{"id":45181,"date":"2022-02-07T06:13:16","date_gmt":"2022-02-07T06:13:16","guid":{"rendered":"http:\/\/4d7267e1-5c6c-4c61-8c9d-fb52f240b641"},"modified":"2022-02-07T06:13:16","modified_gmt":"2022-02-07T06:13:16","slug":"pjcis-concerned-tssrs-do-your-best-requirements-are-not-enough-anymore","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/pjcis-concerned-tssrs-do-your-best-requirements-are-not-enough-anymore\/","title":{"rendered":"PJCIS concerned TSSR&#8217;s &#8216;do your best&#8217; requirements are not enough anymore"},"content":{"rendered":"<figure class=\"image image-original shortcode-image\"><span class=\"img aspect-set \"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/a0d9eed99c35a62db942010794ff721edff043cc\/2021\/05\/21\/55b074f7-c43e-4c98-becf-e69458121603\/telco-server-rack-gettyimages.jpg?width=1200&amp;fit=bounds&amp;auto=webp\" class alt=\"telco-server-rack-gettyimages.jpg\" height=\"auto\" width=\"1200\"><\/span><figcaption><span class=\"caption\"><\/span><span class=\"credit\"> Image: Getty Images <\/span><\/figcaption><\/figure>\n<p>The Parliamentary Joint Committee on Intelligence and Security (PJCIS) is looking to formalise the relationship between government and the nation&#8217;s telco providers as it says reliance on the current voluntary processes is insufficient. <\/p>\n<p>As it currently stands, under the <a href=\"https:\/\/www.zdnet.com\/article\/telco-national-security-bill-passes-parliament\/\">Telecommunications Sector Security Reforms<\/a> (TSSR), carriers need to &#8220;do their best&#8221; to protect their networks from unauthorised access or interference for the purpose of security, with carriers to notify the government of any changes to their services, systems, or equipment that could have a &#8220;material adverse effect&#8221; on their ability to comply with this duty. <\/p>\n<p>Although the committee said in its <a href=\"https:\/\/www.aph.gov.au\/Parliamentary_Business\/Committees\/Joint\/Intelligence_and_Security\/Part14Telecommunication\/Report\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">report<\/a> that the highly regulated telcos are in a better position to handle security obligations from the <a href=\"https:\/\/www.zdnet.com\/article\/home-affairs-releases-second-critical-infrastructure-bill-with-leftover-obligations\/\">critical infrastructure framework<\/a>, formalisation was needed.<\/p>\n<p>&#8220;The regulatory concept of providers &#8216;doing their best&#8217; to secure their networks in the national interest has served the Telco Act and the TSSR up until now, but the committee can not be assured that a reliance on industry alone to counter threats is sustainable, nor that the Telco Act as a whole can continue to uphold the security requirements for the industry,&#8221; the report said. <\/p>\n<p>The main result of the TSSR thus far has been the <a href=\"https:\/\/www.zdnet.com\/article\/australian-government-bans-chinese-vendors-for-5g\/\">banning of Huawei from 5G deployments<\/a> in Australia, which the committee said showed the government was able to step in when needed but only occurred when a threat was &#8220;overwhelmingly evident&#8221;. <\/p>\n<p>&#8220;In considering the evidence provided, the committee formed the view that, in many instances, the onus was on industry to carry the burden of information sharing and communication with government &#8212; in part due to the TSSR regime&#8217;s inherent reliance on voluntary engagement. While there are certainly circumstances of these arrangements being adequate, it is the committee&#8217;s view that it is insufficient to rely on voluntary practices, and dialogue, notifications, threat and information sharing between industry and government should be formalised,&#8221; it said. <\/p>\n<p>To boost these efforts, the PJCIS has recommended the Department of Infrastructure, Transport, Regional Development and Communications work with the Cyber and Infrastructure Security Centre within Home Affairs to determine &#8220;industry best practice risk identification, management, and mitigation&#8221;. <\/p>\n<section class=\"sharethrough-top placeholder\"> <\/section>\n<p>In an attempt to prevent telcos from having different interpretations of when notifications are needed &#8212; as demonstrated by <a href=\"https:\/\/www.zdnet.com\/article\/optus-wants-clarification-in-tssr-regime-after-having-significant-effect-on-it\/\">Optus making up over half of all notifications<\/a> &#8212; the committee wants a telecommunications security working group created that consists of representatives from the Communications department, Home Affairs, the telcos, Australian Security Intelligence Organisation, and&nbsp; Australian Signals Directorate. <\/p>\n<p>&#8220;This working group could set agreed standards and best practice principles to inform the work of the Cyber and Infrastructure Security Centre&#8217;s advice and resources,&#8221; the committee said. <\/p>\n<p>&#8220;The Committee recommends that the working group &#8230; be tasked with scoping agreed carrier licence conditions, service provider rules, and codes and standards for security of networks and systems. <\/p>\n<p>&#8220;These can then be used to guide the resources to be produced by that group and inform directions or information gathering powers exercisable by the Minister for Home Affairs under the existing provisions of Part 14 of the <em>Telecommunications Act 1997<\/em>.&#8221; <\/p>\n<p>The working group would also be consulted on any <a href=\"https:\/\/www.zdnet.com\/article\/australian-telco-sector-looking-down-the-barrel-of-a-prescribed-security-standard\/\">duplicate obligations<\/a> that arise from the interaction of TSSR and the amended <em>Security of Critical Infrastructure Act 2018<\/em> (SOCI Act) prior to any activation of obligations. <\/p>\n<p>&#8220;If agreed, and once activated, the duplicated obligations or other mechanisms in Part 14 of the <em>Telecommunications Act 1997<\/em> should be repealed, or deactivated by relevant mechanisms, so as to avoid regulatory duplication on telecommunications entities,&#8221; the report said. <\/p>\n<p>In its report, the committee said, as it conducted its review, it became clear its review had &#8220;significant crossovers&#8221; with the critical infrastructure review that was simultaneously taking place. <\/p>\n<p>&#8220;Calls for repeal of the TSSR or deactivation of duplicated obligations are reasonable from those affected, but the committee does not want to recommend repeal of any mechanisms that are in place and working to secure telecommunications in Australia. The importance of the sector to the nation is too strong to act in such a way without full consideration,&#8221; it said. <\/p>\n<p>&#8220;The committee trusts the assertions from government that any potential SOCI obligations will only be &#8216;switched on&#8217; if the existing TSSR obligations are assessed as being unsuitable. However, the committee believes that this decision should be made in consultation with the potentially affected entities and is recommending that that occur through the working group.&#8221; <\/p>\n<p>Additionally, the committee recommended the Telco Act be amended to state that security is an object of the Act, and a &#8220;dedicated telecommunications security threat sharing forum&#8221; be created to allow ASIO and ASD to brief the telcos on threats to &#8220;the maximum classified level possible&#8221;. <\/p>\n<p>Although Huawei filed a submission to the review claiming Australia was isolating itself from &#8220;world&#8217;s best technology and innovation&#8221;, the Chinese tech giant declined an invitation to appear before&nbsp;the committee. <\/p>\n<h3>Related Coverage<\/h3>\n<p> READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/pjcis-concerned-tssrs-do-your-best-requirements-are-not-enough-anymore\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Committee recommends an Australian telecommunications security working group be established as it says the Telco Act is not enough to secure the nation.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-45181","post","type-post","status-publish","format-standard","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>PJCIS concerned TSSR&#039;s &#039;do your best&#039; requirements are not enough anymore 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/pjcis-concerned-tssrs-do-your-best-requirements-are-not-enough-anymore\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"PJCIS concerned TSSR&#039;s &#039;do your best&#039; requirements are not enough anymore 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/pjcis-concerned-tssrs-do-your-best-requirements-are-not-enough-anymore\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-07T06:13:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/a\/img\/resize\/a0d9eed99c35a62db942010794ff721edff043cc\/2021\/05\/21\/55b074f7-c43e-4c98-becf-e69458121603\/telco-server-rack-gettyimages.jpg?width=1200&amp;fit=bounds&amp;auto=webp\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/pjcis-concerned-tssrs-do-your-best-requirements-are-not-enough-anymore\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/pjcis-concerned-tssrs-do-your-best-requirements-are-not-enough-anymore\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"PJCIS concerned TSSR&#8217;s &#8216;do your best&#8217; requirements are not enough anymore\",\"datePublished\":\"2022-02-07T06:13:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/pjcis-concerned-tssrs-do-your-best-requirements-are-not-enough-anymore\\\/\"},\"wordCount\":823,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/pjcis-concerned-tssrs-do-your-best-requirements-are-not-enough-anymore\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/a0d9eed99c35a62db942010794ff721edff043cc\\\/2021\\\/05\\\/21\\\/55b074f7-c43e-4c98-becf-e69458121603\\\/telco-server-rack-gettyimages.jpg?width=1200&amp;fit=bounds&amp;auto=webp\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/pjcis-concerned-tssrs-do-your-best-requirements-are-not-enough-anymore\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/pjcis-concerned-tssrs-do-your-best-requirements-are-not-enough-anymore\\\/\",\"name\":\"PJCIS concerned TSSR's 'do your best' requirements are not enough anymore 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/pjcis-concerned-tssrs-do-your-best-requirements-are-not-enough-anymore\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/pjcis-concerned-tssrs-do-your-best-requirements-are-not-enough-anymore\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/a0d9eed99c35a62db942010794ff721edff043cc\\\/2021\\\/05\\\/21\\\/55b074f7-c43e-4c98-becf-e69458121603\\\/telco-server-rack-gettyimages.jpg?width=1200&amp;fit=bounds&amp;auto=webp\",\"datePublished\":\"2022-02-07T06:13:16+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/pjcis-concerned-tssrs-do-your-best-requirements-are-not-enough-anymore\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/pjcis-concerned-tssrs-do-your-best-requirements-are-not-enough-anymore\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/pjcis-concerned-tssrs-do-your-best-requirements-are-not-enough-anymore\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/a0d9eed99c35a62db942010794ff721edff043cc\\\/2021\\\/05\\\/21\\\/55b074f7-c43e-4c98-becf-e69458121603\\\/telco-server-rack-gettyimages.jpg?width=1200&amp;fit=bounds&amp;auto=webp\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/a0d9eed99c35a62db942010794ff721edff043cc\\\/2021\\\/05\\\/21\\\/55b074f7-c43e-4c98-becf-e69458121603\\\/telco-server-rack-gettyimages.jpg?width=1200&amp;fit=bounds&amp;auto=webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/pjcis-concerned-tssrs-do-your-best-requirements-are-not-enough-anymore\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"PJCIS concerned TSSR&#8217;s &#8216;do your best&#8217; requirements are not enough anymore\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"PJCIS concerned TSSR's 'do your best' requirements are not enough anymore 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/pjcis-concerned-tssrs-do-your-best-requirements-are-not-enough-anymore\/","og_locale":"en_US","og_type":"article","og_title":"PJCIS concerned TSSR's 'do your best' requirements are not enough anymore 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/pjcis-concerned-tssrs-do-your-best-requirements-are-not-enough-anymore\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-02-07T06:13:16+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/a\/img\/resize\/a0d9eed99c35a62db942010794ff721edff043cc\/2021\/05\/21\/55b074f7-c43e-4c98-becf-e69458121603\/telco-server-rack-gettyimages.jpg?width=1200&amp;fit=bounds&amp;auto=webp","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/pjcis-concerned-tssrs-do-your-best-requirements-are-not-enough-anymore\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/pjcis-concerned-tssrs-do-your-best-requirements-are-not-enough-anymore\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"PJCIS concerned TSSR&#8217;s &#8216;do your best&#8217; requirements are not enough anymore","datePublished":"2022-02-07T06:13:16+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/pjcis-concerned-tssrs-do-your-best-requirements-are-not-enough-anymore\/"},"wordCount":823,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/pjcis-concerned-tssrs-do-your-best-requirements-are-not-enough-anymore\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/a0d9eed99c35a62db942010794ff721edff043cc\/2021\/05\/21\/55b074f7-c43e-4c98-becf-e69458121603\/telco-server-rack-gettyimages.jpg?width=1200&amp;fit=bounds&amp;auto=webp","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/pjcis-concerned-tssrs-do-your-best-requirements-are-not-enough-anymore\/","url":"https:\/\/www.threatshub.org\/blog\/pjcis-concerned-tssrs-do-your-best-requirements-are-not-enough-anymore\/","name":"PJCIS concerned TSSR's 'do your best' requirements are not enough anymore 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/pjcis-concerned-tssrs-do-your-best-requirements-are-not-enough-anymore\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/pjcis-concerned-tssrs-do-your-best-requirements-are-not-enough-anymore\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/a0d9eed99c35a62db942010794ff721edff043cc\/2021\/05\/21\/55b074f7-c43e-4c98-becf-e69458121603\/telco-server-rack-gettyimages.jpg?width=1200&amp;fit=bounds&amp;auto=webp","datePublished":"2022-02-07T06:13:16+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/pjcis-concerned-tssrs-do-your-best-requirements-are-not-enough-anymore\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/pjcis-concerned-tssrs-do-your-best-requirements-are-not-enough-anymore\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/pjcis-concerned-tssrs-do-your-best-requirements-are-not-enough-anymore\/#primaryimage","url":"https:\/\/www.zdnet.com\/a\/img\/resize\/a0d9eed99c35a62db942010794ff721edff043cc\/2021\/05\/21\/55b074f7-c43e-4c98-becf-e69458121603\/telco-server-rack-gettyimages.jpg?width=1200&amp;fit=bounds&amp;auto=webp","contentUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/a0d9eed99c35a62db942010794ff721edff043cc\/2021\/05\/21\/55b074f7-c43e-4c98-becf-e69458121603\/telco-server-rack-gettyimages.jpg?width=1200&amp;fit=bounds&amp;auto=webp"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/pjcis-concerned-tssrs-do-your-best-requirements-are-not-enough-anymore\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"PJCIS concerned TSSR&#8217;s &#8216;do your best&#8217; requirements are not enough anymore"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/45181","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=45181"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/45181\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=45181"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=45181"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=45181"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}