Australia’s Security of Critical Infrastructure Act 2018, commonly known as the SOCI Act, establishes mandatory cybersecurity, risk management, and reporting obligations for organizations operating critical infrastructure. Since its introduction, the Act has expanded significantly, reshaping how regulated entities approach cyber risk, governance, and operational resilience.

For CISOs, compliance leaders, and security teams, SOCI is more than just a legal requirement. It is a framework that demands continuous visibility into risk across IT, OT, and increasingly complex digital environments. In practice, that includes application-layer risk – the security of the web applications and APIs that now underpin essential service delivery and access to business-critical data.
The Security of Critical Infrastructure Act 2018 is Australia’s primary legislative framework for managing risks to essential services and systems. It was introduced to protect critical infrastructure from cyber threats, foreign interference, physical disruption, and other national security risks.
Originally focused on electricity, gas, water, and maritime ports, the Act has since expanded through several amendments (notably in 2021, 2022, and 2024) to cover 22 asset classes across multiple sectors. These reforms introduced mandatory cyber incident reporting, Critical Infrastructure Risk Management Programs, enhanced cybersecurity obligations for certain high-impact assets, and broader government assistance powers.
The rationale is straightforward. Disruption in one critical sector such as energy or communications can cascade across healthcare, finance, transport, and public safety. As digital systems underpin more essential services, cybersecurity has become a core resilience requirement rather than a technical afterthought.
The SOCI Act applies to “responsible entities” for designated critical infrastructure assets. A responsible entity is typically the organization that owns or operates the asset. Covered sectors currently include:
The Act also recognizes “direct interest holders” and, in some circumstances, third-party operators with operational control over critical assets. This means compliance obligations may extend beyond asset owners to include managed service providers and infrastructure partners.
For security and compliance teams, determining whether an asset qualifies – and who holds responsibility – is a foundational step in SOCI readiness.
A “critical infrastructure asset” under SOCI is defined by sector-specific rules and thresholds. These assets typically support the delivery of essential services or the functioning of key supply chains.
The 2024 amendments clarified that data storage and processing systems holding business-critical data may be deemed part of a primary critical infrastructure asset. This legislative expansion followed major breach events and reflects the reality that digital platforms, customer data systems, and application environments are integral to essential service delivery.
For many regulated entities, those data environments are reached through application and API pathways, making application security a practical part of protecting the asset.
Accurate asset classification is essential because it determines:
For many organizations, asset visibility is the first operational challenge. Distributed applications, APIs, cloud workloads, and hybrid infrastructure can expand the attack surface beyond what traditional inventories capture.
At a high level, SOCI compliance includes four primary obligation areas:
Importantly, these are all ongoing obligations, so compliance is not achieved through a one-time assessment but through continuous risk governance and operational oversight.
The Critical Infrastructure Risk Management Program (CIRMP) is the centerpiece of SOCI compliance for many entities. CIRMP requirements apply to 13 prescribed asset classes under the SOCI framework, while certain sectors such as telecommunications operate under separate risk management programs.
A CIRMP is a documented, board-approved framework that identifies and manages material risks to critical infrastructure assets. It must be regularly reviewed and updated to reflect changes in threat landscape, asset configuration, and business operations. CIRMP rules require responsible entities to address at least four hazard categories, namely cyber and information security risks, personnel risks, supply chain risks, and physical security risks (discussed in detail below).
From August 2024, entities subject to CIRMP must align their cyber risk management approach with one of five recognized frameworks: the Essential Eight, NIST Cybersecurity Framework, C2M2, ISO 27001, or the Australian Energy Sector Cyber Security Framework.
Responsible entities must review their CIRMP at least every 12 months and after any material change to the asset or risk environment. An annual report on the effectiveness of the CIRMP must be provided to the board and submitted within 90 days of the end of the entity’s financial year.
CIRMP is not intended to be a static compliance document. It formalizes a continuous risk management approach that aligns cybersecurity, operational resilience, and executive oversight.
CIRMP rules require responsible entities to address at least four hazard categories:
From a cybersecurity perspective, CIRMP expectations align with the need for continuous vulnerability identification, timely remediation of exploitable weaknesses, assurance that exposed applications and APIs are monitored and assessed, and executive reporting on risk posture.
In practice, this means organizations need clear visibility into the vulnerabilities that are actually reachable and exploitable in their running environments, not just theoretical weaknesses in source code.
The SOCI Act imposes strict cyber incident reporting requirements to the Australian Cyber Security Centre (ACSC). There are two primary categories:
A “critical” cyber incident generally involves significant impact on asset availability, integrity, or confidentiality. Organizations must also provide ongoing updates if requested.
Effective incident reporting depends on timely detection. Without visibility into live systems and exposed applications, identifying qualifying incidents within the required timeframe can be difficult.
Non-compliance with SOCI obligations can result in significant civil penalties, including fines of up to $330,000 AUD per day for certain CIRMP breaches, as well as regulatory directions and potential government intervention in serious cases.
Regulators may also issue directions to review or remediate deficiencies in a CIRMP. Given the potential operational and reputational consequences, compliance should be treated as a core governance issue rather than a technical checklist.
For critical infrastructure operators, maintaining compliance is directly tied to the ability to continue operating without regulatory disruption.
SOCI does not mandate specific security tools. However, its requirements strongly reinforce certain operational capabilities.
To support CIRMP and incident reporting obligations, organizations should be able to:
For SOCI purposes, it’s not enough to know a vulnerability exists somewhere in the estate. Teams also need to know whether it is reachable in production, whether it is exploitable, and which assets it affects, so that remediation decisions and risk acceptance are defensible in CIRMP governance and annual reporting.
Modern critical infrastructure environments rely heavily on web applications and APIs to deliver services. These components often form a substantial part of the attack surface. Runtime visibility into these systems, including the ability to validate whether vulnerabilities are actually exploitable, helps security teams focus remediation on material risks.
This is where Invicti fits in: as a unified application security platform that correlates findings across testing signals and uses a DAST-first, proof-based verification layer to help teams focus on issues that are demonstrably exploitable in running applications and APIs. By testing running applications and correlating findings across multiple testing methods, organizations gain a much clearer insight into which weaknesses represent genuine exposure.
In addition, automation and centralized visibility across application assets can greatly simplify documentation, reporting, and executive oversight, particularly in large or distributed environments.
SOCI shares common themes with many recognized international security frameworks, including:
What distinguishes SOCI is its sector-specific focus on critical infrastructure and its formalized CIRMP requirement covering multiple hazard categories beyond cyber alone.
Organizations operating globally may find that a unified, risk-based security governance model supported by continuous technical validation helps align SOCI obligations with other regulatory frameworks.
The SOCI Act establishes a clear expectation: critical infrastructure operators must understand, manage, and report on risks to essential systems in a continuous and structured way. Because essential services increasingly run through internet-facing software, SOCI cyber risk management often comes down to how well you govern and reduce application and API exposure over time.
CIRMP formalizes this expectation, requiring governance, hazard identification, annual review, and board-level oversight across cyber, personnel, supply chain, and physical domains. For cybersecurity teams, this translates into a practical need for real-time insight into exposed applications, APIs, and supporting infrastructure.
A comprehensive application security platform can help transform compliance from a documentation exercise into an operational capability. By combining continuous testing, centralized visibility, and risk-based prioritization, organizations can strengthen both their regulatory posture and their real-world resilience.
To see how unified application security testing and risk management can support SOCI readiness in complex environments, request a demo to explore how the Invicti platform brings runtime validation and centralized AppSec visibility together in practice.
SOCI stands for the Security of Critical Infrastructure Act 2018 and it is Australia’s legislative framework for protecting essential infrastructure from security threats.
Responsible entities for designated critical infrastructure assets, including operators in sectors such as energy, communications, finance, healthcare, higher education, defence, and space technology, must comply with relevant obligations.
A Critical Infrastructure Risk Management Program (CIRMP) is a documented framework for identifying and managing risks to critical infrastructure assets within an organization. It is mandatory for 13 prescribed asset classes under SOCI rules.
Critical cyber incidents must be reported within 12 hours. Other cyber incidents must be reported within 72 hours.
In certain cases, yes. Data storage and processing systems that support critical infrastructure, particularly those holding business-critical data, may fall within scope, and third-party operators may have compliance obligations depending on their role.
Organizations may face substantial civil penalties, regulatory directions, and potential government intervention in severe cases.
Continuous vulnerability scanning, particularly when combined with validation of exploitability in running systems, helps organizations identify material risks, prioritize remediation, and demonstrate active risk management under CIRMP.