<section title="2.2. Non-Government Engagement and Outsourcing"><subsection title="Objective"><paragraph
    title="2.2.1."


><![CDATA[<p>Non-government organisations handling classified information implement the same information security and protective measures as government agencies.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="2.2.2."


><![CDATA[<p>This section covers information on outsourcing information technology services and functions to contractors and commercial entities as well as providing those partners with necessary classified information in order to undertake their contracted duties.</p>]]></paragraph>
</block>
<block title="Cloud computing"><paragraph
    title="2.2.3."


><![CDATA[<p>Cloud computing is a form of outsourcing information technology services and functions usually over the Internet.  The requirements within this section for outsourcing equally apply to providers of cloud computing services.</p>]]></paragraph>
</block>
</subsection>
<subsection title="PSR References"><paragraph
    title="2.2.4."


><![CDATA[<p>Additional information on third party service providers is supplied in the PSR.</p>
<table class="table-grey">
<tbody>
<tr>
<td>Reference</td>
<td>Title</td>
<td>Source</td>
</tr>
<tr>
<td><strong>PSR Mandatory Requirements</strong></td>
<td>GOV4, GOV5, INFOSEC1, INFOSEC2, PERSEC1, PERSEC2, PERSEC3, and PERSEC4</td>
<td>
<p><a title="PSR Home" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/" target="_blank">Home | Protective Security Requirements</a><a title="PSR" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/" target="_blank"></a></p>
<p><a title="Security Governance" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/security-governance" target="_blank">Security governance (GOV) | Protective Security Requirements</a></p>
<p><a title="Information Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/information-security" target="_blank">Information security (INFOSEC) | Protective Security Requirements</a></p>
<a title="Personnel Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/personnel-security" target="_blank">Personnel security (PERSEC) | Protective Security Requirements</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Outsourcing information technology services and functions"><paragraph
    title="2.2.5.R.01."

    tags="Governance"


><![CDATA[<p>In the context of this section, outsourcing is defined as contracting an outside entity to provide essential business functions and processes that could be undertaken by the Agency itself.</p><p>Outsourcing may present elevated levels of risk and additional risks. Outsourcing therefore, requires greater consideration, demonstrable governance, and higher levels of assurance before committing to such contracts.</p>]]></paragraph>
<paragraph
    title="2.2.5.R.02."

    tags="Governance"


><![CDATA[<p>A distinction is drawn between important business functions and the purchase of services such as power, water, building maintenance, stationery and telecommunications. These services are not usually provided by the agency itself.</p><p>Purchased services, as identified above, do NOT require accreditation or a third party review as defined in the NZISM. However, normal contract due diligence should be exercised before committing to these supply contracts.</p>]]></paragraph>
<paragraph
    title="2.2.5.R.03."

    tags="Governance"


><![CDATA[<p>Contractors can be provided with classified information as long as their systems are accredited to an appropriate classification in order to process, store and communicate that information. Contractors and all staff with access to the classified systems must also be cleared to the level of the information being processed. This ensures that when they are provided with classified information that it receives an appropriate level of protection.</p>]]></paragraph>
<paragraph
    title="2.2.5.R.04."

    tags="Governance"


><![CDATA[<p>New Zealand, in common with most developed countries, has agreements with other nations on information exchange on a variety of topics, including arms control, border control, biosecurity, policing and national security. The lead agency in each sector will usually be the controlling agency for each agreement. While the detail and nature of these agreements is sometimes classified, the agreements invariably require the protection of any information provided, to the level determined by the originator. Agencies that receive such information will be fully briefed by the relevant controlling agency or authority, before information is provided. It is important to note that there is no single list or source of such agreements.</p>]]></paragraph>
<paragraph
    title="2.2.5.C.01."

    tags="Governance"


    classification="All Classifications"
    compliance="Must"
    cid="216"
><![CDATA[<p>Agencies engaging industry for the provision of off-site information technology services and functions MUST accredit the systems used by the contractor to at least the same minimum standard as the agency’s systems. This may be achieved through a third party review report utilising the ISAE 3402 Assurance Reports on Controls at a Third Party Service Organisation.</p>]]></paragraph>
<paragraph
    title="2.2.5.C.02."

    tags="Governance"


    classification="All Classifications"
    compliance="Should Not"
    cid="217"
><![CDATA[<p>Agencies SHOULD NOT engage industry for the provision of off-site information technology services and functions in countries that New Zealand does not have a multilateral or bilateral security agreement with for the protection of classified information of the government of New Zealand. If there is any doubt, the agency’s CISO should be consulted.</p>]]></paragraph>
</block>
<block title="Independence of ITSMs from outsourced companies"><paragraph
    title="2.2.6.R.01."

    tags="Governance"


><![CDATA[<p>If an agency engages an organisation for the provision of information technology services and functions, and where that organisation also provides the services of an Information Technology Security Manager, they need to ensure that there is no actual or perceived conflict of interest (See also <a title="ITSM" href="http://nzism.gcsb.govt.nz/ism-document#Section-12348">Section 3.3 - Information Technology Security Manager</a>).</p>]]></paragraph>
<paragraph
    title="2.2.6.R.02."

    tags="Governance"


><![CDATA[<p>When an agency engages a company for the provision of information technology services and functions having a central point of contact for information security matters within the company will greatly assist with incident response and reporting procedures.</p>]]></paragraph>
<paragraph
    title="2.2.6.C.01."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="221"
><![CDATA[<p>Where an agency has outsourced information technology services and functions, any ITSMs within the agency SHOULD be independent of the company providing the information technology services and functions.</p>]]></paragraph>
<paragraph
    title="2.2.6.C.02."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="222"
><![CDATA[<p>Where an agency has outsourced information technology services and functions, they SHOULD ensure that the outsourced organisation provides a single point of contact within the organisation for all information assurance and security matters.</p>]]></paragraph>
</block>
<block title="Developing a contractor management program"><paragraph
    title="2.2.7.R.01."

    tags="Governance"


><![CDATA[<p>The development of a contractor management program will assist the agency in undertaking a coordinated approach to the engagement and use of contractors for outsourcing and provision of information technology services and functions.</p>]]></paragraph>
<paragraph
    title="2.2.7.C.01."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="225"
><![CDATA[<p class="Normal-nonumbering">Agencies SHOULD develop a program to manage contractors that have been accredited for the provision of off-site information technology services and functions.</p>]]></paragraph>
</block>
</subsection>
</section>
