System Status: Operational/// DISP DEFENCE TECH NETWORK ///DISP COMPLIANCE PLATFORM
[CONTROL REGISTER // UNCLASSIFIED]

DISP
REQUIREMENTS
CHECKLIST

The complete control register for DISP membership across all four security domains. Use this checklist to assess your readiness before submitting to DISO.

52 Controls5 DomainsUpdated Apr 2026Includes Nov 2025 ML2 Uplift
Level Key
ALLRequired at all membership levels including Entry
L1+Required from Level 1 (PROTECTED) and above
L2+Required from Level 2 (SECRET) and above
L3Level 3 (TOP SECRET) only
[HOW TO USE THIS CHECKLIST]

How to Use This Checklist

This checklist maps the control requirements for DISP membership across all four security domains and the application submission process. Each control is tagged with the minimum membership level at which it applies. Use this register to conduct a structured self-assessment of your current security posture before engaging with DISO.

This checklist reflects the DISP requirements as at April 2026, including the November 2025 Essential Eight Maturity Level 2 (ML2) uplift. Entities that held DISP membership under the previous ML1 baseline must review the ICT security domain carefully — the ML2 requirements represent a significant uplift for most organisations.

A gap against any control tagged for your target membership level is a potential rejection point. Prioritise gaps by severity: missing governance documentation and ICT security gaps are the most common rejection reasons. Physical security gaps at Level 2 and above require the longest lead time to remediate.

DOMAIN 01

Governance & Security Management

11 controls
IDControl RequirementLevelStatus
G1Security Officer (SO) appointed — Australian citizen, no conflicting rolesALL
G2Deputy Security Officer (DSO) nominated for continuityL1+
G3Security Management Plan (SMP) developed and approved by senior managementALL
G4SMP aligned to Defence Security Principles Framework (DSPF)ALL
G5Security risk assessment conducted and treatment register maintainedALL
G6Security awareness training programme established and records maintainedALL
G7Incident reporting procedures documented — DSOC contact protocols definedALL
G8Annual security review and self-assessment schedule establishedALL
G9Change management process for SMP updates documentedL1+
G10FOCI (Foreign Ownership, Control, or Influence) declaration preparedALL
G11FOCI mitigation plan developed (if foreign connections exist)L2+
AUTOMATE THIS DOMAIN WITH DISPath

DISPath provides SMP templates, governance frameworks, and DSPF-aligned documentation workflows for all membership levels.

Explore DISPath →
DOMAIN 02

Personnel Security

12 controls
IDControl RequirementLevelStatus
P1Pre-employment screening procedures documented and aligned to AGSVA standardsALL
P2Identity verification process established (100-point check equivalent)ALL
P3Criminal history check procedures documentedALL
P4Employment history verification procedures establishedALL
P5Foreign contact reporting procedure documented and communicated to all personnelL1+
P6Foreign travel reporting procedure documented and communicatedL1+
P7Insider threat awareness programme establishedL1+
P8Security clearance records management system in placeL1+
P9Procedures for handling clearance suspensions and revocations documentedL1+
P10Ongoing suitability assessment procedures for cleared personnelL2+
P11Annual security awareness training for all personnel with classified accessL1+
P12Training completion records maintained and available for DISO reviewALL
AUTOMATE THIS DOMAIN WITH DISPulse

DISPulse tracks personnel security compliance, training records, foreign contact reporting, and clearance status in real time.

Explore DISPulse →
DOMAIN 03

Physical Security

12 controls
IDControl RequirementLevelStatus
PH1Facility security assessment conducted and documentedALL
PH2Security zone classification established (public, restricted, controlled)ALL
PH3Access control system implemented for restricted and controlled areasALL
PH4Visitor management and escort procedures documentedALL
PH5CCTV coverage of controlled areas — specifications documentedL1+
PH6Intruder detection system installed — alarm response procedures documentedL1+
PH7Secure storage for PROTECTED material — GSA-approved container or equivalentL1+
PH8Physical security inspection schedule establishedALL
PH9Key and access card management procedures documentedL1+
PH10SCIF or equivalent secure area constructed to Defence standardsL2+
PH11SCIF construction documentation and Defence approval obtainedL2+
PH12Emanations security (TEMPEST) assessment completedL3
AUTOMATE THIS DOMAIN WITH DISPath

DISPath includes physical security assessment templates and facility security planning workflows aligned to DSPF zone classification requirements.

Explore DISPath →
DOMAIN 04

ICT Security — Essential Eight ML2

15 controls
IDControl RequirementLevelStatus
ICT1Application control implemented — only approved applications can executeALL
ICT2Application patching — internet-facing within 48hrs, others within 2 weeksALL
ICT3Microsoft Office macro settings configured — macros blocked or signed onlyALL
ICT4User application hardening — web browser, PDF reader, office suite hardenedALL
ICT5Administrative privileges restricted — no internet browsing from admin accountsALL
ICT6OS patching — critical vulnerabilities within 48hrs, others within 1 monthALL
ICT7Phishing-resistant MFA on all internet-facing servicesALL
ICT8MFA for all privileged users and all users of cloud servicesALL
ICT9Regular backups — daily backups, tested restoration, offline/immutable copyALL
ICT10Essential Eight ML2 assessment report — current (within 12 months)ALL
ICT11Assessment conducted by qualified assessor (IRAP preferred for L2+)L2+
ICT12Network segmentation implemented — PROTECTED workloads isolatedL1+
ICT13Audit logging enabled and log retention policy documentedL1+
ICT14Incident response plan documented — DSOC notification procedures includedALL
ICT15Vulnerability management programme established and documentedL1+
AUTOMATE THIS DOMAIN WITH DISPeer

DISPeer provides a sovereign, Australian-hosted cloud environment pre-configured to align with DISP ICT security requirements — eliminating the Essential Eight ML2 build burden.

Explore DISPeer →
DOMAIN 05

Application Package — Submission Readiness

10 controls
IDControl RequirementLevelStatus
APP1DISP membership application form completed via Defence Supplier Portal (DSP)ALL
APP2Security Management Plan — current, approved, version-controlledALL
APP3Essential Eight ML2 assessment report attachedALL
APP4Physical security assessment documentation attachedALL
APP5Personnel security screening procedures and training records attachedALL
APP6Security Officer and Deputy Security Officer details confirmedALL
APP7FOCI declaration completed — foreign connections disclosedALL
APP8All evidence current — no artefacts older than 12 monthsALL
APP9Pre-submission review completed against DISO application checklistALL
APP10Security Officer briefed and prepared for DISO assessment interviewALL
AUTOMATE THIS DOMAIN WITH DISPath

DISPath's pre-submission review workflow validates your complete application package against the DISO checklist before you submit — preventing avoidable rejections.

Explore DISPath →
[NEXT STEPS]

From Checklist to Accreditation

Completing this checklist gives you a point-in-time view of your DISP readiness. But a checklist alone does not get you accredited — you need documented evidence for every control, a current Security Management Plan, and a Security Officer who can defend your posture in a DISO assessment interview.

The most effective path from checklist to accreditation is a structured readiness programme that converts your gap register into a prioritised remediation plan with defined milestones, responsible owners, and measurable outcomes. This is what DISPath is built to do.

01

Assess

DISPath

Run a structured gap assessment against this checklist. Identify which controls are implemented, partially implemented, or missing. Generate a prioritised remediation register.

Learn More →
02

Remediate

DISPeer + DISPulse

Implement missing controls. DISPeer handles ICT security. DISPulse tracks compliance posture across all four domains. DISPath guides governance and documentation.

Learn More →
03

Certify

DISPath

Assemble your application package, complete the pre-submission review, and submit through the Defence Supplier Portal with confidence. DISPath guides you through every step.

Learn More →

Get a Professional Gap Assessment

Our team will conduct a structured DISP gap assessment against all 52 controls, identify your critical gaps, and provide a clear remediation roadmap with realistic timelines and costs.

[RELATED RESOURCES]