Australian Defence Force Company Cyber Security Posture

defence.gov.au

The Australian Defence Force is constituted under the Defence Act 1903, and its mission is to defend Australia and its national interests in order to advance Australia's security and prosperity. In fulfilling this mission, Defence serves the Government of the day and is accountable to the Commonwealth Parliament which represents the Australian people, to efficiently and effectively carry out the Government's defence policy. Our purpose: To defend and protect Australia and advance its strategic interest. Underpinning Defenceโ€™s purpose are two outcomes statements through which we focus our portfolio resourcing and delivery for Government. Defend Australia and its national interests through the conduct of operations and provision of support for the Australian community and civilian authorities in accordance with Government direction. Protect and advance Australiaโ€™s strategic interests through the provision of strategic policy, the development, delivery and sustainment of military, intelligence and enabling capabilities, and the promotion of regional and global security and stability as directed by Government.

ADF Company Details

Linkedin ID:

australian-defence-force

Employees number:

0 employees

Number of followers:

4386.0

NAICS:

336

Industry Type:

Defense and Space Manufacturing

Homepage:

defence.gov.au

IP Addresses:

Scan still pending

Company ID:

AUS_1497681

Scan Status:

In-progress

AI scoreADF Risk Score (AI oriented)

Between 900 and 1000

This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

Ailogo

Australian Defence Force Company Scoring based on AI Models

Model NameDateDescriptionCurrent Score DifferenceScore
AVERAGE-Industry03-12-2025

This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers.

N/A

Between 900 and 1000

Australian Defence Force Company Cyber Security News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenUrl IDDetailsView
Australian Defence ForceBreach100503/2020AUS2315221222Link
Rankiteo Explanation :
Attack threatening the organizationโ€™s existence

Description: Australian Defence Force (ADF) had been hacked and was shut down for 10 days A highly sensitive military database containing the personal details of tens of thousands of its members was compromised. Defence Force Recruiting's outsourced electronic records system was taken offline. Details stored on the online system included medical exams, psychological records, and summaries of initial interviews with potential recruits.

Australian Defence Force Company Subsidiaries

SubsidiaryImage

The Australian Defence Force is constituted under the Defence Act 1903, and its mission is to defend Australia and its national interests in order to advance Australia's security and prosperity. In fulfilling this mission, Defence serves the Government of the day and is accountable to the Commonwealth Parliament which represents the Australian people, to efficiently and effectively carry out the Government's defence policy. Our purpose: To defend and protect Australia and advance its strategic interest. Underpinning Defenceโ€™s purpose are two outcomes statements through which we focus our portfolio resourcing and delivery for Government. Defend Australia and its national interests through the conduct of operations and provision of support for the Australian community and civilian authorities in accordance with Government direction. Protect and advance Australiaโ€™s strategic interests through the provision of strategic policy, the development, delivery and sustainment of military, intelligence and enabling capabilities, and the promotion of regional and global security and stability as directed by Government.

Loading...

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=australian-defence-force' -H 'apikey: YOUR_API_KEY_HERE'
newsone

ADF Cyber Security News

2025-07-09T08:18:51.000Z
ADF and Philippine Army collaborate on joint cybersecurity operations in Manila

Collaboration underscores the shared commitment of the Philippine and Australian governments to advancing cybersecurity and cyber cooperation.

2025-05-29T07:00:00.000Z
Defence revamps pay to attract and retain cyber talent

The Australian Defence Force has launched a new pay structure and framework aimed at better competing with the private sector forย ...

2024-08-09T07:00:00.000Z
A new era for the cyber domain

The cyber domain plays a critical role in force generating cyber power and information advantage capabilities.

2025-04-30T07:00:00.000Z
Australian Cyber Collaboration Centre hosts world's largest live cyber defence exercise โ€“ NATO Locked Shields 2025

โ€œHosting Locked Shields 2025 underlines Australia's growing role and recognition in global cybersecurity,โ€ said Matt Salier, CEO at Aus3C. โ€œThisย ...

2024-09-10T07:00:00.000Z
Leidos Australia Partners With Lockheed Martin on ADF's Joint Air Battle Management System

โ€œWe are proud to be partnering with Lockheed Martin Australia to provide this mission-critical capability to Defence,โ€ said Leidos Australia CEOย ...

2024-10-23T07:00:00.000Z
Netskope secures ex-Australian Army head Marcus Thompson as advisor

Thompson is a retired major general who served 34 years in the Australian Army in a variety of command, regimental and special operationsย ...

2025-03-19T07:00:00.000Z
Japan and Australia can fill each otherโ€™s defence gaps

Functionally, Australia and Japan have distinct strengths, as well as vulnerabilities that the other can help mitigate. Japan faces challengesย ...

2025-05-28T07:00:00.000Z
ADF investing in cyber warfare workforce

X Activity ... Australian Defence In a Global Context. In its 50th year APDR is the longest established defence publication in Australia. ... Boeingย ...

2024-09-11T07:00:00.000Z
Defence slammed over cyber failures, lack of munitions

Two reports have highlighted major cybersecurity gaps and procurement problems for Australia's military.

similarCompanies

ADF Similar Companies

As a leading defence and security company, we offer solutions that range from the depths of the oceans to high in the sky, on land and in cyberspace, to keep people and society safe. Empowered by our 22,000 talented people, we constantly push the boundaries of technology to create a safer, more sus

Republic of Korea Air Force

The Republic of Korea Air Force (ROKAF; Korean: ๋Œ€ํ•œ๋ฏผ๊ตญ ๊ณต๊ตฐ; Hanja: ๅคง้Ÿ“ๆฐ‘ๅœ‹ ็ฉบ่ป; Revised Romanization: Daehanminguk Gong-gun), also known as the ROK Air Force, is the aerial warfare service branch of South Korea, operating under the South Korean Ministry of National Defense. The ROKAF has about 450 combat

Amentum

Amentum is a global leader in advanced engineering and innovative technology solutions, trusted by the United States and its allies to address their most significant and complex challenges in science, security and sustainability. Our people apply undaunted curiosity, relentless ambition and boundles

General Dynamics

From Gulfstream business jets and combat vehicles to nuclear-powered submarines and communications systems, people around the world depend on our products and services for their safety and security. General Dynamics is headquartered in Reston, Virginia, and employs over 100,000 people in 43 countri

Aselsan

ASELSAN is a company of Turkish Armed Forces Foundation, established in 1975 in order to meet the communication needs of the Turkish Armed Forces by national means. Currently โ€‹74,20% of the shares are owned by the Foundation whereas the remaining 25,8% runs in ฤฐstanbul Borsa stock market. ASELSAN is

Rheinmetall

As an integrated technology group, the listed company Rheinmetall AG, headquartered in Dรผsseldorf, stands for a company that is as strong in substance as it is successful internationally, and that is active in various markets with an innovative range of products and services. Rheinmetall is a leadin

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

ADF CyberSecurity History Information

How many cyber incidents has ADF faced?

Total Incidents: According to Rankiteo, ADF has faced 1 incident in the past.

What types of cybersecurity incidents have occurred at ADF?

Incident Types: The types of cybersecurity incidents that have occurred incident Breach.

Incident Details

Can you provide details on each incident?

Incident : Data Breach

Title: Australian Defence Force Data Breach

Description: The Australian Defence Force (ADF) experienced a data breach that resulted in the compromise of a highly sensitive military database containing personal details of tens of thousands of its members. The breach led to the shutdown of the Defence Force Recruiting's outsourced electronic records system for 10 days.

Type: Data Breach

What are the most common types of attacks the company has faced?

Common Attack Types: The most common types of attacks the company has faced is Breach.

Impact of the Incidents

What was the impact of each incident?

Incident : Data Breach AUS2315221222

Data Compromised: medical exams, psychological records, summaries of initial interviews with potential recruits

Systems Affected: Defence Force Recruiting's outsourced electronic records system

Downtime: 10

Operational Impact: Shutdown of the electronic records system

What types of data are most commonly compromised in incidents?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are medical exams, psychological records and summaries of initial interviews.

Which entities were affected by each incident?

Incident : Data Breach AUS2315221222

Entity Type: Military

Industry: Defense

Location: Australia

Customers Affected: tens of thousands

Data Breach Information

What type of data was compromised in each breach?

Incident : Data Breach AUS2315221222

Type of Data Compromised: medical exams, psychological records, summaries of initial interviews

Number of Records Exposed: tens of thousands

Sensitivity of Data: highly sensitive

Personally Identifiable Information: True

Additional Questions

Impact of the Incidents

What was the most significant data compromised in an incident?

Most Significant Data Compromised: The most significant data compromised in an incident were medical exams, psychological records and summaries of initial interviews with potential recruits.

What was the most significant system affected in an incident?

Most Significant System Affected: The most significant system affected in an incident was Defence Force Recruiting's outsourced electronic records system.

Data Breach Information

What was the most sensitive data compromised in a breach?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were medical exams, psychological records and summaries of initial interviews with potential recruits.

What was the number of records exposed in the most significant breach?

Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 0.

What Do We Measure?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge