<section title="2.3. Using Cloud Services"><subsection title="Objective "><paragraph
    title="2.3.1."


><![CDATA[<p>Agencies understand and manage their cloud services to ensure they are secure, effective and efficient. </p>]]></paragraph>
 </subsection>
<subsection title="Context "> <block title="Scope "><paragraph
    title="2.3.2."


><![CDATA[<p>This section provides guidance on agency responsibilities when using cloud services. </p>]]></paragraph>
<paragraph
    title="2.3.3."


><![CDATA[<p>It is important that agencies understand their responsibilities with respect to the use of cloud services.&nbsp; Agency official and classified information, regardless of the system that it is held in (including cloud services), is still required to be protected in accordance with Cabinet directives, the&nbsp;<a title="PSR" rel="noopener noreferrer" href="https://protectivesecurity.govt.nz/" target="_blank">Protective Security Requirements&nbsp;(PSR)</a>, the NZISM, the&nbsp;<a title="NZ government classification system" rel="noopener noreferrer" href="https://protectivesecurity.govt.nz/classification-system/" target="_blank">New Zealand Government Security Classification System</a> and with other government security requirements and guidance</p>]]></paragraph>
<paragraph
    title="2.3.4."


><![CDATA[<p>Reference should also be made to the following sections in the NZISM:</p><ul>
<li><a title="System Certification &amp; Accreditation" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-12459">Chapter 4 – System Certification and Accreditation</a></li>
<li><a title="Information Security Documentation" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-12682">Chapter 5 – Information Security Documentation</a></li>
<li><a title="Decommissioning and Disposal" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-14678">Chapter 13 – Decommissioning and Disposal</a></li>
<li><a title="Access Control" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-15348">Chapter 16 – Access Control</a></li>
<li><a title="Cryptography" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-15745">Chapter 17 – Cryptography</a></li>
<li><a title="Gateway Security" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-16567">Chapter 19 – Gateway Security</a></li>
<li><a title="Data Management" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-16835">Chapter 20 – Data Management</a></li>
<li><a title="Enterprise Systems Security" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-17216">Chapter 22 – Enterprise Systems Security</a></li>
</ul>]]></paragraph>
<paragraph
    title="2.3.5."


><![CDATA[<p>Detailed controls for Cloud Computing are provided in <a title="Cloud Computing" href="http://nzism.gcsb.govt.nz/ism-document#Section-17217">Section 22.1 – Cloud Computing</a>. Detailed controls for Public Cloud services are provided in <a title="Public cloud security" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-17392">Chapter 23 - Public Cloud Security</a>.</p>]]></paragraph>
</block>
<block title="Mandates, Directives and Requirements "><paragraph
    title="2.3.6."


><![CDATA[<p>In 2012, Cabinet directed government agencies to adopt public cloud services in preference to traditional IT systems. Offshore-hosted office productivity services were excluded <strong>[CAB Min (12) 29/8A]</strong></p>]]></paragraph>
<paragraph
    title="2.3.7."


><![CDATA[<p>In August 2013, the Government introduced their approach to cloud computing, establishing a ‘cloud first’ policy and an All-of-Government direction to cloud services development and deployment. &nbsp;This is enabled by the Cabinet Minute <strong>[CAB Min (13) 37/6B]</strong>. &nbsp;Under the ‘cloud first’ policy state service agencies are expected to adopt approved cloud services either when faced with new procurements, or a contract extension decision. &nbsp;</p>]]></paragraph>
<paragraph
    title="2.3.8."


><![CDATA[<p>Cabinet also incorporated the cloud risk assessment process into the system-wide ICT assurance framework <strong>[CAB Min (13) 20/13]</strong>.</p>]]></paragraph>
<paragraph
    title="2.3.9."


><![CDATA[<p>The New Zealand Government ICT Strategy released in October 2015 requires agencies to outsource their IT functions using common capabilities and public cloud services where this was feasible and practical.</p>]]></paragraph>
<paragraph
    title="2.3.10."


><![CDATA[<p>In 2014 The Government Chief Information Officer published Cloud Computing Information Security and Privacy Considerations.  This guidance is designed to assist agencies systematically identify, analyse, and evaluate information security and privacy risks related to individual public cloud services.</p>]]></paragraph>
<paragraph
    title="2.3.11."


><![CDATA[<p>In July 2016, new measures were confirmed to accelerate the adoption of public cloud services by New Zealand’s government agencies.  The new measures complement existing policies and risk assessment processes and provide appropriate checks and balances.</p>]]></paragraph>
</block>
<block title="Background"><paragraph
    title="2.3.12."


><![CDATA[<p>The adoption of cloud technologies and services, the hosting of critical data in the cloud and the risk environment requires that agencies exercise caution.  Many cloud users are driven by the need for performance, scalability, resource sharing and cost saving so a comprehensive risk assessment is essential in identifying and managing jurisdictional, sovereignty, governance, assurance, technical and security risks.</p>]]></paragraph>
<paragraph
    title="2.3.13."


><![CDATA[<p>Security requirements and drivers in the cloud differ significantly from traditional data centre environments requiring new security models and architectures.  Key factors include:</p><ul>
<li>The dynamic nature of the cloud and its related infrastructure;</li>
<li>No customer ownership or control of infrastructure;</li>
<li>Limited visibility of architectures and transparency of operations; </li>
<li>Shared (multi-tenanted) physical and virtual environments; and</li>
<li>May require re-architecting of agency system to optimise use of cloud services.</li>
</ul>]]></paragraph>
<paragraph
    title="2.3.14."


><![CDATA[<p>While there is potential for significant benefit, flexibility and cost saving, any use of cloud services carries risk.  All cloud computing decisions should be made on a case-by-case basis after a proper risk assessment, the agency technology architecture is developed and security is properly considered and incorporated.</p>]]></paragraph>
<paragraph
    title="2.3.15."


><![CDATA[<p>There is also likely to be a significant mismatch in service-level agreements (SLAs) between existing systems and outsourcing arrangements and those of cloud-based services.</p>]]></paragraph>
<paragraph
    title="2.3.16."


><![CDATA[<p>It is important to note that although agencies can outsource operational <strong>responsibilities</strong> to a service provider for implementing, managing and maintaining security controls, they cannot outsource their <strong>accountability</strong> for ensuring their data is appropriately protected, including any system or service decommissioning or termination.</p>]]></paragraph>
<paragraph
    title="2.3.17."


><![CDATA[<p>The Government Chief Digital Officer (GCDO) has developed a risk and assurance framework for cloud computing, which agencies are required to follow when they are considering using cloud services. </p>]]></paragraph>
</block>
<block title="Information Security and Zero Trust"><paragraph
    title="2.3.18."


><![CDATA[<p>Information security relates to the protection of information regardless of its form (electronic or physical).&nbsp; Within government, information security has traditionally been construed using the concepts of confidentiality, availability and integrity of information.</p>]]></paragraph>
<paragraph
    title="2.3.19."


><![CDATA[<p class="NormS2C3">Relating these concepts to people who access, manage and use that information requires the use of methods to provide:</p><ul>
<li>Authentication;</li>
<li>Authorisation; and</li>
<li>Non-repudiation.</li>
</ul>]]></paragraph>
<paragraph
    title="2.3.20."


><![CDATA[<p>With the growth of the internet and cloud services, the proliferation of data and the growth in malicious and cyber-criminal activities, older methods of enabling information security are “fragile”, can be fragmented, and are in some cases, ineffective.</p>]]></paragraph>
<paragraph
    title="2.3.21."


><![CDATA[<p class="NormS2C3">Zero Trust is a security concept based around the idea that systems and users should not be given access to any information without verification, even when they are connected to internal networks.  Zero Trust looks to acknowledge that the previous concept and approach of using perimeter defences and providing free access within the secure perimeter is no longer practical or appropriate for securing information assets. As such, it should be replaced with robust authentication and verification steps being continuously performed.</p>]]></paragraph>
<paragraph
    title="2.3.22."


><![CDATA[<p class="NormS2C3">The concept of Zero Trust provides a more complete means of providing information security in an internet and cloud environment.  Understanding, planning for and preparing to adopt cloud services is an ideal time to incorporate Zero Trust concepts and principles into an agency’s information security policies, operations and information handling, processing storage and disposal.</p>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="2.3.23."


><![CDATA[<p class="NormS2C3">Additional guidance on cloud services can be found at:</p>
<table class="table-main">
<tbody>
<tr style="height: 44px;">
<td style="height: 44px;">
<p><strong>Reference</strong></p>
</td>
<td style="height: 44px;">
<p><strong>Title</strong></p>
</td>
<td style="text-align: center; height: 44px;"><strong>Publisher</strong></td>
<td style="height: 44px;"><strong>Source</strong></td>
</tr>
<tr style="height: 91.8px;">
<td style="height: 91.8px;">
<p><strong>CAB Min (12) 29/8A&nbsp;</strong></p>
</td>
<td style="height: 91.8px;">
<p><strong>Managing The Government’s Adoption of Cloud Computing</strong></p>
</td>
<td style="text-align: center; height: 91.8px;">
<p>Cabinet Office</p>
</td>
<td style="height: 91.8px;"><a title="CAB Min (12) 29/8A" rel="noopener noreferrer" href="https://snapshot.ict.govt.nz/resources/digital-ict-archive/static/localhost_8000/assets/Uploads/Documents/CabMin12-cloud-computing.pdf" target="_blank"></a><a title="Managing the Government’s adoption of cloud computing | NZ Digital government" rel="noopener noreferrer" href="https://digital.govt.nz/standards-and-guidance/technology-and-architecture/cloud-services/about/cabinet-minutes/august-2012-managing-government-adoption/" target="_blank">Managing the Government’s adoption of cloud computing | NZ Digital government</a><a title="CAB Min (12) 29/8A" rel="noopener noreferrer" href="https://snapshot.ict.govt.nz/resources/digital-ict-archive/static/localhost_8000/assets/Uploads/Documents/CabMin12-cloud-computing.pdf" target="_blank"></a></td>
</tr>
<tr style="height: 91.8px;">
<td style="height: 91.8px;">
<p><strong>CAB Min (13) 20/13</strong></p>
</td>
<td style="height: 91.8px;">
<p><strong>Improving Government Information and Communications Technology Assurance</strong></p>
</td>
<td style="text-align: center; height: 91.8px;">
<p><span>Cabinet Office</span></p>
</td>
<td style="height: 91.8px;"><a href="https://www.digital.govt.nz/assets/Documents/13Cabinet-Minute-Improving-Govt-ICT-Assurance.pdf">Cabinet Minute: Improving Government Information and Communications Technology (digital.govt.nz)</a></td>
</tr>
<tr style="height: 91.8px;">
<td style="height: 91.8px;">&nbsp;</td>
<td style="height: 91.8px;">
<p><strong><span>Zero Trust Maturity Model&nbsp;&nbsp;</span></strong></p>
</td>
<td style="text-align: center; height: 91.8px;">
<p><span>CISA (Cybersecurity and Infrastructure Security Agency) Cybersecurity Division</span></p>
</td>
<td style="height: 91.8px;"><a title="CISA Zero Trust Maturity model" href="https://www.cisa.gov/zero-trust-maturity-model">Zero Trust Maturity Model | CISA</a></td>
</tr>
<tr style="height: 91.8px;">
<td style="height: 91.8px;">&nbsp;</td>
<td style="height: 91.8px;">
<p><strong><span>Cloud Computing – Information Security and Privacy Considerations April 2014</span></strong></p>
</td>
<td style="text-align: center; height: 91.8px;">
<p><span>DIA</span></p>
</td>
<td style="height: 91.8px;"><a title="Cloud Computing - Information Security and Privacy Considerations April 2014" rel="noopener noreferrer" href="https://digital.govt.nz/assets/Documents/1Cloud-Computing-Information-Security-and-Privacy-Considerations-FINAL2.pdf" target="_blank">https://digital.govt.nz/assets/Documents/1Cloud-Computing-Information-Security-and-Privacy-Considerations-FINAL2.pdf [PDF, 185 KB]</a></td>
</tr>
<tr style="height: 91.8px;">
<td style="height: 91.8px;">&nbsp;</td>
<td style="height: 91.8px;">
<p><strong><span>Strategy for a Digital Public Service</span></strong></p>
</td>
<td style="text-align: center; height: 91.8px;">
<p><span>DIA</span></p>
</td>
<td style="height: 91.8px;"><a title="Government Digital Strategy" rel="noopener noreferrer" href="https://digital.govt.nz/digital-government/strategy/strategy-summary/" target="_blank">https://digital.govt.nz/digital-government/strategy/strategy-summary/</a></td>
</tr>
<tr style="height: 91.8px;">
<td style="height: 91.8px;">&nbsp;</td>
<td style="height: 91.8px;">
<p><strong><span>Accelerating the Adoption of Public Cloud Services</span></strong></p>
</td>
<td style="text-align: center; height: 91.8px;">
<p><span>DIA</span></p>
</td>
<td style="height: 91.8px;"><a title="Accelerating the Adoption of Public Cloud Services" rel="noopener noreferrer" href="https://digital.govt.nz/dmsdocument/15-accelerating-the-adoption-of-public-cloud-services/html" target="_blank">https://digital.govt.nz/dmsdocument/15-accelerating-the-adoption-of-public-cloud-services/html</a></td>
</tr>
<tr style="height: 91.8px;">
<td style="height: 91.8px;">&nbsp;</td>
<td style="height: 91.8px;">
<p><strong><span>Cloud Risk Assessment Tool [Excel Spreadsheet]</span></strong></p>
</td>
<td style="text-align: center; height: 91.8px;">
<p><span>DIA</span></p>
</td>
<td style="height: 91.8px;"><a href="https://www.digital.govt.nz/standards-and-guidance/technology-and-architecture/cloud-services/about/tool-for-assessing-risks/">Risk assessment tool for public cloud services | NZ Digital government</a></td>
</tr>
<tr style="height: 91.8px;">
<td style="height: 91.8px;">&nbsp;</td>
<td style="height: 91.8px;">
<p><strong><span>Risk Assessment Process</span></strong></p>
</td>
<td style="text-align: center; height: 91.8px;">
<p><span>DIA</span></p>
</td>
<td style="height: 91.8px;"><a title="Assess the risks of using a public cloud service" rel="noopener noreferrer" href="https://digital.govt.nz/standards-and-guidance/technology-and-architecture/cloud-services/assess-the-risks/assessment-process/" target="_blank">Assess the risks of using a public cloud service | NZ Digital government</a></td>
</tr>
<tr style="height: 91.8px;">
<td style="height: 91.8px;">&nbsp;</td>
<td style="height: 91.8px;">
<p><strong><span>Build Security Into Your Network’s DNA: The Zero Trust Network Architecture by John Kindervag&nbsp;</span></strong></p>
</td>
<td style="text-align: center; height: 91.8px;">
<p><span>Forrester</span></p>
</td>
<td style="height: 91.8px;"><a title="Build zero trust into your network&#039;s DNA" rel="noopener noreferrer" href="https://virtualstarmedia.com/downloads/Forrester_zero_trust_DNA.pdf" target="_blank">https://virtualstarmedia.com/downloads/Forrester_zero_trust_DNA.pdf [PDF 1.06 MB]</a></td>
</tr>
<tr style="height: 91.8px;">
<td style="height: 91.8px;">&nbsp;</td>
<td style="height: 91.8px;">
<p><strong><span>Zero Trust Architectures and Solutions</span></strong></p>
</td>
<td style="text-align: center; height: 91.8px;">
<p><span>Gartner</span></p>
</td>
<td style="height: 91.8px;"><a title="Zero Trust Architectures and Solutions" rel="noopener noreferrer" href="https://gartner.com/teamsiteanalytics/servePDF?g=/imagesrv/media-products/pdf/Qi-An-Xin/Qi-An-Xin-1-1OKONUN2.pdf" target="_blank">https://gartner.com/teamsiteanalytics/servePDF?g=/imagesrv/media-products/pdf/Qi-An-Xin/Qi-An-Xin-1-1OKONUN2.pdf</a></td>
</tr>
<tr style="height: 91.8px;">
<td style="height: 91.8px;"><strong>NIST SP800-207</strong></td>
<td style="height: 91.8px;">
<p><strong><span>Zero Trust Architecture</span></strong></p>
</td>
<td style="text-align: center; height: 91.8px;">
<p><span>NIST</span></p>
</td>
<td style="height: 91.8px;"><a title="NIST SP.800-207 " rel="noopener noreferrer" href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-207.pdf" target="_blank">https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-207.pdf [PDF, 944 KB]</a></td>
</tr>
<tr style="height: 91.8px;">
<td style="height: 91.8px;">&nbsp;</td>
<td style="height: 91.8px;">
<p><strong><span>Developing a Framework to improve Critical Infrastructure Cybersecurity</span></strong></p>
</td>
<td style="text-align: center; height: 91.8px;">
<p><span>NIST</span></p>
</td>
<td style="height: 91.8px;"><a title="Developing a Framework to improve Critical Infrastructure Cybersecurity" rel="noopener noreferrer" href="https://nist.gov/system/files/documents/2017/06/05/040813_forrester_research.pdf" target="_blank">https://nist.gov/system/files/documents/2017/06/05/040813_forrester_research.pdf [PDF, 430 KB]</a></td>
</tr>
<tr style="height: 91.8px;">
<td style="height: 91.8px;">&nbsp;</td>
<td style="height: 91.8px;">
<p><strong><span>Implementing a Zero Trust Architecture</span></strong></p>
</td>
<td style="text-align: center; height: 91.8px;">
<p><span>NIST/NCCoE</span></p>
</td>
<td style="height: 91.8px;"><span><a title="Implementing a Zero Trust Architecture" rel="noopener noreferrer" href="https://nccoe.nist.gov/projects/implementing-zero-trust-architecture" target="_blank">https://nccoe.nist.gov/projects/implementing-zero-trust-architecture</a>&nbsp;</span></td>
</tr>
<tr style="height: 91.8px;">
<td style="height: 91.8px;">&nbsp;</td>
<td style="height: 91.8px;">
<p><strong><span>Embracing a Zero Trust Security Model</span></strong></p>
</td>
<td style="text-align: center; height: 91.8px;">
<p><span>NSA</span></p>
</td>
<td style="height: 91.8px;"><span><a title="Embracing a Zero Trust Security Model" rel="noopener noreferrer" href="https://media.defense.gov/2021/Feb/25/2002588479/-1/-1/0/CSI_EMBRACING_ZT_SECURITY_MODEL_UOO115131-21.PDF" target="_blank">https://media.defense.gov/2021/Feb/25/2002588479/-1/-1/0/CSI_EMBRACING_ZT_SECURITY_MODEL_UOO115131-21.PDF [PDF, 643 KB]</a></span></td>
</tr>
<tr style="height: 91.8px;">
<td style="height: 91.8px;">&nbsp;</td>
<td style="height: 91.8px;">
<p><strong><span>Evolving Zero Trust – Microsoft Position Paper</span></strong></p>
</td>
<td style="text-align: center; height: 91.8px;">
<p><span>Microsoft</span></p>
</td>
<td style="height: 91.8px;"><span><a title="Evolving Zero Trust – Microsoft Position Paper" rel="noopener noreferrer" href="https://microsoft.com/en-nz/security/business/zero-trust" target="_blank">https://microsoft.com/en-nz/security/business/zero-trust</a>&nbsp;&nbsp;</span></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="PSR References "><paragraph
    title="2.3.24."


><![CDATA[<p>Additional information on third party providers is provided in the PSR.&nbsp;</p>
<table class="table-grey">
<tbody>
<tr>
<td>Reference</td>
<td>Title</td>
<td>Source</td>
</tr>
<tr>
<td><strong>PSR Mandatory Requirements</strong></td>
<td>
<p>GOV4, GOV5, INFOSEC1, INFOSEC2, PERSEC1, PERSEC2, PERSEC3 and PERSEC4</p>
</td>
<td>
<p><a title="PSR Home" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/" target="_blank">Home | Protective Security Requirements</a><a title="PSR" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/" target="_blank"></a></p>
<p><a title="Security Governance" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/security-governance" target="_blank">Security governance (GOV) | Protective Security Requirements</a></p>
<p><a title="Information Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/information-security" target="_blank">Information security (INFOSEC) | Protective Security Requirements</a></p>
<a title="Personnel Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/personnel-security" target="_blank">Personnel security (PERSEC) | Protective Security Requirements</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls "> <block title="Cloud Adoption Strategy"><paragraph
    title="2.3.25.R.01."

    tags="Cloud Computing,Governance,Public cloud security"


><![CDATA[<p>Cloud technologies require a different mindset for the delivery of ICT services, as compared to traditional agency-owned IT servers.  Increasingly, ICT will be available only in ‘as-a-service’ delivery models, which may lead to agencies adopting cloud services in an ad-hoc manner unless an overarching strategy is developed and put in place. </p>]]></paragraph>
<paragraph
    title="2.3.25.R.02."

    tags="Cloud Computing,Governance,Public cloud security"


><![CDATA[<p>This will introduce new and different risks, including:</p><ul>
<li>where information is located;</li>
<li>where it is able to be accessed from;</li>
<li>who is able to access information; and</li>
<li>how ICT services are funded and sustained.</li>
</ul>]]></paragraph>
<paragraph
    title="2.3.25.R.03."

    tags="Cloud Computing,Governance,Technical,Public cloud security"


><![CDATA[<p>Cloud providers are more likely to adopt modern security and development approaches, including agile development techniques (e.g. DevOps), Zero Trust Networking, serverless computing and continuous integration / continuous deployment (CI/CD) pipelines for automation.  These approaches are likely to be incompatible with existing ICT processes that focus on legacy delivery models and may present significant challenges to agencies that are not adequately prepared. </p>]]></paragraph>
<paragraph
    title="2.3.25.R.04."

    tags="Cloud Computing,Governance,Public cloud security"


><![CDATA[<p>Developing a strategy that outlines how an agency will look to exploit the opportunities presented by cloud while managing the risks and change required in ICT governance and management processes is essential to the successful adoption of cloud services for agencies.</p>]]></paragraph>
<paragraph
    title="2.3.25.C.01."

    tags="Cloud Computing,Governance,Public cloud security"


    classification="All Classifications"
    compliance="Must"
    cid="7045"
><![CDATA[<p>Agencies intending to adopt public cloud technologies or services MUST develop a plan for how they intend to use these services.  This plan can be standalone or part of an overarching ICT strategy.</p>]]></paragraph>
<paragraph
    title="2.3.25.C.02."

    tags="Cloud Computing,Governance,Public cloud security"


    classification="All Classifications"
    compliance="Should"
    cid="7046"
><![CDATA[<p>An agency’s cloud adoption plan SHOULD cover:</p><ul>
<li>Outcomes and benefits that the adoption of cloud technologies will bring;</li>
<li>Risks introduced or mitigated through the use of cloud, and the agency’s risk tolerance;</li>
<li>Financial and cost accounting models;</li>
<li>Shared responsibility models;</li>
<li>Cloud deployment models;</li>
<li>Cloud security strategy;</li>
<li>Resilience and recovery approaches;</li>
<li>Data recovery on contract termination;</li>
<li>Cloud exit strategy and other contractual arrangements; and</li>
<li>A high level description of the foundation services that enable cloud adoption, including:
<ul>
<li>User, device and system identity;</li>
<li>Encryption and key management;</li>
<li>Information management;</li>
<li>Logging and alerting;</li>
<li>Incident management;</li>
<li>Managing privileged activities; and</li>
<li>Cost management.</li>
</ul>
</li>
</ul>]]></paragraph>
</block>
<block title="Zero Trust"><paragraph
    title="2.3.26.R.01."

    tags="Cloud Computing,Governance,Infrastructure,Technical,Public cloud security"


><![CDATA[<p>Zero Trust is becoming the de-facto approach to ICT system security and is recommended by GCSB as the approach agencies should take, particularly as part of the adoption of cloud services.</p><p>Zero Trust is a set of principles and outcomes, not an architecture or a solution.  You cannot ‘buy’ Zero Trust.</p><p>Zero Trust is compatible with other ICT outcomes, such as improved access to information, increased agility and better security.</p><p>Key aspects of Zero Trust focus on:</p><ul>
<li>Visibility (through telemetry) and analytics of how services are functioning – this comes through as focus on monitoring, event gathering and machine learning based analysis; and</li>
<li>Automation of service delivery and security actions.</li>
</ul>]]></paragraph>
<paragraph
    title="2.3.26.R.02."

    tags="Cloud Computing,Governance,Infrastructure,Technical,Public cloud security"


><![CDATA[<p>Public cloud services are often built following Zero Trust principles, and agencies will find adoption of this approach will lead to more successful security outcomes than trying to recreate legacy perimeter security controls in the cloud.</p>]]></paragraph>
<paragraph
    title="2.3.26.C.01."

    tags="Cloud Computing,Governance,Infrastructure,Technical,Public cloud security"


    classification="All Classifications"
    compliance="Should"
    cid="7049"
><![CDATA[<p>Agencies intending to adopt public cloud technologies or services SHOULD incorporate Zero Trust philosophies and concepts.</p>]]></paragraph>
<paragraph
    title="2.3.26.C.02."

    tags="Cloud Computing,Governance,Infrastructure,Technical,Public cloud security"


    classification="All Classifications"
    compliance="Should"
    cid="7050"
><![CDATA[<p>Agencies SHOULD leverage public cloud environment native security services as part of legacy system migrations, in preference to recreating application architectures that rely on legacy perimeter controls for security.</p>]]></paragraph>
</block>
<block title="Risk Assessment"><paragraph
    title="2.3.27.R.01."

    tags="Cloud Computing,Governance,Risk Assessment,Public cloud security"


><![CDATA[<p>The adoption of cloud technologies will introduce a wide range of technology and information system risks <em>in addition</em> to the risks that already exist for agency systems. It is vital that these additional risks are identified and assessed in order to select appropriate controls and countermeasures. Trust boundaries must be defined to assist in determining effective controls and where these controls can best be applied. The geographic location of agency data should be identified as this may include offshore data centres.</p>]]></paragraph>
<paragraph
    title="2.3.27.C.01."

    tags="Cloud Computing,Governance,Risk Assessment,Public cloud security"


    classification="All Classifications"
    compliance="Must"
    cid="255"
><![CDATA[<p>Agencies intending to adopt cloud technologies or services MUST conduct a comprehensive risk assessment, in accordance with the guidance provided by the Government Chief Digital Officer (GCDO) before implementation or adoption.</p>]]></paragraph>
<paragraph
    title="2.3.27.C.02."

    tags="Cloud Computing,Governance,Risk Assessment,Public cloud security"


    classification="All Classifications"
    compliance="Must"
    cid="256"
><![CDATA[<p>Agencies MUST ensure cloud risks for any cloud service adopted are identified, understood and formally accepted by the Agency Head or Chief Executive and the agency’s Accreditation Authority.</p>]]></paragraph>
</block>
<block title="Security Architecture"><paragraph
    title="2.3.28.R.01."

    tags="Cloud Computing,Governance,Risk Assessment,Public cloud security"


><![CDATA[<p>The adoption of cloud technologies will introduce a wide range of technology and information system risks in <em>addition</em> to the risks that already exist for agency systems.&nbsp; It is vital that these additional risks are identified and assessed in order to select appropriate controls and countermeasures.</p>]]></paragraph>
<paragraph
    title="2.3.28.C.01."

    tags="Cloud Computing,Governance,Risk Assessment,Public cloud security"


    classification="All Classifications"
    compliance="Should"
    cid="259"
><![CDATA[<p>Agencies intending to adopt cloud services SHOULD review and enhance existing security architectures and systems design to prudently manage the changed risk, technology and security environment in adopting cloud services.</p>]]></paragraph>
</block>
<block title="Selection of Services"><paragraph
    title="2.3.29.R.01."

    tags="Cloud Computing,Governance,Risk Assessment,Public cloud security"


><![CDATA[<p>A number of cloud related service, contracts and other arrangements have been negotiated on behalf of the New Zealand Government with a number of cloud service providers. Agencies must consider these services before negotiating individual contracts or supply contract with cloud service providers.</p>]]></paragraph>
<paragraph
    title="2.3.29.C.01."

    tags="Cloud Computing,Governance,Risk Assessment,Public cloud security"


    classification="All Classifications"
    compliance="Must"
    cid="4935"
><![CDATA[<p>Agencies MUST consider the use of any All of Government contracts with cloud service providers before negotiating individual contracts.</p>]]></paragraph>
</block>
<block title="System Decommissioning and Contract Termination"><paragraph
    title="2.3.30.R.01."

    tags="Cloud Computing,Governance,Risk Management,Public cloud security"


><![CDATA[<p>It is important that agencies understand how and where their data is processed, managed, stored, backed up and archived within the cloud service provider’s environment (systems architecture). &nbsp;This may result in multiple copies of agency data in several data centres, possibly also in several countries.</p>]]></paragraph>
<paragraph
    title="2.3.30.R.02."

    tags="Cloud Computing,Governance,Risk Management,Public cloud security"


><![CDATA[<p>When an agency system or service is decommissioned or a service provider’s contract terminated, it is important that agencies ensure data is returned to the agency and no copies are retained by the service provider.</p>]]></paragraph>
<paragraph
    title="2.3.30.C.01."

    tags="Cloud Computing,Governance,Risk Management,Public cloud security"


    classification="All Classifications"
    compliance="Should"
    cid="263"
><![CDATA[<p>Agency system architectures and supply arrangements and contracts SHOULD include provision for the safe return of agency data in the event of system or service termination or contract termination.</p>]]></paragraph>
</block>
</subsection>
</section>
