value voucher to a flexible payment based on need irrespective of energy type
    • establishing a ‘Provider of Last Resort’ facility for households that cannot access an EAPA Provider.

Appendix one - Response from the Agency

Appendix two - About the audit

 

Parliamentary reference - Report number #292 - released 19 September 2017 

Published

Actions for Information and Communication Technologies in schools for teaching and learning

Information and Communication Technologies in schools for teaching and learning

Education
Information technology
Infrastructure
Management and administration
Service delivery
Workforce and capability

Several factors are reducing effective use of information and communication technology (ICT) in the classroom.

These are primarily:

  • ageing ICT equipment and inadequate wireless networks
  • variable student access to devices at school
  • variable teacher access to centrally provided devices for use outside of the classroom.

Information and communication technologies (ICT) are pervasive in modern life. Australian research has identified that the workforce demand for digital literacy and advanced digital skills is growing across most areas of work. There is broad agreement internationally and in Australian school systems that digital literacy is a core skill for the workforce and students will need to be confident with ICT. Education systems around the world are using ICT in classrooms to support learning and employment goals.  

The New South Wales Department of Education’s (the Department’s) overall strategic directions for teaching and learning with ICT are set in the 'Strategic Information Technology Plan 2016–19'. The Department centrally provides a base level of resources to schools for ICT and schools supplement funding from their existing school budget and Parents and Citizens Associations. Each school decides how to allocate these funds to meet local needs. Schools also set expectations for how teachers and students will use technology to help deliver outcomes.

This audit assessed how well New South Wales public schools are using ICT to improve teaching and learning. It focussed on planning and teacher and student use of ICT. We examined whether:

  • the Department identifies key strategic opportunities to enhance the use of ICT platforms and technologies in schools
  • teachers are integrating ICT into classroom practice
  • the Department monitors the impact of ICT on student learning.
Conclusion 

Several factors are reducing the effective use of ICT in the classroom. These are primarily:

  • ageing ICT equipment and inadequate wireless networks
  • variable student access to devices at school
  • variable teacher access to centrally provided devices to use outside of the classroom.

Many schools are struggling to keep up with growing ICT needs within available funding. The Department needs to review whether its current technology programs provide schools with sufficient resources and support to meet the Department’s strategic goals for 21st Century classrooms. The Department should also target additional support to schools to improve planning for ICT resources.  

Most teachers are using ICT in the classroom, however, teacher access to devices outside the classroom varies between schools. In practice, teacher working days extend outside classroom hours. Teachers need access to devices for activities such as lesson preparation and student assessment. With limited access to devices outside of the classroom, teachers may not be able to effectively integrate ICT into lessons. Teachers also require further professional learning to support them to develop their skills in using ICT.  

The Department is not sufficiently monitoring the digital literacy of New South Wales students, which has declined in national tests. Teachers could benefit from support to assess these skills at a school level. The Department also needs to investigate links between student use of ICT and learning outcomes, so they can better support teachers with evidence-based approaches to enhancing learning through ICT.

Old equipment and wireless networks are not keeping pace with modern demands

The Department’s vision for ICT is to enable ‘any learning opportunity, anywhere, anytime’. This vision is at risk due to an ageing stock of devices and wireless networks. The average age of devices in New South Wales schools is over four years. Older devices are less reliable, require greater maintenance and support, and cannot run demanding applications. Further, many school wireless networks are beyond the end of their useful life. This limits the number of teachers and students who can access online content on wireless networks at the same time.

The central funding model for ICT in schools is not meeting current needs

Funding for the Technology for Learning program to deliver ICT in schools has not increased since 2004, despite an increase in the number of students and emphasis placed on ICT in teaching and learning during this time. Schools supplement funding for ICT from their existing school budget and Parents and Citizens Associations.  

The Department’s current funding model for ICT is not adequately addressing a growing gap in the provision of contemporary ICT in classrooms between schools able to access funding from other sources and those which cannot. The Department needs to review whether the Technology for Learning program is equitable in equipping all schools with the modern technology needed to achieve its vision.

Many teachers are not provided with devices for use outside of the classroom

School Principals we interviewed reported that technology is an essential part of a modern classroom and teacher access to devices outside of the classroom can impact how they use ICT. This is because, in practice, teacher working days extend outside classroom hours and teachers need access to devices for activities such as lesson preparation and student assessment. The Department provides teachers with access to a suite of software tools for these tasks.

The Commonwealth Government’s Digital Education Revolution program provided teachers of secondary school students with laptops from 2009 to 2013. The Department’s evaluation of the Digital Education Revolution program found that teachers reported greater confidence with, and use of, ICT throughout the program.  
Providing desktop computers, laptops or tablets for teachers is now a school level decision and arrangements vary across schools. Each school must trade-off between allocating devices for students and teachers. Most other States and Territories provide all teachers with a laptop for use in and outside of the classroom or offer subsidised access to one.  

There is limited teacher professional learning in the use of ICT

The Department’s research has identified that professional learning is an important factor in how effectively teachers use ICT to enhance teaching and learning. Despite this, the Department provides few courses on using ICT in the classroom directly, and most of these are offered in Sydney. This limits accessibility for teachers outside of the metropolitan area. Schools we visited reported that the costs of courses and providing relief teachers limits the number of external courses or events that teachers attend, especially for rural and regional schools. Increasing the use of online learning would improve access for teachers in these areas.  

The Department is not adequately monitoring trends in professional learning in ICT or evaluating the overall effectiveness of courses. A recent upgrade to the professional learning system may provide the Department with better quality data to do this.

Greater monitoring and reporting on technology use in schools is required

The Local Schools, Local Decisions policy gives schools greater authority to make strategic decisions on the use of ICT appropriate to their local contexts. To support this, the Department needs to better monitor current trends, and identify emerging needs to determine future direction and how best to support schools.  

For example, the Department does not currently know how many devices are allocated to teachers or how many schools have implemented a student Bring Your Own Device scheme. This affects how schools are using ICT, and places demand on the network and the type of support the Department must provide. An assessment of the ICT maturity of schools would help the Department target its resources to schools requiring greater assistance with planning.

The Department does not regularly monitor or report on student capabilities with ICT. A national assessment found that the ICT literacy of a sample of Year 6 and Year 10 New South Wales students fell between 2011 and 2014. The fall was greater in New South Wales than in other States and Territories. Without more regular assessment or reporting, the reasons behind this fall and the distribution of student capabilities between schools will remain unknown. 

By July 2018, the Department of Education should:

  1. Review the Technology for Learning program and school ICT support resourcing to determine whether resourcing is adequate for modern school requirements.
     
  2. Develop a program to improve wireless networks in all NSW schools, for instance by expanding the Connecting Country Schools Program to all NSW schools.  
     
  3. Implement an assessment of school ‘ICT maturity’ and use this to target assistance to those schools requiring support with forward planning for ICT.
     
  4. Improve the use of evidence to inform plans and strategies, including:
    • more detailed monitoring of teacher and student access to and use of ICT
    • evaluating the impact of teacher professional learning on student outcomes 
    • further examining the links between ICT and student outcomes.
       
  5. Improve teacher access to devices for use outside of the classroom to improve how effectively they integrate ICT into teaching and learning.
     
  6. Improve teacher professional learning by providing more:
    • online learning opportunities for teachers in regional and remote areas
    • courses focused on pedagogy to make best use of ICT.
       
  7. Identify the ICT skills students need, and provide teaching resources to develop these skills and monitor their achievement.

Appendix One - Response from the Agency

Appendix Two - About the audit

Appendix Three - Performance auditing

 

Parliamentary reference - Report number #289 - released 6 July 2017 

Published

Actions for Mining Rehabilitation Security Deposits

Mining Rehabilitation Security Deposits

Planning
Industry
Environment
Infrastructure
Management and administration
Project management

The Department of Planning and Environment requires mining companies to rehabilitate sites according to conditions set in the mining development approval. The Department holds mining rehabilitation security deposits that are meant to cover the full cost of rehabilitation if a mining company defaults on its rehabilitation obligations.

The total value of security deposits held has increased from $500 million in 2005 to around $2.2 billion in 2016, covering around 450 mine sites in New South Wales.

While there have been substantial increases in total deposits held, mine rehabilitation security deposits are still not likely to be sufficient to cover the full costs of each mine's rehabilitation in the event of a default.

This audit was undertaken when the Department of Industry, Skills and Regional Development was responsible for ensuring land disturbed by mining activities is rehabilitated in accordance with the relevant development approval, including the administration of mining rehabilitation security deposits. On 1 April 2017, this responsibility was transferred to the Department of Planning and Environment (the Department).  

This audit assessed whether the Department maintains adequate security deposits to cover the liabilities associated with mine closures, including rehabilitation. Companies authorised by the Department to undertake mining activities must provide a security deposit to cover the full costs of rehabilitation in the event of default by the company. Rehabilitation is the treatment of disturbed land or water to establish a safe, stable, non-polluting and sustainable environment.

Mining companies must provide an estimate of rehabilitation costs for each site. The Department provides a Rehabilitation Cost Calculation tool to assist companies calculate the deposit amount. Companies are also required to ensure that the cost estimate is in accordance with the approved Mining Operations Plan (MOP). The MOP is intended to be a mine rehabilitation and closure plan, and forms the basis for the estimation of the security deposit. The Department reviews the estimates and determines the deposit for each site.  

Security deposits are an option of last resort. The Department has other legislative and regulatory tools which it normally uses to promote compliance with rehabilitation requirements before accessing a security deposit. It can direct action by the mining company, issue fines and even have the Minister revoke a mining lease. To date, the Department has never had to access a security deposit for a state significant development mine site.

Conclusion

The Department holds security deposits for mining rehabilitation consistent with the amounts it has requested from mining companies, and it should be able to claim on a deposit if a mining company defaults on its rehabilitation obligations. The total value of deposits has increased from $500 million in 2005 to around $2.2 billion in 2016, covering around 450 mine sites. The Department’s management of the security deposit process has improved in recent years, and it has well advanced plans for further improvement, including a revised cost calculation tool.

The Department’s policy is that each mine’s security deposit should cover the full costs of rehabilitation for that mine. The security deposits the Department holds are not likely to be sufficient to cover the full costs of each mine’s rehabilitation in the event of a default. The rates and allowances in the current cost calculation tool have not been updated since 2013 and some activities required for effective rehabilitation are not covered, or not covered adequately.

Security deposits also do not include sufficient contingency given the substantial risks and uncertainties associated with mine rehabilitation and closure, particularly in the absence of a detailed closure plan. This risk is exacerbated by the limited independent verification of mining company claims about the size of the outstanding rehabilitation task, which remains the case despite recent improvements to monitoring and review procedures and practices.  

There is also no financial assurance held over the risk of significant unexpected environmental degradation in the long-term after a mine is deemed to be rehabilitated and the security deposit is returned. A security deposit is not an appropriate vehicle for covering this risk.

Security deposits are close to calculated value and should be accessible if needed

The value of securities held by the Department aligns with the latest approved rehabilitation cost estimates. This contrasts with the situation found by investigations in Victoria and Queensland, where deposit amounts held fell below the calculated costs.

The security deposits are usually in the form of a bank guarantee or cash. The Department has obtained legal advice indicating that it should be able to claim on these bank guarantees if the need arises. As the guarantee is between the financial institution and the Department, if a mining company goes into liquidation the Department should still be able to access the funds.  

When the latest estimate of rehabilitation costs is higher than the existing deposit, the Department will request additional security. It has experienced extensive delays in obtaining additional security for some sites, increasing the risk that available funds will be insufficient if needed.

Rehabilitation cost estimates are not yet adequate, but improvements are planned

The Department’s policy is for security deposits to cover the full cost of rehabilitation. No discounts are provided to mining companies for past good behaviour or low likelihood of default, unlike in some other states. Discounting could undermine the policy position.  

Current security deposits are unlikely to cover the full cost of rehabilitation on each mine site. The Department provides a rehabilitation cost calculation tool to help mining companies calculate the cost of rehabilitation and the required deposit amount, but:

  • several activities required to effect closure are not included and others underestimated
  • it does not make provision for industry cost changes over time
  • the rates used in the tool have not been updated since 2013
  • it was not able to provide the basis for the rates and allowances in the tool.

The Department reviews cost estimates provided by mining companies, but its verification of the extent of rehabilitation work on which these estimates are based is limited. It relies instead on section 387C of the Mining Act 1992 which makes it an offence for mining companies to provide false or misleading information. It is not evident how the Department would establish that information provided was false or misleading without more verification work, and six of the 14 cost estimates we reviewed were not signed by the mine manager, making enforcement more difficult.  

The Department has developed a new calculation tool, and recently released it for industry consultation. The new tool should improve rehabilitation estimates. It updates rates and allowances, and includes additional items to better cover required rehabilitation tasks. While a substantial improvement, the new tool could be further improved by providing additional coverage for stakeholder engagement, additional planning approvals, insurance costs, and any additional design, research and verification work required for successful closure.

There is no financial assurance over long-term environmental risks

The Department does not hold any financial assurance to cover the costs associated with mitigating any future environmental degradation once a mine closes and the security deposit is relinquished to the mining company. Security deposits are probably not the appropriate mechanism to cover these long-term risks but the risk of potential post-closure environmental degradation still needs to be costed and covered. A fund to cover the state-wide risk, to which all mines would contribute, is a possible mechanism.

Rehabilitation and closure outcomes are vague, particularly for unplanned closure

Rehabilitation outcomes in the MOPs we reviewed were generally not specific. Any lack of specificity in MOPs translates into uncertainty about rehabilitation work required if a mining company defaults. Part of the problem is that rehabilitation outcomes established in planning approvals are usually not specific and may not address all closure requirements. The Department has recognised there is scope to improve the clarity and specificity of rehabilitation requirements in planning approvals, and has started a review focusing on open-cut mines.

Rehabilitation outcomes are even less specific in the event of an unexpected early closure because they will probably be different from that achievable from a planned closure.  

MOP guidelines do not cover management of some key closure matters, such as the requirements of environment protection licences issued by the Environment Protection Authority and the management of heritage sites during closure.

There were significant variations in quality of MOPs we reviewed and the way closure risks and uncertainties were identified and addressed. The Department plans to improve the quality of rehabilitation programs through enhanced guidance and oversight.

Monitoring is not adequate to effectively gauge rehabilitation progress

The Department was not able to show it has been monitoring operational mine sites effectively to gauge the progress of ongoing site rehabilitation and the management of closure risks. There was no protocol for site inspections and limited evidence of inspections for the sites we reviewed.

The Department receives annual environmental management reports from mining companies, with most describing the areas of disturbance and rehabilitation occurring at each mine site. The Department recently established procedures for reviewing these annual reports, and has developed a risk-based process for prioritising reviews.

Most annual reports we reviewed did not explain environmental changes over time, nor the risks to mine closure and the measures required to mitigate them. For example, analysis of changes to surface water and groundwater quality was limited despite its relevance for assessing future contamination risks.

The Department does not currently have adequate processes in place to effectively verify the reported areas of disturbance and rehabilitation. It is developing geographic information system-based tools to better measure areas of disturbance and rehabilitation, new rehabilitation guidelines, and a procedure for determining whether rehabilitation has been successful. These initiatives should improve the monitoring and reporting of rehabilitation progress at mine sites.

There is no mechanism to prevent a mine being in ‘care and maintenance’ indefinitely

The Department does not have a clear policy on the length of time and circumstances under which a mine can remain in ‘care and maintenance’. Indefinite postponement of rehabilitation and closure is therefore possible. 'Care and maintenance' is the period following temporary cessation of operations when infrastructure remains largely intact and the site continues to be managed. There are a range of valid reasons for a mining company to put a mine in ‘care and maintenance’, but it is also reasonable for the community to expect a limit to how long it has to wait for proper rehabilitation.

Mining operations make a significant contribution to the NSW economy, including over $1.3 billion in royalties each year. Around 400 mine sites throughout NSW provide over 40,000 jobs and are a major source of economic activity for many communities. Despite these benefits, it is important to ensure that mining companies fulfil their obligations to rehabilitate land disturbed as a result of mining activity.

We recommend that the Department should, by January 2018:

1. Improve the quality of rehabilitation and closure plans by:

  • ensuring plans submitted by mining companies include robust mine rehabilitation and closure risk assessments
  • clarifying the level of detail required in plans at each stage of a mine’s operation
  • specifying how requirements set under other legislative instruments (e.g. environment protection licences, heritage assets) should be addressed.

2. Improve assurance that security deposits are sufficient by:

  • ensuring its new cost calculation tool adequately covers all works needed for rehabilitation and closure
  • increasing the contingency for uncertainties associated with mine rehabilitation and closure, at least until the mining company provides a detailed closure plan
  • verifying the cost estimates for a sample of high risk sites annually
  • ensuring that when mining companies are required to provide increased security deposits, they do so with minimal delay.

3. Enhance oversight of mine rehabilitation by:

  • developing a protocol to ensure sufficient and adequate site inspections
  • ensuring mining companies report performance against rehabilitation targets and environmental changes clearly, including an analysis of long-term surface water and groundwater trends in terms of levels, flow and quality
  • improving how it determines the progress and success of mine rehabilitation
  • developing clear policy and procedures for ensuring a mine cannot be put into ‘care and maintenance’ indefinitely.

4. Collaborate with relevant agencies to establish a financial assurance mechanism, such as a sinking fund, to cover the risk of long-term environmental degradation after mines are closed and security deposits returned.

Appendix One - Response from the Department

Appendix Two - About the audit

 

Parliamentary reference - Report number #285 - released 11 May 2017

Published

Actions for Planning for school infrastructure

Planning for school infrastructure

Education
Infrastructure
Management and administration
Project management

The Department of Education proposes to fundamentally reform school infrastructure planning and delivery to meet the future demand for student places, and to overcome chronic under-investment for much of the last decade. To do this, it will need to spend much more than it has been receiving to date.

The Department of Education (Department) must provide students with a place in a government school if parents desire it. Over the next 15 years, the student population in NSW Government and non-government schools is projected to grow by 21 per cent to nearly 1.5 million students. Over 80 per cent of this is expected to be in the Sydney metropolitan area.

Improving education outcomes of students is a NSW State Priority. Research shows that well designed and maintained facilities improve student learning outcomes. A strategic objective of the 2014 State Infrastructure Strategy Update is to ‘equip growing urban and regional populations with the modern schools and training infrastructure required to deliver educational service for a competitive, innovative economy’. 

This audit assessed whether the Department has a strategy and implementation model to ensure it has sufficient fit-for-purpose student learning spaces when and where needed.

 

Conclusion

For much of the last decade, there has been chronic under-investment in NSW government school infrastructure and deficiencies in asset planning. Many schools have more students than can be accommodated in existing classrooms, and demountables are widely used for extended periods. The condition of classrooms has been declining due to insufficient maintenance, and many are not configured to support contemporary and desired future learning and teaching methods. At the same time, the government school student population is predicted to grow further, particularly in Sydney.

In response to this challenging situation, the Department has recently developed a School Assets Strategic Plan (Strategic Plan) designed to accommodate the expected student population up to 2031. This is the first such plan for the Department. It is a good plan. It covers the issues we would expect and has benefited from expert input and independent validation of assumptions, proposed solutions, and the likely costs.  

The strategy embodied in the Plan includes elements that may be confronting for the community. To contain costs, the Department proposes several potentially controversial changes to the way schools are planned, designed, built, managed and funded. These include increasing the maximum number of students in new and redeveloped schools; stronger emphasis on redeveloping schools; smaller, more intensely developed sites; changing and enforcing school catchments; increased partnerships with the private sector and more recycling of school assets to deliver better facilities.

Even with these reforms, the estimated cost of infrastructure needed up to 2031 is significantly more than the Department has been receiving to date. Without the proposed reforms, the Department will need much more again. The Department’s funding estimates are conservative due to the scale of proposed reform, the radical change it represents, and the risks to implementation. At the time of the audit, the government had not committed to make available the funding needed to implement the Plan.

Even if the Department obtains additional funding, implementing such a major reform will be challenging. It will require effective collaboration between, and the support of, school communities, local government, potential private sector partners, the non-government schools sector and government agencies. Many risks will need to be mitigated, any of which could undermine the strategy and drive up costs.  

Further savings beyond those already identified would be possible through changing operational policies on matters such as class sizes, operating hours, and single-sex, selective, sports and performing arts schools. Any changes to such policies have implications beyond just infrastructure cost and are likely to be even more controversial.

Asset planning and investment for much of the last decade has been deficient

Over the last decade, there has been chronic under-investment in NSW Government school infrastructure. This has affected both new works and maintenance of existing assets. Until recently, the Department did not have a high-level, long-term school asset strategic plan. The Department had limited understanding of the funds needed over the long term to provide the necessary school infrastructure to meet educational needs of students economically. It had no robust method to determine whether priorities were correct and assess whether the funding split between building, upgrading and maintaining was appropriate.  

Permanent classrooms in 37 per cent of government schools are fully utilised, and 180 schools are operating beyond their permanent classroom capacity. The utilisation rates vary between regions and districts. Demountables are being used for extended periods to cater for permanent student population growth. A significant increase in the number of demountables at some schools decreased student access to amenities and open play spaces. 

The Department now has a Plan to meet future needs

The Department recently developed a Strategic Plan designed to ensure that there are sufficient fit-for-purpose places for students where and when required up to 2031. The Strategic Plan outlines the:

  • predicted demand for future learning spaces
  • condition of existing infrastructure and additional infrastructure and maintenance required
  • proposed new initiatives to deliver the required infrastructure economically
  • proposed new cluster planning model to determine priorities and initiatives to be implemented at the school level
  • funding needed to provide appropriate learning spaces where and when needed.

The Strategic Plan has been developed with the benefit of expert advice and has been reviewed extensively within the Department, by other key government agencies and experts. The review process examined the Strategic Plan’s assumptions, data quality, proposals and cost estimation approach. This process has increased assurance and improved the Strategic Plan, but has delayed implementation by approximately a year so far.

Many more learning spaces will be needed

The Strategic Plan identifies that over the next 15 years the student population in government schools will increase by 21 per cent and that the Department will need:

  • 7,200 additional classrooms and to upgrade many existing classrooms to meet future teaching and learning needs
  • to undertake much more planned maintenance, otherwise 40 per cent of existing government school buildings will be in such poor condition that learning outcomes could be compromised.

The Department proposes a new approach designed to minimise costs

Given the need for substantial additional infrastructure and maintenance, and underfunding over the last decade, the Department has sought to minimise costs while maintaining quality.

Initiatives proposed include an increase in the maximum number of students in new and redeveloped schools; a stronger emphasis on redeveloping existing schools; smaller, more intensely developed school sites; strengthening partnerships with the private sector to improve school assets; and school consolidation and sale of surplus land to reinvest in better facilities. We did not identify any additional options that could be proposed to make further cost saving under current operational policy settings.

The proposed new cluster planning model will assess schools in a region or district to identify the best way to deliver school assets to a cluster as a whole rather than individual schools. It will identify the most effective and efficient asset solution within a cluster of five to 15 schools.

It represents an improvement over the previous model which addressed infrastructure needs on a school-by-school basis. The initial focus of school cluster planning will be on areas of highest student growth.

The proposed new cluster planning model has potential to create efficiencies and economies of scale if implemented well. Cluster planning will determine which of the various initiatives should be implemented in the schools in the cluster. It recognises that solving enrolment trends in one school requires consideration of surrounding schools and seeks the optimum asset solution for identified schools.

Implementation will be a major challenge

Effective implementation will require good collaboration with other government agencies, non-government schools, the private sector and the community. The Department has been improving its consultation with other government agencies and the non-government school sector, and has developed models for collaborating with the community and private sector. The Strategic Plan proposes open access to information, which will be important for effective collaboration and partnerships.  

There are many risks to effective implementation, which could drive up costs. These include opposition from school communities, a reduction in the proportion of students educated in non-government schools, unexpected increases in land and construction costs, failure to sufficiently streamline the planning approval system or a blow-out in renovation costs in older schools.  

To provide and maintain the infrastructure needed up until 2031, the Department estimates it will need significantly more money than it receives now even if it implements its initiatives and cluster planning effectively. It would require much more again if it was to retain its current approach to planning and delivering school infrastructure.  

The current school infrastructure funding arrangement does not support effective long-term planning. A four-year commitment to education infrastructure funding does not provide the flexibility needed for the Department to manage its allocations and respond to changes in priorities or emerging challenges. The Health and Transport clusters receive a ten-year funding commitment, known as a capital planning limit.

Changing operational policies could increase school utilisation

Further significant cost savings are only likely if the Department changes some operational policies. Class size is a key determinant of the number of classrooms needed. Choice in school enrolment and the existence of single-sex, selective, sports or creative and performing arts schools all can lead to underutilisation of schools and classrooms because they are not accessible to all students.  

The Department of Education should:

1. regularly revisit and evaluate the Strategic Plan to keep it contemporary, refine it based on learnings, update cost estimates to reflect actual results, and respond to available funding

2. work with NSW Treasury to develop a framework for partnering with the private sector

3. align Total Asset Management plans with cluster plans as they are developed

4. closely consult and collaborate with communities on implementation of the Strategic Plan

5. continue to collaborate with key government agencies, local government, the non-government school sector and the private sector on implementation of the Strategic Plan

6. publish detailed information on the status of assets, current and projected enrolments, and planned school projects to support effective consultation and collaboration

7. seek a ten-year capital planning limit from NSW Treasury

8. advise the government on options to change operational policies and practices to reduce infrastructure requirements.