<section title="1.1. Understanding and using the NZISM"><subsection title="Objective"><paragraph
    title="1.1.1."


><![CDATA[<p>The New Zealand Information Security Manual details processes and controls essential for the protection of all New Zealand Government information and systems. Controls and processes representing good practice are also provided to enhance the baseline controls. Baseline controls are minimum acceptable levels of controls and are often described as “systems hygiene”.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="1.1.2."


><![CDATA[<p>The NZISM is intended for use by New Zealand Government departments, agencies and organisations. Crown entities, local government and private sector organisations are also encouraged to use the NZISM.</p>]]></paragraph>
<paragraph
    title="1.1.3."


><![CDATA[<p>This section provides information on how to interpret the content and the layout of content within the NZISM.</p>]]></paragraph>
<paragraph
    title="1.1.4."


><![CDATA[<p>Information that is Official Information or protectively marked UNCLASSIFIED, IN-CONFIDENCE, SENSITIVE or RESTRICTED is subject to a single set of controls in this NZISM.  These are essential or minimum acceptable levels of controls (baseline controls) and have been consolidated into a single set for simplicity, effectiveness and efficiency.  </p>]]></paragraph>
<paragraph
    title="1.1.5."


><![CDATA[<p>All baseline controls will apply to all government systems, related services and information. In addition, information classified CONFIDENTIAL, SECRET or TOP SECRET has further controls specified in this NZISM.</p>]]></paragraph>
<paragraph
    title="1.1.6."


><![CDATA[<p>Where the category “All Classifications” is used to define the scope of rationale and controls in the NZISM, it includes any information that is Official Information, UNCLASSIFIED, IN-CONFIDENCE, SENSITIVE, RESTRICTED, CONFIDENTIAL, SECRET, TOP SECRET or any endorsements, releasability markings or other qualifications appended to these categories and classifications.</p>]]></paragraph>
</block>
<block title="The purpose of this Manual"><paragraph
    title="1.1.7."


><![CDATA[<p>The purpose of the NZISM is to provide a set of essential or baseline controls and additional good and recommended practice controls for use by government agencies. &nbsp;The use or non-use of good practice controls MUST be based on an agency’s assessment and determination of residual risk related to information security.</p>]]></paragraph>
<paragraph
    title="1.1.8."


><![CDATA[<p>The NZISM is updated regularly. &nbsp;It is therefore important that agencies ensure that they are using the latest version of the NZISM.</p>]]></paragraph>
</block>
<block title="Target audience"><paragraph
    title="1.1.9."


><![CDATA[<p>The target audience for the NZISM is primarily security personnel and practitioners within, or contracted to, an agency. &nbsp;This includes, but is not limited to:</p>
<ul>
<li>security executives;</li>
<li>security and information assurance practitioners;</li>
<li>IT Security Managers;&nbsp;</li>
<li>Departmental Security Officers; and</li>
<li>service providers.</li>
</ul>]]></paragraph>
</block>
<block title="Structure of this Manual"><paragraph
    title="1.1.10."


><![CDATA[<p>The NZISM seeks to present information in a consistent manner. &nbsp;There are a number of headings within each section, described below.</p>
<ul>
<li>Objective – the desired outcome when controls within a section are implemented.</li>
<li>Context – the scope, applicability and any exceptions for a section.</li>
<li>References – references to external sources of information that can assist in the interpretation or implementation of controls.</li>
<li>Rationale &amp; Controls&nbsp;
<ul>
<li>Rationale – the reasoning behind controls and compliance requirements.</li>
<li>Control – risk reduction measures with associated compliance requirements.</li>
</ul>
</li>
</ul>]]></paragraph>
<paragraph
    title="1.1.11."


><![CDATA[<p>This section provides a summary of key structural elements of the NZISM. &nbsp;The detail of processes and controls is provided in subsequent chapters. &nbsp;It is important that reference is made to the detailed processes and controls in order to fully understand key risks and appropriate mitigations.</p>]]></paragraph>
</block>
<block title="The New Zealand Government Security Classification System"><paragraph
    title="1.1.12."


><![CDATA[<p>The requirements for classification of government documents and information are based on the <strong>Cabinet Committee Minute EXG (00) M 20/7</strong> and <strong>CAB (00) M42/4G(4)</strong>. &nbsp;The Protective Security Requirements (PSR) <a title="PSR Mandatory requirements - Information Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/information-security" target="_blank">INFOSEC2</a> require agencies to use the <a title="NZ Government Security Classification System" rel="noopener noreferrer" href="https://protectivesecurity.govt.nz/information-security/security-classification-system-and-handling-requirements/" target="_blank">NZ Government Security Classification System</a> and the NZISM for the classification, protective marking and handling of information assets. &nbsp;For more information on classification, protective marking and handling instructions, refer to the <a title="PSR" rel="noopener noreferrer" href="https://protectivesecurity.govt.nz" target="_blank">Protective Security Requirements</a>, <a title="NZ Government Security Classification System" rel="noopener noreferrer" href="https://protectivesecurity.govt.nz/information-security/security-classification-system-and-handling-requirements/" target="_blank">NZ Government Security Classification System</a>.</p>]]></paragraph>
</block>
</subsection>
<subsection title="Key definitions"> <block title="Accreditation Authority"><paragraph
    title="1.1.13."


><![CDATA[<p>The Agency Head is generally the Accreditation Authority for that agency for all systems and related services up to and including those classified RESTRICTED. &nbsp;See also <a title="Roles &amp; responsibilities" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-12255">Chapter 3 – Roles and Responsibilities</a> and <a title="Accreditation framework" href="http://nzism.gcsb.govt.nz/ism-document#Section-12591">Section 4.4 – Accreditation Framework</a>.</p>]]></paragraph>
<paragraph
    title="1.1.14."


><![CDATA[<p>Agency heads may choose to delegate this authority to a member of the agency’s executive.  The Agency Head remains accountable for ICT risks accepted and the information security of their agency. </p>]]></paragraph>
<paragraph
    title="1.1.15."


><![CDATA[<p>In all cases the Accreditation Authority will be at least a senior agency executive who has an appropriate level of understanding of the security risks they are accepting on behalf of the agency.</p>]]></paragraph>
<paragraph
    title="1.1.16."


><![CDATA[<p>For multi-national and multi-agency systems the Accreditation Authority is determined by a formal agreement between the parties involved. &nbsp;Consultation with the <a title="Government Chief Digital Officer" rel="noopener noreferrer" href="https://www.digital.govt.nz/digital-government/leadership" target="_blank">Office of the Government Chief Digital Officer (GCDO)</a> may also be necessary.</p>]]></paragraph>
<paragraph
    title="1.1.17."


><![CDATA[<p>For agencies with systems that process, store or communicate NZEO or information compartmented for national security reasons, the Director-General of the GCSB is the Accreditation Authority irrespective of the classification level of that information<em>.</em></p>]]></paragraph>
</block>
<block title="Certification and Accreditation Processes"><paragraph
    title="1.1.18."


><![CDATA[<p>Certification and accreditation of information systems is the fundamental governance process by which the risk owners and agency head derive assurance over the design, implementation and management of information systems and related services provided to or by government agencies. &nbsp; This process is described in detail in <a title="System certification &amp; accreditation" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-12459">Chapter 4 – System Certification and Accreditation</a>.</p>]]></paragraph>
<paragraph
    title="1.1.19."


><![CDATA[<p>Certification and Accreditation are two distinct processes.</p>]]></paragraph>
<paragraph
    title="1.1.20."


><![CDATA[<p>Certification is the formal assertion that an information system and related services comply with minimum standards and agreed design, including any security requirements.</p>]]></paragraph>
<paragraph
    title="1.1.21."


><![CDATA[<p><em>In all cases</em>, certification and the supporting documentation or summary of other evidence will be prepared by, or on behalf of, the host or lead agency.  The certification is then provided to the Accreditation Authority.</p>]]></paragraph>
<paragraph
    title="1.1.22."


><![CDATA[<p>Accreditation is the formal authority to operate an information system and related services, and requires the recognition and acceptance of associated risk and residual risks.</p>]]></paragraph>
<paragraph
    title="1.1.23."


><![CDATA[<p>A waiver is NOT an exception (see below).  A waiver is the formal acknowledgement that a particular compliance requirement of the NZISM cannot currently be met.  A waiver is granted by the Accreditation Authority on the basis that full compliance with the NZISM is achieved or compensating controls are implemented within a time specified by the Accreditation Authority.  Waivers are valid in the short term only and full accreditation cannot be granted until all conditions of the waiver have been met.  The need for a waiver may occur when specified controls cannot be practically implemented because of technology, resource or other serious limitations.  It is essential that risk is managed through the application of specified conditions.</p>]]></paragraph>
<paragraph
    title="1.1.24."


><![CDATA[<p>An exception is NOT a waiver (see preceding paragraph).  An exception is the formal acknowledgement that a requirement of the NZISM cannot be met and that a dispensation from the particular compliance requirement is granted by the Accreditation Authority.  This exception is valid for the term of the Accreditation Certificate or some lesser time as determined by the Accreditation Authority.  This may occur, for example, the system is to be in use for a very short time (usually measured in hours), or the requirement cannot be met and there is no viable alternative.  It is essential that any consequential risk is acknowledged and appropriate measures are taken to manage any increased risk.</p>]]></paragraph>
<paragraph
    title="1.1.25."


><![CDATA[<p>The requirements described above are <strong>summarised</strong> in the table below.  Care MUST be taken when using this table as there are numerous endorsements, caveats and releasability instructions in the <a title="Classification system" href="https://protectivesecurity.govt.nz/classification-system/" target="_blank">New Zealand Government Security Classification System</a><a title="NZ Government Security Classification System" href="https://www.protectivesecurity.govt.nz/information-security/security-classification-system-and-handling-requirements/" target="_blank"></a> that may change where the authority for accreditation lies.</p><table class="table-main">
<tbody>
<tr>
<td>Information Classification</td>
<td>MUST and MUST NOT controls</td>
<td>SHOULD and SHOULD NOT controls</td>
<td>Accreditation Authority</td>
</tr>
<tr>
<td>
<p><strong>Information classified <span class="box-text-black">RESTRICTED</span> and below,</strong></p>
<p> </p>
<p><strong> including <span class="table-main">UNCLASSIFIED</span> </strong></p>
<p><strong>and Official Information </strong></p>
</td>
<td>
<p>Controls are baseline or “systems hygiene” controls and are essential for the secure use of a system or service. Non-use is high risk and mitigation is essential. </p>
<p>If the control <em><strong>cannot</strong></em> be directly implemented, suitable compensating controls MUST be selected to manage identified risks.</p>
<p>The Accreditation Authority <strong><em>may</em></strong> grant a Waiver or Exception from a specific requirement <em><strong>if</strong></em> the level of residual risk is within the agency’s risk appetite.</p>
<p>Some baseline controls cannot be <em><strong>individually</strong></em> risk managed by agencies without jeopardising multi-agency, All-of-Government or international systems and related information.</p>
</td>
<td>
<p>Control represents good and recommended practice. Non-use may be medium to high risk.</p>
<p>Non-use of controls is formally recorded, compensating controls selected as required and residual risk acknowledged to be within the agency’s risk appetite and formally agreed and signed off by the Accreditation Authority.</p>
</td>
<td>Agency Head/Chief Executive/Director General (or formal delegate)</td>
</tr>
<tr>
<td><strong>All systems or services classified <span class="box-text-green">CONFIDENTIAL</span> and above.</strong></td>
<td>
<p>This is a baseline for any use of High Assurance Cryptographic Equipment (HACE) or the establishment of any compartments or the handling of any endorsed information (see below).</p>
<p>The Controls are baseline or “systems hygiene” controls and are essential for the secure use of a system or service. Non-use is high or very high risk and mitigation is essential.</p>
<p>If the control <strong><em>cannot</em></strong> be directly implemented and suitable compensating controls MUST be selected to manage identified risks.</p>
<p>The Accreditation Authority <strong><em>may</em></strong> grant a Waiver or Exception from a specific requirement <em><strong>if</strong></em> the level of residual risk is within the agency’s risk appetite.</p>
<p>Some baseline controls cannot be <strong><em>individually</em></strong> risk managed by agencies without jeopardising multi-agency, All-of-Government or international systems and related information.</p>
</td>
<td>
<p>This is a baseline for any use of High Assurance Cryptographic Equipment (HACE) or the establishment of any compartments or the handling of any endorsed information (See below).</p>
<p>Control represents good and recommended practice. Non-use may be high risk</p>
<p>Non-use of controls is formally recorded, compensating controls selected as required and residual risk formally acknowledged to be within the agency’s risk appetite and agreed and signed off by the Accreditation Authority</p>
</td>
<td>Agency Head/Chief Executive/Director General (or formal delegate)</td>
</tr>
<tr>
<td>
<p><strong>All use of High Assurance Cryptographic Equipment (HACE)</strong></p>
<p><strong>All systems or services with compartmented or caveated information classified <span class="box-text-green">CONFIDENTIAL</span> and above.</strong></p>
</td>
<td>
<p>Accreditation based on work conducted by the agency and authority to operate by the Agency Head.</p>
<p>Controls are baseline or “systems hygiene” controls and are essential for the secure use of a system or service. Non-use is high or very high risk and mitigation is essential.</p>
<p>If the control <strong><em>cannot</em></strong> be directly implemented and suitable compensating controls MUST be selected to manage identified risks.</p>
<p>The Accreditation Authority <strong><em>may</em></strong> grant a Waiver or Exception from a specific requirement <em><strong>if</strong></em> the level of residual risk is within the agency’s risk appetite.</p>
<p>Some baseline controls cannot be <strong><em>individually</em></strong> risk managed by agencies without jeopardising multi-agency, All-of-Government or international systems and related information.</p>
</td>
<td>
<p>Accreditation based on work conducted by the agency and authority to operate by the Agency Head.</p>
<p>Control represents good and recommended practice. Non-use may be high risk</p>
<p>Non-use of controls is formally recorded, compensating controls selected as required and residual risk formally acknowledged to be within the agency’s risk appetite and agreed and signed off by the Accreditation Authority.</p>
</td>
<td>Director GCSB (or formal delegate)</td>
</tr>
</tbody>
</table>]]></paragraph>
</block>
<block title="“All Classifications” category"><paragraph
    title="1.1.26."


><![CDATA[<p>The “All Classifications” category is used to describe the applicability of controls for any information that is Official Information or protectively marked UNCLASSIFIED, IN-CONFIDENCE, SENSITIVE, RESTRICTED, CONFIDENTIAL, SECRET or TOP SECRET, including any caveats or releasability endorsements associated with the respective document classification.</p>]]></paragraph>
</block>
<block title="Compartmented Information"><paragraph
    title="1.1.27."


><![CDATA[<p>Compartmented information is information requiring special protection through separation or is “compartmented” from other information stored and processed by the agency.</p>]]></paragraph>
</block>
<block title="Concept of Operations (ConOp) Document"><paragraph
    title="1.1.28."


><![CDATA[<p>Systems, operations, campaigns and other organisational activities are generally developed from an executive directive or organisational strategy.  The ConOp is a document describing the characteristics of a proposed operation, process or system and how they may be employed to achieve particular objectives.  It is used to communicate the essential features to all stakeholders and obtain agreement on objectives and methods.  ConOps should be written in a non-technical language to facilitate agreement on understanding and knowledge and provide clarity of purpose.  ConOp is a term widely used in the military, operational government agencies and other defence, military support and aerospace enterprises.</p>]]></paragraph>
</block>
<block title="Information"><paragraph
    title="1.1.29."


><![CDATA[<p>The New Zealand Government requires information important to its functions, resources and classified equipment to be adequately safeguarded to protect public and national interests and to preserve personal privacy.  Information is defined as any communication or representation of knowledge such as facts, data, and opinions in any medium or form, electronic as well as physical.  Information includes any text, numerical, graphic, cartographic, narrative, or any audio or visual representation.</p>]]></paragraph>
</block>
<block title="Information Asset"><paragraph
    title="1.1.30."


><![CDATA[<p>An information asset is any information or related equipment that has value to an agency or organisation.  This includes equipment, facilities, patents, intellectual property, software and hardware.  Information Assets also include services, information, and people, and characteristics such as reputation, brand, image, skills, capability and knowledge.</p>]]></paragraph>
</block>
<block title="Information Assurance (IA)"><paragraph
    title="1.1.31."


><![CDATA[<p>Confidence in the governance of information systems and that effective measures are implemented to manage, protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation.</p>]]></paragraph>
</block>
<block title="Information Security"><paragraph
    title="1.1.32."


><![CDATA[<p>Although sometimes described as cyber security, Information security is considered a higher level of abstraction than cyber security relating to the protection of information regardless of its form (electronic or physical).  The accepted definition of information security within government is: “measures relating to the confidentiality, availability and integrity of information”.</p>]]></paragraph>
<paragraph
    title="1.1.33."


><![CDATA[<p>A number of specialised security areas contribute to information security within government; these include: physical security, personnel security, communications security and information and communications technology (ICT) security along with their associated governance and assurance measures.</p>]]></paragraph>
</block>
<block title="Information Systems"><paragraph
    title="1.1.34."


><![CDATA[<p>The resources and assets for the collection, storage, processing, maintenance, use, sharing, dissemination, disposition, display, and transmission of information. This includes necessary and related services provided as part of the information system, for example; Telecommunication or Cloud Services.</p>]]></paragraph>
</block>
<block title="Information Systems Governance"><paragraph
    title="1.1.35."


><![CDATA[<p>An integral part of enterprise governance consists of the leadership and organisational structures and processes to ensure that the agency’s information systems support and sustain the agency’s and Government’s strategies and objectives.  Information Systems Governance is the responsibility of the Agency Head and the Executive team.</p>]]></paragraph>
</block>
<block title="Secure Area"><paragraph
    title="1.1.36."


><![CDATA[<p>In the context of the NZISM a secure area is defined as any area, room, group of rooms, building or installation that processes, stores or communicates information classified CONFIDENTIAL, SECRET, TOP SECRET or any compartmented or caveated information at these classifications. &nbsp;A secure area may include a SCIF (see below). &nbsp;The physical security requirements for such areas are specified in the <a title="PSR Policy Framework — PHYSEC" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/physical-security" target="_blank">PSR Policy Framework - PHYSEC.</a></p>]]></paragraph>
</block>
<block title="Security Posture"><paragraph
    title="1.1.37."


><![CDATA[<p>The Security Posture of an organisation describes and encapsulates the security status and overall approach to identification and management of the security of an organisation’s networks, information, systems, processes and personnel.  It includes risk assessment, threat identification, technical and non-technical policies, procedures, controls and resources that safeguard the organisation from internal and external threats.</p>]]></paragraph>
</block>
<block title="Sensitive Compartmented Information Facility (SCIF)"><paragraph
    title="1.1.38."


><![CDATA[<p>Any accredited area, room, or group of rooms, buildings, or installation where Sensitive Compartmented Information (SCI) is stored, used, discussed, processed or communicated.  The Accreditation Authority for a SCIF is the Director GCSB or formal delegate.</p>]]></paragraph>
</block>
<block title="System Owner"><paragraph
    title="1.1.39."


><![CDATA[<p>A System Owner is the <strong>person</strong> within an agency responsible for the information resource and for the maintenance of system accreditation. This may include such outsourced services such as telecommunications or cloud. Their responsibilities are described in more detail in <a title="System Owners" href="http://nzism.gcsb.govt.nz/ism-document#Section-12415">Section 3.4 – System Owners</a>.</p>]]></paragraph>
</block>
</subsection>
<subsection title="Interpretation of controls"> <block title="Controls language"><paragraph
    title="1.1.40."


><![CDATA[<p>The definition of controls in this manual is based on language as defined by the Internet Engineering Task Force (IETF)’s Request For Comment (RFC) 2119 to indicate differing degrees of compliance.</p>]]></paragraph>
</block>
<block title="Applicability of controls"><paragraph
    title="1.1.41."


><![CDATA[<p>Whilst the NZISM provides controls for specific technologies, not all systems will use all of these technologies. &nbsp;When a system is developed, the agency will determine the appropriate scope of the system and which controls within this manual are applicable.</p>]]></paragraph>
<paragraph
    title="1.1.42."


><![CDATA[<p>If a control within the NZISM is outside the scope of the system then non-compliance processes <em>do not apply</em>. &nbsp;However, if a control is within the scope of the system yet the agency chooses <em>not to implement</em> the control, then they are required to follow the non-compliance procedures as outlined below in order to provide appropriate governance and assurance.</p>]]></paragraph>
<paragraph
    title="1.1.43."


><![CDATA[<p>The procedures and controls described in the NZISM are designed, not only to counter or prevent known common attacks, but also to protect from emerging threats.</p>]]></paragraph>
</block>
<block title="Identification and Selection of controls"><paragraph
    title="1.1.44."


><![CDATA[<p>In all cases controls have been selected as the most effective means of mitigating identified risks and threats.  Each control has been carefully researched and risk assessed against a wide range of factors, including useability, threat levels, likelihood, rapid technology changes, sustainability, effectiveness and cost.  </p>]]></paragraph>
</block>
<block title="Controls with a “MUST” or “MUST NOT” requirement"><paragraph
    title="1.1.45."


><![CDATA[<p>A control with a “MUST” or “MUST NOT” requirement indicates that use, or non-use, of the control is essential in order to effectively manage the identified risk, unless the control is demonstrably not relevant to the respective system.  These controls are baseline controls, sometimes described as systems hygiene controls.</p>]]></paragraph>
<paragraph
    title="1.1.46."


><![CDATA[<p>The rationale for non-use of baseline controls MUST be clearly demonstrated to the Accreditation Authority as part of the certification process, before approval for exceptions is granted.  MUST and MUST NOT controls take precedence over SHOULD and SHOULD NOT controls.</p>]]></paragraph>
</block>
<block title="Controls with a “SHOULD” or “SHOULD NOT” requirement"><paragraph
    title="1.1.47."


><![CDATA[<p>A control with a “SHOULD” or “SHOULD NOT” requirement indicates that use, or non-use, of the control is considered good and recommended practice. Valid reasons for not implementing a control could exist, including:</p><ol style="list-style-type: lower-alpha;">
<li>A control is not relevant in the agency;</li>
<li>A system or ICT capability does not exist in the agency; or </li>
<li>A process or control(s) of equal strength has been substituted.</li>
</ol>]]></paragraph>
<paragraph
    title="1.1.48."


><![CDATA[<p>While some cases may require a simple record of fact, agencies must recognise that non-use of any control, without due consideration, may increase residual risk for the agency. This residual risk needs to be agreed and acknowledged by the Accreditation Authority. In particular an agency should pose the following questions:</p><ol style="list-style-type: lower-alpha;">
<li>Is the agency willing to accept additional risk?</li>
<li>Have any implications for All-of-Government systems been considered?</li>
<li>If, so, what is the justification?</li>
</ol>]]></paragraph>
<paragraph
    title="1.1.49."


><![CDATA[<p>A formal auditable record of this consideration and decision is required as part of the IA governance and assurance processes within an agency.</p>]]></paragraph>
</block>
<block title="Non-compliance"><paragraph
    title="1.1.50."


><![CDATA[<p>Non-compliance is a risk to the agency and may also pose risks to other agencies and organisations.  Good governance requires these risks are clearly articulated, measures are implemented to manage and reduce the identified risks to acceptable levels, that the Accreditation Authority is fully briefed, acknowledges any residual and additional risk and approves the measures to reduce risk. </p>]]></paragraph>
<paragraph
    title="1.1.51."


><![CDATA[<p>In some circumstances, full compliance with the NZISM may not be possible, for example some legacy systems may not support the configuration of particular controls. &nbsp;In such circumstances, a risk assessment should clearly identify <em>compensating</em> controls to reduce risks to an acceptable level. &nbsp;Acceptance of risk or residual risk, without due consideration is NOT adequate or acceptable.</p>]]></paragraph>
<paragraph
    title="1.1.52."


><![CDATA[<p>It is recognised that agencies may not be able to immediately implement all controls described in the NZISM due to resource, budgetary, capability or other constraints. &nbsp;Good practice risk management processes will acknowledge this and prepare a timeline and process by which the agency can implement all appropriate controls described in the NZISM. &nbsp;</p>]]></paragraph>
<paragraph
    title="1.1.53."


><![CDATA[<p>Simply acknowledging risks and not providing the means to implement controls <em>does not</em> represent effective risk management.</p>]]></paragraph>
<paragraph
    title="1.1.54."


><![CDATA[<p>Where multiple controls are not relevant or an agency chooses not to implement multiple controls within the NZISM the system owner may choose to logically group and consolidate controls when following the processes for non-compliance.</p>]]></paragraph>
</block>
<block title="Rationale Statements"><paragraph
    title="1.1.55."


><![CDATA[<p>A short rationale is provided with each group of controls.  It is intended that this rationale is read in conjunction with the relevant controls in order to provide context and guidance.</p>]]></paragraph>
</block>
</subsection>
<subsection title="Risk management"> <block title="Risk Management Standards"><paragraph
    title="1.1.56."


><![CDATA[<p>For security risk management to be of true value to an agency it MUST relate to the specific circumstances of an agency and its systems, as well as being based on an industry recognised approach or risk management guidelines. For example, guidelines and standards produced by <a title="Standards NZ" rel="noopener noreferrer" href="https://standards.govt.nz/" target="_blank">Standards New Zealand</a> and the <a title="International Organization for Standardization" rel="noopener noreferrer" href="https://www.iso.org/home.html" target="_blank">International Organization for Standardization (ISO).</a></p>]]></paragraph>
<paragraph
    title="1.1.57."


><![CDATA[<p>The <a title="International Organization for Standardization" rel="noopener noreferrer" href="https://www.iso.org/home.html" target="_blank">International Organization for Standardization</a> has published an international risk management standard, including principles and guidelines on implementation, outlined in <a title="ISO 31000:2018 - Risk Management Guidelines" rel="noopener noreferrer" href="https://www.iso.org/standard/65694.html" target="_blank">ISO 31000:2018 - Risk Management - Guidelines</a>. &nbsp;Refer to the tables below for additional reference materials.</p>]]></paragraph>
</block>
<block title="The NZISM and Risk Management "><paragraph
    title="1.1.58."


><![CDATA[<p>The NZISM encapsulates good and recommended best-practice in managing technology risks and mitigating or minimising threat to New Zealand government information systems.</p>]]></paragraph>
<paragraph
    title="1.1.59."


><![CDATA[<p>Because there is a broad range of systems across government and the age and technological sophistication of these systems varies widely, there is no single governance, assurance, risk or controls model that will accommodate all agencies information and technology security needs. </p>]]></paragraph>
<paragraph
    title="1.1.60."


><![CDATA[<p>The NZISM contains guidance on governance and assurance processes and technological controls based on comprehensive risk and threat assessments, research and environmental monitoring.</p>]]></paragraph>
<paragraph
    title="1.1.61."


><![CDATA[<p>The NZISM encourages agencies to take a similar risk-based approach to information security.  This approach enables the flexibility to allow agencies to conduct their business and maintain resilience in the face of a changing threat environment, while recognising the essential requirements and guidance provided by the NZISM.</p>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="1.1.62."


><![CDATA[<p><strong>Key Standards</strong></p>
<table class="table-main" style="width: 117.103%;">
<tbody>
<tr>
<td style="width: 13.3582%;"><strong>Reference</strong></td>
<td style="width: 16.3746%;"><strong>Title</strong></td>
<td style="text-align: center; width: 11.491%;"><strong>Publisher</strong></td>
<td style="width: 58.7475%;"><strong>Source</strong></td>
</tr>
<tr>
<td style="width: 13.3582%;">
<p><strong>NZISM</strong></p>
<p>&nbsp;</p>
</td>
<td style="width: 16.3746%;"><strong>New Zealand Information Security Manual</strong></td>
<td style="text-align: center; width: 11.491%;">GCSB</td>
<td style="width: 58.7475%;">
<p><a class="ss-broken" rel="noopener noreferrer" href="https://nzism.gcsb.govt.nz/" target="_blank">https://nzism.gcsb.govt.nz/</a>&nbsp;&nbsp;</p>
</td>
</tr>
<tr>
<td style="width: 13.3582%;"><strong>PSR</strong></td>
<td style="width: 16.3746%;"><strong>Protective Security Requirements&nbsp;</strong></td>
<td style="text-align: center; width: 11.491%;">NZSIS</td>
<td style="width: 58.7475%;"><a title="Link to protective security" rel="noopener noreferrer" href="https://protectivesecurity.govt.nz" target="_blank">https://protectivesecurity.govt.nz</a></td>
</tr>
<tr>
<td style="width: 13.3582%;"><strong><strong>ISO/IEC 27000:2018&nbsp;</strong></strong></td>
<td style="width: 16.3746%;"><strong>Information Technology – Security Techniques – Information Security Management Systems – Overview and Vocabulary (fifth edition)</strong></td>
<td style="text-align: center; width: 11.491%;">
<p>ISO</p>
<p>&nbsp;</p>
</td>
<td style="width: 58.7475%;">
<p><a title="ISO/IEC 27000:2018" rel="noopener noreferrer" href="https://www.iso.org/standard/73906.html" target="_blank">https://www.iso.org/standard/73906.html</a></p>
</td>
</tr>
<tr>
<td style="width: 13.3582%;"><strong><strong>CNSS Instruction No. 4009 6 April 2015</strong></strong></td>
<td style="width: 16.3746%;"><strong>&nbsp;National Information Assurance (IA) Glossary, (US)&nbsp;</strong></td>
<td style="text-align: center; width: 11.491%;">Committee on National Security Systems (CNSS)</td>
<td style="width: 58.7475%;">
<p><a title="CNSSI 4009 PDF" rel="noopener noreferrer" href="https://rmf.org/wp-content/uploads/2017/10/CNSSI-4009.pdf" target="_blank">https://rmf.org/wp-content/uploads/2017/10/CNSSI-4009.pdf [PDF, 1.04 MB]</a></p>
<p>&nbsp;</p>
</td>
</tr>
<tr>
<td style="width: 13.3582%;"><strong><strong>NISTIR 7298 Revision 3<strong>, July 2019</strong></strong></strong></td>
<td style="width: 16.3746%;"><strong>&nbsp;Glossary of Key Information Security Terms</strong></td>
<td style="text-align: center; width: 11.491%;">NIST</td>
<td style="width: 58.7475%;">
<p><a title="NIST 7298 revision 3 FINAL" rel="noopener noreferrer" href="https://csrc.nist.gov/publications/detail/nistir/7298/rev-3/final" target="_blank">https://csrc.nist.gov/publications/detail/nistir/7298/rev-3/final</a><a title="Link to nvlpubs nist pdf" rel="noopener noreferrer" href="http://nvlpubs.nist.gov/nistpubs/ir/2013/NIST.IR.7298r2.pdf" target="_blank">&nbsp;</a></p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
<paragraph
    title="1.1.63."


><![CDATA[<p><strong>Additional Guidance</strong></p>
<table class="table-main">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td style="text-align: center;"><strong>Publisher&nbsp;</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td colspan="4">
<p><strong><strong>Approved Products</strong></strong></p>
</td>
</tr>
<tr>
<td><strong>I</strong>SO/IEC 15408-1:2009&nbsp;</td>
<td>
<p class="no-uppercase">Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model</p>
</td>
<td style="text-align: center;">
<p><span>ISO</span></p>
</td>
<td>
<p><a title="ISO/IEC 15408-1:2009" rel="noopener noreferrer" href="https://www.iso.org/standard/50341.html" target="_blank">https://www.iso.org/standard/50341.html</a><a title="Link to ISO" rel="noopener noreferrer" href="http://www.iso.org/" target="_blank"></a></p>
</td>
</tr>
<tr>
<td>ISO/IEC 15408-2:2008</td>
<td>
<p>Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional components</p>
</td>
<td style="text-align: center;">ISO</td>
<td><a title="ISO/IEC 15408-2:2008" rel="noopener noreferrer" href="https://www.iso.org/standard/46414.html" target="_blank">https://www.iso.org/standard/46414.html</a></td>
</tr>
<tr>
<td>ISO/IEC 15408-3:2008</td>
<td>
<p>Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance components</p>
</td>
<td style="text-align: center;">ISO</td>
<td><a title="ISO/IEC 15408-3:2008" rel="noopener noreferrer" href="https://www.iso.org/standard/46413.html" target="_blank">https://www.iso.org/standard/46413.html</a></td>
</tr>
<tr>
<td>&nbsp;&nbsp;</td>
<td>AISEP Evaluated Products List</td>
<td style="text-align: center;">
<p>ASD</p>
</td>
<td>
<p><a title="Evaluated products guidance" rel="noopener noreferrer" href="https://www.cyber.gov.au/resources-business-and-government/essential-cyber-security/ism/cyber-security-guidelines/guidelines-evaluated-products" target="_blank">https://www.cyber.gov.au/resources-business-and-government/essential-cyber-security/ism/cyber-security-guidelines/guidelines-evaluated-products&nbsp;</a></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>Other Evaluated Products Lists</td>
<td style="text-align: center;">
<p><span>NSA</span></p>
<p><span><span>NCSC UK</span></span></p>
<p><span><span><span>CSEC</span></span></span></p>
<p><span><span><span><span>Common Criteria</span></span></span></span></p>
</td>
<td>
<p><a title="Link to https://nsa.gov  " rel="noopener noreferrer" href="https://nsa.gov/" target="_blank">https://nsa.gov</a></p>
<p><a title="Link to NCSC UK" rel="noopener noreferrer" href="https://ncsc.gov.uk/" target="_blank">https://ncsc.gov.uk/</a></p>
<p><a title="link to cse" rel="noopener noreferrer" href="https://cse-cst.gc.ca/" target="_blank">https://cse-cst.gc.ca</a></p>
<p><a title="Certified Products List" rel="noopener noreferrer" href="https://commoncriteriaportal.org/products/" target="_blank">https://commoncriteriaportal.org/products</a></p>
</td>
</tr>
<tr>
<td colspan="4">
<p><strong>Archiving of information</strong></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>Public Records Act 2005 (as amended)</td>
<td style="text-align: center;">
<p>Archives New Zealand</p>
<p><span>Parliamentary Counsel Office</span></p>
</td>
<td>
<p><a title="Archives" rel="noopener noreferrer" href="https://archives.govt.nz" target="_blank">https://archives.govt.nz</a>&nbsp;&nbsp;</p>
<p><a title="NZ Legislation" rel="noopener noreferrer" href="https://legislation.govt.nz/" target="_blank">https://legislation.govt.nz/</a></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>Archives, Culture, and Heritage Reform Act 2000 (as amended)</td>
<td style="text-align: center;">
<p><span>Parliamentary Counsel Office</span></p>
</td>
<td>
<p><a title="NZ Legislation" rel="noopener noreferrer" href="https://legislation.govt.nz/" target="_blank">https://legislation.govt.nz/</a></p>
</td>
</tr>
<tr>
<td colspan="4">
<p><strong>Business continuity</strong></p>
</td>
</tr>
<tr>
<td>ISO 22301:2019</td>
<td>
<p>Security and Resilience - Business Continuity Management Systems - Requirements</p>
</td>
<td style="text-align: center;">
<p>ISO</p>
</td>
<td>
<p><a title="ISO 22301:2019" rel="noopener noreferrer" href="https://www.iso.org/standard/75106.html" target="_blank">https://www.iso.org/standard/75106.html</a></p>
</td>
</tr>
<tr>
<td colspan="4">
<p><strong>Cable security</strong></p>
</td>
</tr>
<tr>
<td>NZCSS 400</td>
<td>New Zealand Communications Security Standard No 400 (Document classified CONFIDENTIAL)</td>
<td style="text-align: center;"><span>GCSB</span></td>
<td>
<p>CONFIDENTIAL document available on application to authorised personnel</p>
</td>
</tr>
<tr>
<td colspan="4">
<p><strong>Cryptographic Security</strong></p>
</td>
</tr>
<tr>
<td>NZCSP 301</td>
<td>New Zealand Communications Security Policy No 301 (Document classified RESTRICTED)</td>
<td style="text-align: center;">GCSB</td>
<td>
<p>RESTRICTED document available on application to authorised personnel</p>
</td>
</tr>
<tr>
<td colspan="4">
<p><strong>Emanation security</strong></p>
</td>
</tr>
<tr>
<td>NZCSS 400</td>
<td>New Zealand Communications Security Standard No 400 (Document classified CONFIDENTIAL)</td>
<td style="text-align: center;">GCSB</td>
<td>
<p>CONDFIDENTIAL document available on application to authorised personnel</p>
</td>
</tr>
<tr>
<td colspan="4">
<p><strong>Information classification</strong></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>Protective Security Requirements (New Zealand Government Security Classification System Handling Requirements for protectively marked information and equipment)</td>
<td style="text-align: center;"><span>NZSIS</span></td>
<td>
<p><a title="PSR" rel="noopener noreferrer" href="https://protectivesecurity.govt.nz" target="_blank">https://protectivesecurity.govt.nz</a></p>
</td>
</tr>
<tr>
<td colspan="4">
<p><strong>Information security management&nbsp;</strong></p>
</td>
</tr>
<tr>
<td>ISO/IEC 27001:2013</td>
<td>
<p>Information technology — Security techniques — Information security management systems — Requirements</p>
</td>
<td style="text-align: center;">ISO</td>
<td>
<p><a title="ISO/IEC 27001:2013" rel="noopener noreferrer" href="https://www.iso.org/standard/54534.html" target="_blank">https://www.iso.org/standard/54534.html</a></p>
</td>
</tr>
<tr>
<td>ISO/IEC 27002:2022</td>
<td>
<p>Information security, cybersecurity, and privacy protection — Information security controls</p>
</td>
<td style="text-align: center;"><span>ISO</span></td>
<td>
<p><a title="ISO/IEC 27002:2022" rel="noopener noreferrer" href="https://www.iso.org/standard/75652.html" target="_blank">https://www.iso.org/standard/75652.html</a></p>
</td>
</tr>
<tr>
<td>ISO/IEC 270xx series</td>
<td>Other standards and guidelines in the ISO/IEC 270xx series, as appropriate</td>
<td style="text-align: center;"><span>ISO</span></td>
<td>
<p><a title="ISO/IEC 270xx series" rel="noopener noreferrer" href="https://www.iso.org/standards.html" target="_blank">https://www.iso.org/standards.html</a>&nbsp;</p>
</td>
</tr>
<tr>
<td colspan="4">
<p><strong>Key management – commercial grade</strong></p>
</td>
</tr>
<tr>
<td>ISO/IEC 11770</td>
<td>ISO/IEC 11770 Parts 1-6: Information Technology – Security Techniques – Key Management</td>
<td style="text-align: center;"><span><span>IS0</span></span></td>
<td>
<p><a title="ISO/IEC 11770 Parts 1-6" rel="noopener noreferrer" href="https://www.iso.org/standards.html" target="_blank">https://www.iso.org/standards.html</a>&nbsp;</p>
</td>
</tr>
<tr>
<td colspan="4">
<p><strong>Management of electronic records that may be used as evidence</strong></p>
</td>
</tr>
<tr>
<td>ISO/IEC 27037:2012<strong>&nbsp;</strong></td>
<td>
<p>Information Technology – Security Techniques - Guidelines for Identification, Collection, Acquisition and Preservation of Digital Evidence</p>
</td>
<td style="text-align: center;">
<p><span><span>ISO</span></span></p>
</td>
<td>
<p><a title="ISO/IEC 27037:2012" rel="noopener noreferrer" href="https://www.iso.org/standard/44381.html" target="_blank">https://www.iso.org/standard/44381.html</a></p>
</td>
</tr>
<tr>
<td colspan="4"><strong><strong>Personnel security</strong></strong></td>
</tr>
<tr>
<td>PSR</td>
<td>Protective Security Requirements</td>
<td style="text-align: center;">NZSIS</td>
<td>
<p><a title="PSR - Personnel Security" rel="noopener noreferrer" href="https://protectivesecurity.govt.nz/personnel-security/" target="_blank">https://protectivesecurity.govt.nz/personnel-security/</a></p>
</td>
</tr>
<tr>
<td colspan="4">
<p><strong>Physical security</strong></p>
</td>
</tr>
<tr>
<td>PSR</td>
<td>Protective Security Requirements</td>
<td style="text-align: center;"><span>NZSIS</span></td>
<td>
<p><a title="PSR - Physical Security" rel="noopener noreferrer" href="https://protectivesecurity.govt.nz/physical-security/" target="_blank">https://protectivesecurity.govt.nz/physical-security/</a></p>
</td>
</tr>
<tr>
<td colspan="4">
<p><strong>Privacy requirements</strong></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>Privacy Act 2020</td>
<td style="text-align: center;">
<p>Office of The Privacy Commissioner</p>
<p>Parliamentary Counsel Office</p>
</td>
<td>
<p><a title="Office of the privacy commissioner" rel="noopener noreferrer" href="https://privacy.org.nz" target="_blank">https://privacy.org.nz</a></p>
<p>&nbsp;</p>
<p><span><a title="NZ Legislation" rel="noopener noreferrer" href="https://legislation.govt.nz/" target="_blank">https://legislation.govt.nz/</a></span></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>Privacy advice, guidance and tools to help government agencies improve their privacy capability and maturity.</td>
<td style="text-align: center;">
<p><span>GCPO</span></p>
</td>
<td>
<p><a title="Privacy" rel="noopener noreferrer" href="https://digital.govt.nz/standards-and-guidance/privacy-security-and-risk/privacy/" target="_blank">https://digital.govt.nz/standards-and-guidance/privacy-security-and-risk/privacy/</a></p>
</td>
</tr>
<tr>
<td colspan="4">
<p><strong>Risk management</strong></p>
</td>
</tr>
<tr>
<td>ISO 31000:2018</td>
<td>Risk Management -- Guidelines</td>
<td style="text-align: center;">
<p><span>ISO</span></p>
</td>
<td>
<p><a title="ISO 31000:2018" rel="noopener noreferrer" href="https://www.iso.org/standard/65694.html" target="_blank">https://www.iso.org/standard/65694.html</a></p>
</td>
</tr>
<tr>
<td>ISO/IEC 27005:2018</td>
<td>Information technology — Security techniques — Information security risk management</td>
<td style="text-align: center;"><span><span>ISO</span></span></td>
<td><a title="ISO/IEC 27005:2018" rel="noopener noreferrer" href="https://www.iso.org/standard/75281.html" target="_blank">https://www.iso.org/standard/75281.html</a>&nbsp;</td>
</tr>
<tr>
<td>HB 436:2013</td>
<td>
<p>Risk Management Guidelines (Companion to withdrawn standard ISO 31000:2009)</p>
</td>
<td style="text-align: center;"><span>Standards NZ</span></td>
<td><a title="Standards NZ" rel="noopener noreferrer" href="https://standards.govt.nz/" target="_blank">https://standards.govt.nz</a></td>
</tr>
<tr>
<td>ISO Guide 73:2009</td>
<td>Risk Management – Vocabulary – Guidelines for use in Standards</td>
<td style="text-align: center;"><span><span><span>ISO</span></span></span></td>
<td><span><a title="ISO Guide 73:2019" rel="noopener noreferrer" href="https://www.iso.org/standard/44651.html" target="_blank">https://www.iso.org/standard/44651.html</a><span>&nbsp;</span></span></td>
</tr>
<tr>
<td>NIST SP 800-30 rev. 1&nbsp;</td>
<td>Guide for conducting Risk Assessments</td>
<td style="text-align: center;">
<p>NIST</p>
</td>
<td>
<p><a rel="noopener noreferrer" href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-30r1.pdf" target="_blank">https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-30r1.pdf [PDF, 807 KB]</a></p>
</td>
</tr>
<tr>
<td colspan="4"><strong><strong>Security Management</strong></strong><a title="Link to standards" rel="noopener noreferrer" href="http://www.standards.co.nz" target="_blank"></a></td>
</tr>
<tr>
<td>HB 167:2006</td>
<td>Security Risk Management</td>
<td style="text-align: center;"><span><span>Standards NZ</span></span></td>
<td><a title="Standards NZ" rel="noopener noreferrer" href="https://standards.govt.nz" target="_blank">https://standards.govt.nz</a></td>
</tr>
<tr>
<td colspan="4">
<p><strong>Security And Intelligence Legislation</strong></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>Intelligence and Security Act 2017</td>
<td style="text-align: center;">
<p>Parliamentary Counsel Office</p>
</td>
<td>
<p><a title="NZ Legislation" rel="noopener noreferrer" href="https://legislation.govt.nz/" target="_blank">https://legislation.govt.nz/</a><a title="Link to legislation" rel="noopener noreferrer" href="http://www.legislation.govt.nz%20" target="_blank">&nbsp;</a></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>Telecommunications (Interception Capability and Security) Act 2013 (as amended)</td>
<td style="text-align: center;">
<p><span>Parliamentary Counsel Office</span></p>
</td>
<td>
<p><a title="NZ Legislation" rel="noopener noreferrer" href="https://legislation.govt.nz/" target="_blank">https://legislation.govt.nz/</a></p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Non-compliance"><paragraph
    title="1.1.64.R.01."

    tags="Governance"


><![CDATA[<p>Controls for classified systems and information within the NZISM with a “MUST” or “MUST NOT” compliance requirement <span style="text-decoration: underline;"><strong>cannot</strong></span> be effectively <em>individually</em> risk managed by agencies without jeopardising their own, multi-agency or All-of-Government information assurance.</p>]]></paragraph>
<paragraph
    title="1.1.64.R.02."

    tags="Governance"


><![CDATA[<p>Controls within the NZISM with a “SHOULD” and “SHOULD NOT” requirement may be risk managed by agencies. As the individual control security risk for non-compliance is not as high as those controls with a ‘MUST’ or ‘MUST NOT’ requirement, the Accreditation Authority can consider the justification for the acceptance of risks, consider any mitigations then acknowledge and accept any residual risks.</p>]]></paragraph>
<paragraph
    title="1.1.64.R.03."

    tags="Governance"


><![CDATA[<p>Deviations from the procedures and controls in the NZISM may represent risks in themselves. It is important that governance and assurance is supported by evidence, especially where deviations from the procedures and controls in the NZISM are accepted.  In this case a formal approval or signoff by the Accreditation Authority is essential. Ultimately, the Agency Head remains accountable for the ICT risks and information security of their agency.</p>]]></paragraph>
<paragraph
    title="1.1.64.C.01."

    tags="Governance"


    classification="All Classifications"
    compliance="Must"
    cid="127"
><![CDATA[<p>System owners seeking a dispensation for non-compliance with any baseline controls in the NZISM MUST be granted a dispensation by their Accreditation Authority. Where High Assurance Cryptographic Systems (HACS) are implemented, the Accreditation Authority will be the Director-General GCSB or a formal delegate.</p>]]></paragraph>
</block>
<block title="Justification for non-compliance"><paragraph
    title="1.1.65.R.01."

    tags="Governance"


><![CDATA[<p>Without sufficient justification and consideration of security risks by the system owner when seeking a dispensation, the agency head or their authorised delegate will lack the appropriate range of information to the make an informed decision on whether to accept the security risk and grant the dispensation or not.</p>]]></paragraph>
<paragraph
    title="1.1.65.C.01."

    tags="Governance"


    classification="All Classifications"
    compliance="Must"
    cid="131"
><![CDATA[<p>System owners seeking a dispensation for non-compliance with baseline controls MUST complete an agency risk assessment which documents:</p><ul>
<li>the reason(s) for not being able to comply with this manual;</li>
<li>the effect on any of their own, multi-agency or All-of-Government system;</li>
<li>the alternative mitigation measure(s) to be implemented;</li>
<li>The strength and applicability of the alternative mitigations;</li>
<li>an assessment of the residual security risk(s); and</li>
<li>a date by which to review the decision.</li>
</ul>]]></paragraph>
</block>
<block title="Consultation on non-compliance"><paragraph
    title="1.1.66.R.01."

    tags="Governance"


><![CDATA[<p>When an agency stores information on their systems that belongs to a foreign government they have an obligation to inform and seek agreement from that third party when they do not apply all appropriate controls in the NZISM. These third parties will place reliance on the application of controls from the NZISM. If the agency fails to implement all appropriate controls, the third party will be unaware that their information may have been placed at a heightened risk of compromise. As such, the third party is denied the opportunity to consider their own additional risk mitigation measures for their information in light of the agency’s desire to risk manage controls from the NZISM.</p>]]></paragraph>
<paragraph
    title="1.1.66.R.02."

    tags="Governance"


><![CDATA[<p>Most New Zealand Government agencies will store or processes information on their systems that originates from another New Zealand Government Agency. The use of the <a title="NZ Government Security Classification System" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/classification-system/" target="_blank">NZ Government Security Classification System</a>, and implementation of its attendant handling instructions, provides assurance to the originating agency that the information is adequately safeguarded.</p>]]></paragraph>
<paragraph
    title="1.1.66.R.03."

    tags="Governance"


><![CDATA[<p>Additional controls, not described or specified in the NZISM, are welcomed as a means of improving and strengthening security of information systems, provided there are no obvious conflicts or contradictions with the controls in the NZISM. A comprehensive risk assessment of the additional controls is a valuable means of determining the effectiveness of additional controls.</p>]]></paragraph>
<paragraph
    title="1.1.66.C.01."

    tags="Governance"


    classification="All Classifications"
    compliance="Must"
    cid="137"
><![CDATA[<p>If a system processes, stores or communicates classified information from another agency, that agency MUST be consulted before a decision to be non-compliant with the <a title="NZ Government Security Classification System" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/classification-system/" target="_blank">NZ Government Security&nbsp;Classification System</a> is made.</p>]]></paragraph>
<paragraph
    title="1.1.66.C.02."

    tags="Governance"


    classification="All Classifications"
    compliance="Must"
    cid="138"
><![CDATA[<p>If a system processes, stores or communicates classified information from a foreign government, that government MUST be consulted before a decision to be non-compliant with NZISM controls is made.</p>]]></paragraph>
</block>
<block title="All-of-Government Systems"><paragraph
    title="1.1.67.R.01."

    tags="Governance"


><![CDATA[<p>All-of-Government systems, because they are connected to multiple agencies, have the potential to cause significant and widespread disruption should system failures, cyber-attacks or other incidents occur.</p>]]></paragraph>
<paragraph
    title="1.1.67.R.02."

    tags="Governance"


><![CDATA[<p>Any deviation from the baseline controls specified in the NZISM MUST be carefully considered and their implication and risk for all government systems understood and agreed by all interested parties.</p>]]></paragraph>
<paragraph
    title="1.1.67.R.03."

    tags="Governance"


><![CDATA[<p>Interested parties may include the lead agency, the Government CIO and key service providers, such as with cloud services.</p>]]></paragraph>
<paragraph
    title="1.1.67.C.01."

    tags="Governance"


    classification="All Classifications"
    compliance="Must"
    cid="143"
><![CDATA[<p>If a system processes, stores or communicates data and information with multiple agencies or forms part of an All-of-Government system, interested parties MUST be formally consulted before non-compliance with any baseline controls.</p>]]></paragraph>
</block>
<block title="Reviewing non-compliance"><paragraph
    title="1.1.68.R.01."

    tags="Governance"


><![CDATA[<p>As part of the process of providing justification for a dispensation to the Accreditation Authority, an assessment of the degree of compliance, identification of areas of non-compliance and determination of residual security risk is undertaken by the agency or lead agency. This assessment is based on the risk environment at the time the dispensation is sought. As the risk environment will continue to evolve over time it is important that agencies revisit the assessment on an annual basis and update it according to the current risk environment, and if necessary reverse any decisions to grant a dispensation if the security risk is no longer of an acceptable level.</p>]]></paragraph>
<paragraph
    title="1.1.68.C.01."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="146"
><![CDATA[<p>Agencies SHOULD review decisions to be non-compliant with any controls at least annually.</p>]]></paragraph>
</block>
<block title="Recording non-compliance"><paragraph
    title="1.1.69.R.01."

    tags="Governance"


><![CDATA[<p>Without appropriate records of decisions to risk manage controls from the NZISM, agencies have no record of the status of information security within their agency. &nbsp;Furthermore, a lack of such records will hinder any governance, compliance or auditing activities that may be conducted. &nbsp;</p>]]></paragraph>
<paragraph
    title="1.1.69.C.01."

    tags="Governance"


    classification="All Classifications"
    compliance="Must"
    cid="151"
><![CDATA[<p>Agencies MUST retain a copy and maintain a record of the supporting risk assessment and decisions to be non-compliant with any baseline controls from the NZISM.</p>]]></paragraph>
<paragraph
    title="1.1.69.C.02."

    tags="Governance"


    classification="All Classifications"
    compliance="Must"
    cid="152"
><![CDATA[<p>Where good and recommended practice controls are NOT implemented, agencies MUST record and formally recognise that non-use of any controls without due consideration may increase residual risk for the agency. This residual risk MUST be agreed and acknowledged by the Accreditation Authority.</p>]]></paragraph>
</block>
</subsection>
</section>
