
Australian Defence Force Company Cyber Security Posture
defence.gov.auThe Australian Defence Force is constituted under the Defence Act 1903, and its mission is to defend Australia and its national interests in order to advance Australia's security and prosperity. In fulfilling this mission, Defence serves the Government of the day and is accountable to the Commonwealth Parliament which represents the Australian people, to efficiently and effectively carry out the Government's defence policy. Our purpose: To defend and protect Australia and advance its strategic interest. Underpinning Defenceโs purpose are two outcomes statements through which we focus our portfolio resourcing and delivery for Government. Defend Australia and its national interests through the conduct of operations and provision of support for the Australian community and civilian authorities in accordance with Government direction. Protect and advance Australiaโs strategic interests through the provision of strategic policy, the development, delivery and sustainment of military, intelligence and enabling capabilities, and the promotion of regional and global security and stability as directed by Government.
ADF Company Details
australian-defence-force
0 employees
4386.0
336
Defense and Space Manufacturing
defence.gov.au
Scan still pending
AUS_1497681
In-progress

Between 900 and 1000
This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

.png)

Australian Defence Force Company Scoring based on AI Models
Model Name | Date | Description | Current Score Difference | Score |
---|---|---|---|---|
AVERAGE-Industry | 03-12-2025 | This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers. | N/A | Between 900 and 1000 |
Australian Defence Force Company Cyber Security News & History
Entity | Type | Severity | Impact | Seen | Url ID | Details | View |
---|---|---|---|---|---|---|---|
Australian Defence Force | Breach | 100 | 5 | 03/2020 | AUS2315221222 | Link | |
Rankiteo Explanation : Attack threatening the organizationโs existenceDescription: Australian Defence Force (ADF) had been hacked and was shut down for 10 days A highly sensitive military database containing the personal details of tens of thousands of its members was compromised. Defence Force Recruiting's outsourced electronic records system was taken offline. Details stored on the online system included medical exams, psychological records, and summaries of initial interviews with potential recruits. |
Australian Defence Force Company Subsidiaries

The Australian Defence Force is constituted under the Defence Act 1903, and its mission is to defend Australia and its national interests in order to advance Australia's security and prosperity. In fulfilling this mission, Defence serves the Government of the day and is accountable to the Commonwealth Parliament which represents the Australian people, to efficiently and effectively carry out the Government's defence policy. Our purpose: To defend and protect Australia and advance its strategic interest. Underpinning Defenceโs purpose are two outcomes statements through which we focus our portfolio resourcing and delivery for Government. Defend Australia and its national interests through the conduct of operations and provision of support for the Australian community and civilian authorities in accordance with Government direction. Protect and advance Australiaโs strategic interests through the provision of strategic policy, the development, delivery and sustainment of military, intelligence and enabling capabilities, and the promotion of regional and global security and stability as directed by Government.
Access Data Using Our API

Get company history
.png)
ADF Cyber Security News
ADF and Philippine Army collaborate on joint cybersecurity operations in Manila
Collaboration underscores the shared commitment of the Philippine and Australian governments to advancing cybersecurity and cyber cooperation.
Defence revamps pay to attract and retain cyber talent
The Australian Defence Force has launched a new pay structure and framework aimed at better competing with the private sector forย ...
A new era for the cyber domain
The cyber domain plays a critical role in force generating cyber power and information advantage capabilities.
Australian Cyber Collaboration Centre hosts world's largest live cyber defence exercise โ NATO Locked Shields 2025
โHosting Locked Shields 2025 underlines Australia's growing role and recognition in global cybersecurity,โ said Matt Salier, CEO at Aus3C. โThisย ...
Leidos Australia Partners With Lockheed Martin on ADF's Joint Air Battle Management System
โWe are proud to be partnering with Lockheed Martin Australia to provide this mission-critical capability to Defence,โ said Leidos Australia CEOย ...
Netskope secures ex-Australian Army head Marcus Thompson as advisor
Thompson is a retired major general who served 34 years in the Australian Army in a variety of command, regimental and special operationsย ...
Japan and Australia can fill each otherโs defence gaps
Functionally, Australia and Japan have distinct strengths, as well as vulnerabilities that the other can help mitigate. Japan faces challengesย ...
ADF investing in cyber warfare workforce
X Activity ... Australian Defence In a Global Context. In its 50th year APDR is the longest established defence publication in Australia. ... Boeingย ...
Defence slammed over cyber failures, lack of munitions
Two reports have highlighted major cybersecurity gaps and procurement problems for Australia's military.

ADF Similar Companies

Saab
As a leading defence and security company, we offer solutions that range from the depths of the oceans to high in the sky, on land and in cyberspace, to keep people and society safe. Empowered by our 22,000 talented people, we constantly push the boundaries of technology to create a safer, more sus

Republic of Korea Air Force
The Republic of Korea Air Force (ROKAF; Korean: ๋ํ๋ฏผ๊ตญ ๊ณต๊ตฐ; Hanja: ๅคง้ๆฐๅ ็ฉบ่ป; Revised Romanization: Daehanminguk Gong-gun), also known as the ROK Air Force, is the aerial warfare service branch of South Korea, operating under the South Korean Ministry of National Defense. The ROKAF has about 450 combat

Amentum
Amentum is a global leader in advanced engineering and innovative technology solutions, trusted by the United States and its allies to address their most significant and complex challenges in science, security and sustainability. Our people apply undaunted curiosity, relentless ambition and boundles

General Dynamics
From Gulfstream business jets and combat vehicles to nuclear-powered submarines and communications systems, people around the world depend on our products and services for their safety and security. General Dynamics is headquartered in Reston, Virginia, and employs over 100,000 people in 43 countri

Aselsan
ASELSAN is a company of Turkish Armed Forces Foundation, established in 1975 in order to meet the communication needs of the Turkish Armed Forces by national means. Currently โ74,20% of the shares are owned by the Foundation whereas the remaining 25,8% runs in ฤฐstanbul Borsa stock market. ASELSAN is

Rheinmetall
As an integrated technology group, the listed company Rheinmetall AG, headquartered in Dรผsseldorf, stands for a company that is as strong in substance as it is successful internationally, and that is active in various markets with an innovative range of products and services. Rheinmetall is a leadin

Frequently Asked Questions
Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
ADF CyberSecurity History Information
How many cyber incidents has ADF faced?
Total Incidents: According to Rankiteo, ADF has faced 1 incident in the past.
What types of cybersecurity incidents have occurred at ADF?
Incident Types: The types of cybersecurity incidents that have occurred incident Breach.
Incident Details
Can you provide details on each incident?

Incident : Data Breach
Title: Australian Defence Force Data Breach
Description: The Australian Defence Force (ADF) experienced a data breach that resulted in the compromise of a highly sensitive military database containing personal details of tens of thousands of its members. The breach led to the shutdown of the Defence Force Recruiting's outsourced electronic records system for 10 days.
Type: Data Breach
What are the most common types of attacks the company has faced?
Common Attack Types: The most common types of attacks the company has faced is Breach.
Impact of the Incidents
What was the impact of each incident?

Incident : Data Breach AUS2315221222
Data Compromised: medical exams, psychological records, summaries of initial interviews with potential recruits
Systems Affected: Defence Force Recruiting's outsourced electronic records system
Downtime: 10
Operational Impact: Shutdown of the electronic records system
What types of data are most commonly compromised in incidents?
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are medical exams, psychological records and summaries of initial interviews.
Which entities were affected by each incident?

Incident : Data Breach AUS2315221222
Entity Type: Military
Industry: Defense
Location: Australia
Customers Affected: tens of thousands
Data Breach Information
What type of data was compromised in each breach?

Incident : Data Breach AUS2315221222
Type of Data Compromised: medical exams, psychological records, summaries of initial interviews
Number of Records Exposed: tens of thousands
Sensitivity of Data: highly sensitive
Personally Identifiable Information: True
Additional Questions
Impact of the Incidents
What was the most significant data compromised in an incident?
Most Significant Data Compromised: The most significant data compromised in an incident were medical exams, psychological records and summaries of initial interviews with potential recruits.
What was the most significant system affected in an incident?
Most Significant System Affected: The most significant system affected in an incident was Defence Force Recruiting's outsourced electronic records system.
Data Breach Information
What was the most sensitive data compromised in a breach?
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were medical exams, psychological records and summaries of initial interviews with potential recruits.
What was the number of records exposed in the most significant breach?
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 0.
What Do We Measure?
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
These are some of the factors we use to calculate the overall score:
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.
