BCP in A Box
BCP in A Box
BCP in A Box
in a Box
Overview Document
Content Complexity
ADVANCED
Contents
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Continuity of Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Contact. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Disclaimer
The information herein is being provided “as is” for information purposes only. The authors
do not endorse or favour any commercial entity, product, company, or service, including any
entities, products, or services linked or otherwise referenced within this document.
NOTE: If you are an existing Microsoft 365 or Google Workspace customer, we do not
i recommend use of Business Continuity in a Box. In these instances, we suggest contacting
the relevant hosting provider for support.
cyber.gov.au 3
Box can be integrated into an existing BCP. However, • ASD’s ACSC Cyber Incident Response Plan
due to its targeted focus on email communications at cyber.gov.au/resources-business-and-
and critical applications, Business Continuity in a government/essential-cyber-security/
Box cannot replace a BCP in its entirety. We strongly publications/cyber-incident-response-plan
encourage organisations to invest in a comprehensive
• CISA Federal Government Cybersecurity
BCP tailored to their unique business needs. For
Incident and Vulnerability Response Playbooks -
more guidance on how to prepare your organisation
Although tailored to U.S. federal civilian branch
for a cyber incident, see the following resources:
agencies, these playbooks provide operational
• ASD’s ACSC Preparing for and Responding procedures for planning and conducting
to Cyber Security Incidents at cyber.gov.au/ cybersecurity incident response activities and
resources-business-and-government/governance- detail each step for incident response.
and-user-education/governance/preparing-
and-responding-cyber-security-incidents
Is Business Continuity
in a Box right for your
organisation?
In the event of a cyber incident, Business Continuity in • the Continuity of Communications package requires
a Box assists small to medium-sized organisations (10- a basic level of computing knowledge; and
300 people) who require an interim Information and
• the Continuity of Applications package requires an
Communication Technology (ICT) solution to deliver
intermediate level of knowledge of cloud services.
minimal services. Larger enterprises and government
departments can also use this guidance. However, Business Continuity in a Box includes some
they may need to apply additional configuration technical implementation details (where
steps. It is recommended that larger organisations appropriate). However, due to the unique
consult with an MSP and carry out appropriate needs of individual organisations, it is not
independent risk and business impact assessments. possible to provide specific technical details
for all types of technologies and software that
Whilst Business Continuity in a Box has been designed
consumers of this guidance may require.
to maximise ease of use, implementation of:
NOTE: If you are an existing Microsoft 365 or Google Workspace customer, we do not
i recommend use of Business Continuity in a Box. In these instances, we suggest contacting
the relevant hosting provider for support.
Incident
Incident Recover
Incident containment Operate Learn &
investigation data &
realised & evidence normally improve
& analysis systems
collection
cyber.gov.au 5
on better practice security configuration advice The Continuity of Applications
from ASD’s ACSC, as well as recent guidance from package includes guidance on:
CISA and the Center for Internet Security (CIS).
• Determining critical functions and requirements
Further guidance on better practice security to ensure continued business operations.
configuration is detailed below:
• Determining an appropriate platform for
• ASD’s ACSC Cloud Computing Security each required interim application.
Considerations at cyber.gov.au/resources-
• Deploying a secure cloud-hosted Infrastructure-
business-and-government/maintaining-
as-a-Service (IaaS) solution for each major cloud
devices-and-systems/cloud-security-guidance/
hosting provider, enabling organisations to
cloud-computing-security-considerations
take advantage of existing software licenses as
• ASD’s ACSC Guidelines for System Hardening at well as organisational knowledge and skills.
cyber.gov.au/resources-business-and-government/
essential-cyber-security/ism/cyber-security-
guidelines/guidelines-system-hardening
Contact
For any enquiries concerning this guidance or
• CISA Secure Cloud Business Applications (SCuBA) to provide feedback, please navigate to cyber.
Project at cisa.gov/resources-tools/services/secure- gov.au/about-us/about-asd-acsc/contact-us.
cloud-business-applications-scuba-project Select ‘General enquiry or feedback’, and choose
• CISA Microsoft 365 Secure Configuration Baseline ‘Business Continuity in a Box’ from the drop-down
Assessment (SCuBAGear) Tool at cisecurity.org/ menu under ‘Your enquiry/feedback type’.
benchmark/microsoft_windows_desktop If you or your organisation are victim of a data breach
• CIS Secure Configuration Guidelines at cisecurity. or cyber incident, follow relevant cyber incident
org/benchmark/microsoft_windows_desktop response and communication plans, as appropriate.
Copyright.
© Commonwealth of Australia 2023.
With the exception of the Coat of Arms and where otherwise stated, all material
presented in this publication is provided under a Creative Commons Attribution
4.0 International licence (www.creativecommons.org/licenses).
For the avoidance of doubt, this means this licence only applies to material
as set out in this document.
The details of the relevant licence conditions are available on the Creative
Commons website as is the full legal code for the CC BY 4.0 licence
(www.creativecommons.org/licenses).
cyber.gov.au 7
Business Continuity
in a Box
Guidance:
Continuity of Communications
Content Complexity
SIMPLE
Contents
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Purpose . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Guidance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Stage 1: Review Pack and Verify Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Contact. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Disclaimer
The information herein is being provided “as is” for information purposes only. The authors
do not endorse or favour any commercial entity, product, company, or service, including any
entities, products, or services linked or otherwise referenced within this document.
Continuity of Communications focuses on keeping communications flowing during a cyber incident by assisting
organisations to establish basic communications functions quickly and securely. It provides guidance to
organisations on how to deploy a Microsoft 365 tenant and Exchange Online configuration when core systems,
such as user directory and email, become unusable or unavailable.
NOTE: If you are an existing Microsoft 365 or Google Workspace customer, we do not
i recommend use of Business Continuity in a Box. In these instances, we suggest contacting
the relevant hosting provider for support.
Overview
Business Continuity in a Box – developed by the Australian Signals Directorate’s Australian Cyber Security Centre
(ASD’s ACSC) with contributions from the United States Cybersecurity and Infrastructure Security Agency (CISA) –
is an interim solution to be deployed by either the organisation or its Managed Service Provider (MSP). Successful
implementation of Continuity of Communications entails provisioning and configuring of a Microsoft 365
Business Standard tenant and requires a basic level of computing knowledge.
The implementation steps within this guidance will enable an organisation to provision a trial Microsoft 365
Business Standard tenant which includes Microsoft Entra ID (formerly Azure Active Directory), Exchange Online,
and associated security services. The guidance also steps through the establishment of a ‘catch-all’ email inbox,
established as a priority to ensure critical communications sent to an organisation can continue to be received
while other communications systems are unavailable.
Once the Microsoft 365 tenant has been provisioned, the guidance steps through how to deploy the
accompanying automation tool – preconfigured security settings and system configurations via PowerShell
scripts.
The tool provides a mechanism to automatically configure the Microsoft 365 tenant so that it is secure and
functional. This reduces the workload on system administrators, allowing them to better focus on other recovery
efforts for the organisation.
The tool automates the configuration of the Microsoft 365 tenant by:
• Applying settings to the Microsoft 365 tenant to secure the organisation and its users.
• Securely configuring Exchange Online and Microsoft Defender to protect the organisation from malicious and spam
emails and attachments.
• Creating a temporary ‘catch-all’ mailbox to ensure all emails sent to the organisation’s email address are captured.
cyber.gov.au 3
Creating an emergency account which should be used in situations where existing administrators are unable
to log into their accounts. The configuration provides a secure foundation for organisations to expand on
as needed. This may include enabling additional Microsoft 365 services or provisioning additional cloud
capabilities to enable restoration of other business services such as financial management or human resource
management (see: Business Continuity in a Box - Guidance: Continuity of Applications).
The Continuity of Communications package uses the following Microsoft 365 services:
• Exchange Online provides an organisation with enterprise email and calendar capabilities. Access to Exchange
Online can be via a traditional desktop email client or via Outlook Web Access through the user’s internet browser.
• Microsoft Defender is an integrated security solution across the Microsoft 365 suite, which
offers protection against phishing emails, malware and other threats across Office 365
applications, Exchange Online, SharePoint Online and managed devices.
The following Microsoft 365 services are out of scope of the Continuity of Communications package:
• SharePoint Online and OneDrive for Business offer document management and collaboration capabilities.
This document uses the below callout boxes to highlight various information.
This document is divided into five consecutive stages. The term ‘operator’ refers to the person responsible
for implementation of the Business Continuity in a Box solution within their organisation. The below diagram
represents the staged process and the prerequisites for each stage.
Computer
This guidance assumes the operator will use a Microsoft Windows-based personal computer (PC) running
Windows 10 or Windows 11 using the Microsoft Edge browser to perform the steps. Instructions within this
guidance can be completed using alternative solutions. However, the operator will need to interpret the steps for
the specific operating system and browser.
Business Continuity in a Box is designed for use during a cyber incident that has affected access to or trust of an
organisation’s systems. The selected PC must therefore be independent from the organisation’s IT environment,
including network and Internet connection.
The automation tool within this guidance uses the command-line shell scripting language and configuration
management framework called PowerShell. Configuration of the automation tool is done via supplied
configuration files which have the ‘.config’ file extension.
Phone
During the setup process, Microsoft will either text or call a verification code to a phone. Voice over internet
protocol (VOIP) systems generally do not allow the receiving of the verification phone call. Microsoft
recommends not using a VOIP phone number for the verification process.
Email
During the setup process, Microsoft will email an account confirmation to the email address provided during the
setup process. To receive the confirmation email, the operator must have access to the email account.
cyber.gov.au 5
NOTE: Whilst ordinarily it would be preferred to avoid use of a personal email account, the
nature of the cyber incident may restrict alternatives. If the operator does not have access
i
to an appropriate email account, the operator could choose to sign up for a new email
account using providers such as Microsoft Outlook or Google Mail.
! WARNING: Do not use an email address associated with the affected organisation.
Organisation Information
Continuity of Communications will provision and configure Exchange Online to enable an organisation to
capture all incoming emails to their existing domain name. To redirect emails to Exchange Online, the operator
will require access to the organisation’s public Domain Name Service (DNS) hosting provider in order to modify
the text (TXT) and mail exchange (MX) records.
NOTE: Given the scenario in which Business Continuity in a Box should be used, we do
not recommend creating new domain records. To receive email messages sent to the
i
organisation’s existing email addresses, only the relevant domain(s) for those email
addresses should be modified to update the TXT and MX records.
Configuration steps for modifying DNS records vary depending on the hosting provider. The organisation
will be required to supply the operator with the appropriate credentials to access the hosting platform. If
the organisation cannot provide the necessary credentials, they must contact their hosting provider prior to
proceeding further. If the hosting provider cannot be located, a DNS lookup using a free service such as www.
mxtoolbox.com depicted in the image below may assist.
NOTE:
This stage of the guidance provisions a trial Microsoft 365 Business Standard tenant.
Microsoft allows a one-time extension of the trial period for an additional 30 days within 15
days of the trial expiry date.
i
A paid Microsoft 365 Business Standard plan allows for the provision of up to 300 user
licences.
If the 25-user license limit offered by the trial plan is insufficient for an organisation’s needs,
the organisation can, at any time, convert the trial to a paid subscription to gain access to
the full user license allowance.
Stage Prerequisites
The operator completing this stage will require:
3. Valid email address to use during the registration process (must not be
associated with or hosted on the network experiencing disruption)
4. Phone that can receive a phone call or a SMS verification code (non-VOIP)
cyber.gov.au 7
Process
1. Navigate to the Microsoft 365 Business Standard Sales Portal at microsoft.com/en-au/microsoft-365/business/
microsoft-365-business-standard
3. In the next screen, ensure that only one person is selected and click ‘Next’.
NOTE: Selecting one user at this stage does not restrict the number of users that an
organisation can add to the tenant. The trial allows for an additional 24 users. Selecting one
i
user at this stage will simplify the setup and configuration process until the organisation has
configured the remainder of the Microsoft 365 tenant.
cyber.gov.au 9
6. Enter the required information and click ‘Next’.
NOTE: The country or region selected on this screen will determine the data centre region
i for data storage. Set this entry to the appropriate country or region to meet your data
storage requirements.
7. Enter a phone number that can receive a phone call or SMS verification code and click ‘Send verification code’.
9. Enter a username, domain name and password, and then click ‘Next’. This will create a ‘Global Administrator’
account with the chosen username and password required in later stages of this guidance.
NOTE: Username: The username on this screen will be the primary administrator account to
gain access to the Microsoft 365 administration portal.
i
Domain Name: Microsoft requires initial use of ‘.onmicrosoft.com’. After setup, the
organisation’s own domain name can replace this.
cyber.gov.au 11
WARNING:
Ensure to record the username, domain name and password in a secure location (location
! must not be associated with or hosted on the network experiencing disruption). Until
additional users are added to the tenant with appropriate access permissions, loss of the
credentials will result in an inability to access the Microsoft 365 environment.
10. Microsoft requires a valid credit card to register a Business Standard subscription, click
‘Add Payment method’, complete the payment information, and click ‘Save’.
NOTE: Microsoft will not bill the credit card within the trial period. However, Microsoft will
verify the validity of the card and create a billing account. The billing account is used to
manage account settings, invoices, update payment methods and purchases. For more
information about billing accounts, see:
At the end of the free trial period, the trial subscription will automatically convert to a paid
subscription, defaulting to the same plan selected for the trial period. Charges to the credit
card will not be incurred if the trial subscription is cancelled prior to the end of the free trial
period. The trial will automatically expire at the end of the 30-day period and the credit card
will not be charged.
12. After a short period, the screen will update to show a confirmation that the Microsoft 365 Business
Standard subscription process is active. Ensure the information is saved to a location where it
can be accessed in the future (location must not be associated with or hosted on the network
experiencing disruption), and then click ‘Start using Microsoft 365 Business Standard’.
cyber.gov.au 13
Stage 3: Configure Organisation Settings
Overview
This step configures the organisation’s existing DNS information to point to the new Microsoft 365 Business
Standard tenant, enabling email routing.
Stage Prerequisites
The operator completing this stage will require:
3. Access to and ability to edit the organisation’s DNS settings in the provider portal
Process
1. Continuing from Stage 2, the operator will have the opportunity to install Microsoft 365 desktop applications.
Installation and operation of the desktop applications are not in scope for this guidance, so click ‘Continue’.
3. To verify ownership of the domain, Microsoft requires the addition of a TXT record or an MX record to
the DNS settings. This guidance uses the first option, ‘Add a TXT record to the domain’s DNS records’, but
the processes for adding an MX record is similar. Click ‘Continue’ after selecting the desired option.
NOTE: Microsoft allows for the upload of a text file to the organisation’s website.
i
However, this guidance assumes that the website is not available.
cyber.gov.au 15
4. Microsoft will attempt to identify the DNS hosting provider. If known, they will provide the steps to edit the DNS
records or a link to the DNS provider’s guidance documentation. To continue with this step, in a separate internet
browser window or tab, go to the organisation’s DNS hosting provider portal and add the identified TXT record
information. After editing the DNS record information on the hosting provider portal, return to the Microsoft 365
page and click ‘Verify’.
WARNING: It is important not to edit existing records at this stage. The DNS record entry is
to be added to existing entries only.
! Changes to DNS record information can take some time for Microsoft to find. If Microsoft
cannot find the new DNS record after clicking ‘Verify’, keep retrying. Depending on the DNS
hosting provider, changes can generally take anywhere from a few minutes to 48 hours.
6. To connect Microsoft 365 to the organisation’s domain, the DNS records require modification in the
DNS hosting provider portal. Click the default option ‘Add your own DNS records’. Click ‘Continue’.
cyber.gov.au 17
7. The next screen provides the DNS record information to implement in the DNS hosting provider portal. Follow
the guidance provided on this page and within the organisation DNS hosting provider guidance to add the DNS
records. Once complete click ‘Continue’.
WARNING: The changes made at this stage will cause all emails sent to the
organisation domain to be re-routed to the new Microsoft 365 tenant. Ensure a
backup of the DNS information in the hosting provider portal is made to enable the
organisation to switch back to the enterprise email solution when possible.
If the organisation can receive emails during the cyber security incident, it is
!
recommended not to proceed with this step until the catch-all mailbox is configured
within Exchange Online to minimise the risk of lost email messages during the change.
As with Step 4, changes to DNS record information can take some time for Microsoft
to verify. If Microsoft cannot find the new DNS record, keep retrying. Depending on the
DNS hosting provider, changes can take anywhere from a few minutes to 48 hours.
8. Once the DNS record information is configured and Microsoft can verify the updates, the setup will finish. The DNS
record information is now pointing to the new Microsoft 365 Business Standard tenant.
3. Apply the specified settings to the Microsoft 365 tenant and associated Exchange Online instance
WARNING: The ‘catch-all’ mailbox created by the automation tool is not supported by
Microsoft due to its lesser filtering capability and resultant increased risk of spam and
undetected phishing attempts.
Access to the catch-all mailbox should therefore be restricted and closely monitored to
reduce the likelihood of an unskilled operator accessing a potentially malicious email
message.
Where practical, the catch-all mailbox should be provisioned for as short a period as possible.
Once all users have been created within the new Microsoft 365 tenant, or business operations
are restored, the mailbox should be removed.
!
To minimise the impact to the Microsoft 365 tenant in the event of accessing a malicious
email message held within the catch-all mailbox, a separate user account should be created
with minimal access permissions to the remainder of the Microsoft 365 tenant. Ideally, this
user should be the only user to access the catch-all mailbox. However, given the limited
availability of user licenses within the trial tenant and the cost of an additional user licence,
this is something organisations will need to individually determine based on their own risk
assessment.
Additionally, the Microsoft 365 Business Standard subscription only allows each user up to 50
GB of mailbox storage per user. Given the nature of the catch-all mailbox, once this size limit is
reached, additional mail may be rejected.
Stage Prerequisites
The operator completing this stage will require:
NOTE: If continuing from previous stages within this guidance, the account created
i
in Stage 2 of the document has the necessary Global Administrator permissions.
cyber.gov.au 19
Process
Step 1: Preparation
1. Navigate to cyber.gov.au/resources-business-and-government/essential-cyber-security/
smallbusiness/business-continuity-box and download the automation tool compressed
folder, then open File Explorer and navigate to the download location of the folder.
a. Press the Windows Key on the keyboard or click the Windows button on the Taskbar.
b. In the “Search for apps, settings and documents” textbox, type “File Explorer” and click ‘Open’.
c. Navigate to the folder where the automation tool folder was extracted (e.g., Downloads).
2. Extract the contents of the package to a nominated location.
WARNING: Before performing the following steps, ensure the downloaded automation tool
! folder is from cyber.gov.au/resources-business-and-government/essential-cyber-security/
smallbusiness/business-continuity-box.
NOTE: Access to the Microsoft 365 tenant is dependent on the account that is used to
sign in. As such, there is no configuration required for the script to apply the default
configuration settings.
i
More specific configuration of the Microsoft 365 tenant is possible by editing the
configuration settings within the associated configuration files. This guidance does not
cover customised tenant configuration.
1. The automation tool can be run using either a Windows Normal User or Windows Administrator account.
2. To run the automation tool with the currently logged-in user, open the extracted package in File Explorer.
a. Press the Windows Key on the keyboard or click the Windows button on the Taskbar.
b. In the ‘Search for apps, settings, and documents’ textbox, type ‘File Explorer’ and then click ‘Open’.
c. Navigate to the folder where the automation tool folder was extracted and open the folder.
3. Locate the file BCiaB.bat and double click the file to begin implementation.
5. Early in the implementation, the operator will be presented with a prompt to enter the username and password for
a Microsoft 365 Global Administrator account. This is the username and password created within Stage 2 of the
setup process. Enter the username and password details of the user created during Stage 2 and click ‘Sign In’.
6. The automation tool will provide feedback to the operator on the process currently running. Do
not exit the open applications or shutdown the computer until the tool has finished.
7. Once the automation tool has finished, the user will be presented with a completion screen with a report
summarising the process and the changes, which can be used to troubleshoot any unexpected issues.
8. The new Microsoft 365 Business Standard trial tenant is now configured.
NOTE: Some settings may take time to be activated by background Microsoft processes.
i Microsoft advises that configuration can take up to 24 hours for certain features
and capabilities.
cyber.gov.au 21
Stage 5: Validate Environment
Overview
This stage walks through the process of verifying that the previous stages have been implemented correctly.
The operator will log into the new Microsoft 365 tenant, send an email from an external email service to the new
tenant, and then send an email from the new tenant to an external email address.
Process
1. Open an internet browser and navigate to Microsoft Outlook https://outlook.com.
2. Click ‘Sign in’, using the username and password of the Global Administrator account created in Stage 2.
7. Send an email to ‘info@<domain>’ where <domain> is the organisation domain not the ‘onmicrosoft.com’ domain.
NOTE: It is recommended you do not setup any email addresses before this stage,
as doing so may potentially create a new mailbox within Exchange Online. If the
i Microsoft 365 tenant already has an ‘info’ mailbox, replace ‘info@<domain>’ with
an alternative email address that does not exist to test that all email messages
sent to the organisation are captured within the catch-all mailbox.
9. Verify receipt of the email from step 6 within the Global Administrator mailbox.
11. Create a new email within Outlook and send to the email account used in step 5 of this Stage.
12. Return to the email account in step 5 and verify receipt of the email from the Global Administrator.
Appendix A: acronyms,
abbreviations and
definitions
This document uses the following acronyms and abbreviations:
PC Personal Computer
cyber.gov.au 23
Disclaimer
The material in this guide is of a general nature and should not be regarded
as legal advice or relied on for assistance in any particular circumstance or
emergency situation. In any important matter, you should seek appropriate
independent professional advice in relation to your own circumstances.
Copyright.
© Commonwealth of Australia 2023.
With the exception of the Coat of Arms and where otherwise stated, all material
presented in this publication is provided under a Creative Commons Attribution
4.0 International licence (www.creativecommons.org/licenses).
For the avoidance of doubt, this means this licence only applies to material
as set out in this document.
The details of the relevant licence conditions are available on the Creative
Commons website as is the full legal code for the CC BY 4.0 licence
(www.creativecommons.org/licenses).
Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Guidance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Stage 1: Determine your critical applications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Contact. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Disclaimer
The information herein is being provided “as is” for information purposes only. The authors
do not endorse or favour any commercial entity, product, company, or service, including any
entities, products, or services linked or otherwise referenced within this document.
Overview
Options for Software-as-a-Service (SaaS),
Platform-as-a-Service (PaaS) and Infrastructure-
as-a-Service (IaaS) are discussed within this
guidance, with a primary focus on IaaS.
cyber.gov.au 3
Guidance
Stage 1: Determine your Software as a service
1. Identify the critical business functions PaaS allows developers to host, build and deploy
of your organisation. their consumer-facing apps on a platform. Generally,
PaaS management and ownership stays with
2. Classify these critical business functions the developers, affording little to no control to
into the following categories: organisations regarding patching and updates of
iii. High (most critical) the underlying host infrastructure. PaaS can also
iv. Medium be slower to deploy than IaaS and SaaS, due to the
development time.
v. Low (least critical)
Based on the above factors, decide Infrastructure as a service
which functions are to be prioritised and IaaS platforms allow an organisation to manage their
included in the following stages. business resources such as their network, servers and
data storage on the cloud. IaaS is a pay-as-you-go
Stage 2: Determine service, which allows for cancellation any time after
the initial 30-day trial period. This makes it beneficial
your continuity path as a short-term business continuity solution.
When deciding on the best interim solution for an
organisation, key factors may include cost, and ease As an interim solution, an IaaS platform will most
of deployment and operation. SaaS, PaaS and IaaS closely mimic the existing computing infrastructure
are the three main cloud computing services with that would normally be hosted locally on an
each providing different features, functionalities and organisation’s premises. As IaaS can offer the ability
benefits. The most appropriate offering is dependent to replicate and recover core services in a rapid
on an organisation’s requirements for hosting, storing, and straightforward manner, the remainder of this
managing and processing information and data. guidance concentrates on the deployment of an IaaS
cloud solution.
• The IaaS solution must adhere to the security and Enhance security controls
compliance requirements of the organisation The principle of enhancing security controls
• The IaaS solution must meet any performance and highlights the importance of leveraging additional
availability requirements set by the organisation security capabilities available within cloud IaaS
platforms to strengthen the overall security posture
• The IaaS solution must be scalable for the of the migrated system. Cloud platforms offer
organisation’s requirements and easily maintainable various security features, such as network security
groups, security services, and identity and access
Architecture principles
management tools.
Cloud-based IaaS and PaaS deployments are
subject to several additional threats not commonly During the migration process, it is essential to identify
addressed in an on-premises architecture. This gaps with the on-premises hosted system and design
is typically due to the presence of compensating appropriate controls or compensating controls using
features for on-premises systems, which include single the available cloud platform features. By taking
network entry points, trusted user base, and limited advantage of these enhanced security controls, the
physical server access. As such, directly migrating an organisation can address the additional threats
on-premises system to a cloud-based IaaS solution introduced by cloud deployments and mitigate the
could immediately expose the rehosted system and associated risks effectively.
potentially the organisation to unaddressed risks. Ensure compliance and governance
To minimise these risks, this guidance introduces This principle emphasises the need to maintain
several architecture principles to allow the rapid regulatory compliance and adhere to the
migration of a system, effecting minimal changes organisation’s governance requirements. Moving to a
to the system and increasing security by leveraging cloud IaaS platform introduces additional compliance
additional security capabilities available within considerations such as data sovereignty, data
various cloud platforms. The principles within this protection, and other industry-specific regulations.
cyber.gov.au 5
To ensure appropriate compliance and governance Review and optimisation
arrangements, it is crucial to fully understand
12. Particularly in the initial stages of deployment,
the applicable regulations and requirements of
perform regular reviews of the migrated systems to
the organisation before migrating the system
determine where resources can be optimised, and
to the cloud. This assessment should inform the
costs reduced
design and implementation of security controls
and processes that align with organisation and 13. Document the new architecture and additional
regulatory compliance needs. Additionally, changes made to accommodate for the change to
organisations should establish proper monitoring a cloud hosting provider
and auditing mechanisms to maintain
compliance in a cloud-hosted environment. Components
IaaS implementations, regardless of selected CSP
Process
are comprised of several components or resources.
Planning When migrating on-premises systems to IaaS
platforms, it is essential to understand the differences
1. Select the cloud service provider (CSP) based on
in components and their corresponding security
your organisation’s operational requirements
controls to ensure secure operation of the system.
2. Define the target architecture for the system
By understanding and addressing the unique
3. Develop a plan for preparation, migration, security security considerations for each component
and compliance, and review and optimisation and the system, organisations can implement
effective security controls and measures
Infrastructure deployment
to protect their cloud IaaS solutions.
4. Procure a subscription from the selected CSP
Virtual infrastructure
5. Set up and configure necessary resources to meet
Virtual machines (VM) are the primary compute
operational needs
resources in a cloud IaaS environment. They host
6. Implement additional security features to address operating systems, applications, and services
any new threats resulting from the interim cloud required for system functionality. When migrating on-
implementation premises hosted systems, equivalent VMs should be
provisioned to maintain system architecture.
Data migration
Implement security controls for VMs, such as:
7. If possible, restore data from available backups
• Hardened Images: Utilise hardened VM images or
8. If necessary, ensure systems are connected to a templates that follow security best practices for the
centralised user directory specific operating system and application stack.
Security and compliance • Patch Management: Consistently apply
security patches and updates to VMs
9. Implement security controls suggested within the
to address known vulnerabilities.
examples and patterns, including encryption,
privileged administration workstations, gateway, • Anti-Malware/Antivirus: Install and configure
and federated identity security patterns anti-malware or antivirus software on VMs
to detect and prevent malicious activities.
10. Validate the security controls through testing and
auditing from within the cloud service provider • Least Privilege: Assign appropriate permissions
portals and tools and access controls to VMs to restrict access
to only approved administrators and users.
11. Implement additional compliance measures, such Storage
as implementing applicable security controls,
logging and monitoring, and reporting Cloud platforms offer several types of storage services
to store and manage data, such as:
cyber.gov.au 7
Endpoints Presented after this high-level guidance, are examples
of deployments for an n-tier architecture within Azure,
Endpoints refer to the devices or client systems
Amazon Web Services (AWS), and Google Cloud to
used to access the cloud-hosted system.
demonstrate the additional services that should be
• Endpoint Security: Implement endpoint protection considered to secure the system.
measures, including antivirus software, host-
Single-tier architecture
based firewalls, and secure configurations, on
devices used to access the cloud environment. A single-tier architecture is a simple, standalone
setup where the client, server and data storage
• Secure Remote Access: Utilise secure remote access
components are all combined in a single server. This
technologies, such as virtual private networks (VPNs)
model is typically implemented for small applications.
or bastion hosts, to establish secure connections
between client systems and the cloud environment. Advantages
IaaS architectural patterns • Easy to set up and manage due to its simplicity.
The following guidance provides three high-level • Cost-effective for small-scale applications.
architectural patterns that can be utilised in planning
the organisation’s interim IaaS cloud solution. The Disadvantages
patterns provide details of common architectures
• As the application grows, scalability
for systems, which are deployed in on-premises
can become a challenge.
environments, and can be rehosted to an equivalent
cloud-hosted solution. Each architecture represents • Since all components reside in a single
an approach to structuring a system within the cloud location, security and fault tolerance
environment. is sacrificed or significantly reduced
compared with other architectures.
Single-tier
In a two-tier architecture, the client and server components are separated, typically by a client tier (user
interface) that communicates directly with the data tier (database or file store).
Advantages
• Better performance and scalability than single tier, as the client and server are separated.
Disadvantages
• Greater likelihood of security issues as there is a direct link between the client and database.
Client tier
Data tier
cyber.gov.au 9
N-tier architecture
An n-tier architecture (also known as multi-tier architecture) divides a system into three or more separate tiers.
A common model for this architecture is a system consisting of a presentation layer (client/user interface), an
application layer (business logic), and a data layer (database or file store).
Advantages
• High scalability and flexibility, as each tier can be managed, scaled, and updated independently.
Disadvantages
• More complex to design, deploy and manage due to the separation of components.
Presentation tier
Data tier
Migration of your organisation’s infrastructure to an Each tier is also placed inside its own subnet, meaning
IaaS solution provides a reduction in maintenance its internal IP addresses fall within the same address
of the on-premises data centre, savings on range. That makes it easy to apply network security
hardware costs, and gains real-time business group rules and route tables to individual tiers.
insights. IaaS solutions allow the organisation The web and application tiers are stateless. Any
to scale IT resources up and down with business VM can handle any request for that tier. The data
demands. IaaS also helps the organisation to tier should consist of a replicated database.
quickly provision new applications and increase For Windows, we recommend SQL Server, using
the reliability of the underlying infrastructure. Always On availability groups for high availability.
Azure manages the infrastructure, while organisations For Linux, choose a database that supports
purchase, install, configure and manage their replication, such as Apache Cassandra.
software, including operating systems, middleware Network security groups restrict access to
and applications. Tiers are a way to separate each tier. For example, the database tier only
responsibilities and manage dependencies – each allows access from the application tier.
layer has a specific responsibility. A higher tier can use
services in a lower tier, but not the other way around. For secure administration of the system, it is
recommended to deploy an Azure Bastion service.
Tiers are physically separated, running on separate Bastion provides secure remote desktop protocol
machines. A tier can call another tier directly or (RDP) and secure socket shell (SSH) connectivity
use asynchronous messaging (message queue). to all the VMs in the virtual network in which it is
Although each layer might be hosted in its tier, it is provisioned. Azure Bastion protects your virtual
not required. Several layers might be hosted on the machines from exposing RDP/SSH ports to the outside
same tier. Physically separating the tiers improves world while providing secure access using RDP/SSH.
scalability and resilience but also adds latency
from the additional network communication.
Dev Ops Azure portal Bastian host Web tier Business tier Data tier
Primary SQL
cyber.gov.au 11
Solution design example for AWS multiple times, whether in the same region and
account or multiple regions and accounts.
Amazon Elastic Compute Cloud (Amazon EC2)
provides scalable computing capacity in the AWS Amazon EC2 provides a Query API. These requests
Cloud. Using Amazon EC2 eliminates the need are HTTP or HTTPS requests that use the HTTP
for organisations to invest in hardware upfront verbs GET or POST and a query parameter
to develop and deploy applications faster. named Action. Developers may prefer to build
applications using language-specific APIs instead
Amazon EC2 can be used to launch as many
of submitting a request over HTTP or HTTPS.
or as few virtual servers as required, configure
AWS provides libraries, sample code, tutorials,
security and networking, and manage
and other resources for software developers.
storage. Amazon EC2 enables an organisation
to scale up or down to handle changes in When administering the EC2 platform, AWS strongly
requirements or spikes in the required resources, suggests using SSH access to further secure the
reducing the need to forecast traffic. services and their instances by implementing
a Bastion host, also known as a ‘Jump Box’.
Amazon EC2 provides a web-based user interface, the
Amazon EC2 console. Administrators can access the A bastion host is a special-purpose machine
privileged user interface after signing up for an AWS utilised for privileged access that is configured and
account, signing into the AWS Management Console, hardened to work against attacks. The machine
and selecting EC2 from the console home page. contains a single application, which it hosts.
Bastion hosts are accessed with the help of SSH
Amazon EC2 supports creating resources using AWS
or RDP protocols. After connectivity (remotely) is
CloudFormation. Developers can create a template
established with the bastion host, it allows using
in JSON or YAML that describes the organisation’s
SSH or RDP to log in to other instances (thereby
AWS resources, AWS CloudFormation provisions,
behaving like a ‘jump server’) that are present within
and configures those resources. Organisations
the private network/subnet. The diagram below
can reuse the developed CloudFormation
shows a typical AWS EC2 3-tier IaaS architecture.
templates to provision the same resources
Availability zone A
Dev Ops Bastian host Web subnet 01 Application subnet 01 Database subnet 01
Synchronous
Application Network replication
WAF load balancer load balancer
Availability zone B
cyber.gov.au 13
Contact
For any enquiries concerning this guidance or to ASD’s ACSC via 1300 CYBER1 (1300 292 371), or by using
provide feedback, please navigate to cyber.gov.au/ ReportCyber at cyber.gov.au/report-and-recover/
about-us/about-asd-acsc/contact-us. Select ‘General report.
enquiry or feedback’, and choose ‘Business Continuity
United States organisations may report cyber
in a Box’ from the drop-down menu under ‘Your
incidents to CISA’s 24/7 Operations Center at report@
enquiry/feedback type’.
cisa.dhs.gov, cisa.gov/report, or (888) 282-0870.
If you or your organisation are victim of a data breach When available, please include information regarding
or cyber incident, follow relevant cyber incident the incident: date, time and location of the incident;
response and communication plans, as appropriate. type of activity; number of people affected; type
of equipment used for the activity; the name of
Australian organisations impacted by, or requiring
the submitting company or organisation; and a
assistance relating to, a cyber incident can contact
designated point of contact.
Appendix A: acronyms,
abbreviations and
definitions
This document uses the following acronyms and abbreviations:
IaaS Infrastructure-as-a-Service
IP Internet Protocol
PaaS Platform-as-a-Service
SaaS Software-as-a-Service
VM Virtual Machine
cyber.gov.au 15
Disclaimer
The material in this guide is of a general nature and should not be regarded
as legal advice or relied on for assistance in any particular circumstance or
emergency situation. In any important matter, you should seek appropriate
independent professional advice in relation to your own circumstances.
Copyright.
© Commonwealth of Australia 2023.
With the exception of the Coat of Arms and where otherwise stated, all material
presented in this publication is provided under a Creative Commons Attribution
4.0 International licence (www.creativecommons.org/licenses).
For the avoidance of doubt, this means this licence only applies to material
as set out in this document.
The details of the relevant licence conditions are available on the Creative
Commons website as is the full legal code for the CC BY 4.0 licence
(www.creativecommons.org/licenses).