What is the Notifiable Data Breaches scheme?
Australia's Notifiable Data Breaches scheme (introduced 2018, expanded by Privacy Act amendments through 2026) requires entities covered by the Privacy Act to notify the OAIC and affected individuals when an eligible data breach occurs. An eligible breach is one where there is unauthorised access, disclosure or loss of personal information that is likely to result in serious harm. Assessment must occur within 30 days of becoming aware. Notification must occur as soon as practicable after assessment.
What's the 30-day clock?
Privacy Act s 26WH gives entities 30 days from awareness of a suspected eligible breach to assess whether it is in fact a notifiable breach. The clock runs against the entity even if the investigation is hard. Most AU mid-market organisations cannot meet this — discovery often happens via the affected individual, scoping requires audit logs that have aged out, and the notification flow has never been rehearsed. The first time an organisation tries to do this for real is typically the breach itself.
What's the difference between this tool and a board-level cyber risk briefing?
The Board Risk Briefing tool covers the strategic position across Copilot governance, Essential Eight, Privacy Act 2026 and AI vendor risk — it's pitched at directors. The NDB Readiness Check is the operational layer underneath: can your IT and security operations actually detect, scope, notify, remediate and learn within the regulatory window. A board can be aware of the risk and still be exposed if the operational readiness isn't there. Most organisations need both views.
What licensing do I need to be NDB-ready in Microsoft 365?
The minimum useful baseline is Business Premium for SMB or M365 E3 + Defender add-ons for enterprise — gives you Defender XDR, basic Purview Audit, Sentinel-ready logs. To meet the scoping clock comfortably you need Purview Audit Premium (1-year retention) and eDiscovery Premium for content reconstruction, both of which sit in E5 / E5 Compliance. For 24/7 detection you need either an in-house SOC, an MSSP, or a managed detection service. Frontrow's standard recommendation is E5 Compliance plus a managed detection partner for organisations handling significant personal information.
What are the most common NDB scheme failure points?
OAIC's quarterly reports show consistent patterns: (1) discovery through the affected individual rather than internal detection — often months after the breach; (2) scoping unable to determine which individuals were affected because audit logs aged out; (3) notification delayed because templates and OAIC submission flow weren't pre-built; (4) remediation actions overwriting evidence needed for investigation; (5) recurrence because post-incident reviews didn't update controls. The five domains in this tool map directly to these failure points.
Does Microsoft 365 give me the breach assessment evidence OAIC asks for?
Yes, if configured correctly. OAIC notifications require describing the kind of breach, the kinds of information involved, and the steps taken. Microsoft Purview Audit (with 1-year retention) gives you the access log evidence. eDiscovery Premium reconstructs the content involved. Defender XDR shows the attack pattern. Defender for Cloud Apps gives the cross-app file activity timeline. Without these, you are explaining the breach to OAIC with no evidence — which is itself a finding.
How is this self-assessment validated?
Every scoring threshold cites a primary source: Privacy Act 1988 (as amended through 2026 reforms); OAIC NDB scheme guidance and quarterly NDB reports; Microsoft Learn for the underlying technical controls (Purview Audit, eDiscovery, Defender XDR, Sentinel). Methodology authored by Daniel Brown (5x Microsoft MVP), Graeme Lodge (Managing Director), and Sam Williams (Investor & Executive Consultant).
What does Frontrow's Managed Identity & Information Protection service include?
Quarterly NDB readiness review with an annual tabletop exercise based on the latest OAIC-published breach pattern. Audit log retention configured and rehearsed. eDiscovery investigation playbooks. Notification templates kept current. Containment runbooks for the common patterns. Post-incident control updates tracked through to closure. Monthly delta report for the IT lead, quarterly board-grade summary.