Securing Australia’s Critical Systems: CyberArk Completes IRAP Assessment at “Protected� Information Classification Level
IRAP provides a framework for assessing the implementation and effectiveness of a system’s security controls against the Australian Government Information Security Manual (ISM), governed by the Australian Signals Directorate (ASD). Completing the assessment is critical for Australian government departments and agencies seeking to adopt platforms and tools from technology service providers. Completion of the IRAP assessment against Protected-level controls provides assurance around the implementation of CyberArk’s security controls for the processing, storage and transmission of information at the Australian federal, state, and local levels.
“Evolving state-sponsored threats demand the highest levels of security for Australia’s public sector organizations and critical infrastructure,� said Peretz Regev, Chief Product & Technology Officer, CyberArk. “As government agencies move to modernize operations and embrace cloud-first strategies, identity security must be a top priority. Completing the IRAP assessment assures that CyberArk’s SaaS offerings meet stringent national standards and are well-equipped to protect Australia’s most sensitive assets from identity-centric attacks.�
The , which includes Endpoint Privilege Manager and Workforce Identity, applies intelligent privilege controls to all identities � human and machine � with continuous threat detection and prevention across the entire identity lifecycle. Find more about how CyberArk complies with global industry standards on its , including information on CyberArk’s FedRAMP High and SOC 2/3 compliance.
About CyberArk
CyberArk (NASDAQ: ) is the global leader in identity security, trusted by organizations around the world to secure human and machine identities in the modern enterprise. CyberArk’s AI-powered Identity Security Platform applies intelligent privilege controls to every identity with continuous threat prevention, detection and response across the identity lifecycle. With CyberArk, organizations can reduce operational and security risks by enabling zero trust and least privilege with complete visibility, empowering all users and identities, including workforce, IT, developers and machines, to securely access any resource, located anywhere, from everywhere. Learn more at .
Copyright © 2025 CyberArk Software. All Rights Reserved. All other brand names, product names, or trademarks belong to their respective holders.
View source version on businesswire.com:
Investor Relations
Kelsey Turcotte
CyberArk
617-558-2132
[email protected]
Media Relations
Rachel
CyberArk
603-531-7229
[email protected]
Source: CyberArk