<section title="3.2. The Chief Information Security Officer"><subsection title="Objective"><paragraph
    title="3.2.1."


><![CDATA[<p>The Chief Information Security Officer (CISO) sets the strategic direction for information security within their agency.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="3.2.2."


><![CDATA[<p>This section covers the role of a CISO with respect to information security within an agency.</p>]]></paragraph>
</block>
<block title="Appointing a CISO"><paragraph
    title="3.2.3."


><![CDATA[<p>The requirement to appoint a member of the Senior Executive Team or an equivalent management position, to the role of CISO does not require a new dedicated position be created in each agency.</p>]]></paragraph>
<paragraph
    title="3.2.4."


><![CDATA[<p>The introduction of the CISO role and associated responsibilities is aimed at providing a more meaningful title for a subset of the security executive’s responsibilities that relate to information security within their agency.</p>]]></paragraph>
<paragraph
    title="3.2.5."


><![CDATA[<p>The CISO should bring accountability and credibility to information security management and appointees should be suitably qualified and experienced.</p>]]></paragraph>
<paragraph
    title="3.2.6."


><![CDATA[<p class="NormS3C2">Where multiple roles are held by the CISO, conflicts of interest may occur particularly where operational imperatives conflict with security requirements.  Good governance and assurance practices separates these roles.  Where multiple roles are held by an individual, potential conflicts of interest should be clearly identified and a mechanism implemented to allow independent decision making in areas where conflict can occur.</p>]]></paragraph>
</block>
</subsection>
<subsection title="PSR references"><paragraph
    title="3.2.7."


><![CDATA[<p>Relevant PSR requirements can be found at:</p>
<table class="table-grey">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td>
<p><strong>PSR Mandatory Requirements</strong></p>
</td>
<td>
<p>GOV1, GOV3, GOV4, GOV8,&nbsp;INFOSEC1, INFOSEC2, INFOSEC4,&nbsp;PERSEC1, PERSEC2,&nbsp;PERSEC3, and&nbsp;PERSEC4</p>
</td>
<td>
<p><a title="PSR Home" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/" target="_blank">Home | Protective Security Requirements</a><a title="PSR" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/" target="_blank"></a></p>
<p><a title="Security Governance" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/security-governance" target="_blank">Security governance (GOV) | Protective Security Requirements</a></p>
<p><a title="Information Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/information-security" target="_blank">Information security (INFOSEC) | Protective Security Requirements</a></p>
<a title="Personnel Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/personnel-security" target="_blank">Personnel security (PERSEC) | Protective Security Requirements</a></td>
</tr>
<tr>
<td>
<p><strong>PSR requirements sections</strong></p>
</td>
<td>
<p>Self-assessment &amp; reporting</p>
<p>&nbsp;</p>
<p>Protective security roles &amp; responsibilities</p>
<p>&nbsp;</p>
</td>
<td>
<p><a href="https://www.protectivesecurity.govt.nz/about/self-assessment-and-reporting">Self-assessment and reporting | Protective Security Requirements</a></p>
<a href="https://www.protectivesecurity.govt.nz/about/roles-and-responsibilities">Roles and responsibilities | Protective Security Requirements</a><br><br></td>
</tr>
</tbody>
</table>
<p class="NormS3C2">&nbsp;</p>
<p>&nbsp;</p>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Requirement for a CISO"><paragraph
    title="3.2.8.R.01."

    tags="Governance"


><![CDATA[<p class="Normal-nonumbering">The role of the CISO is based on industry and governance good practice, and relevant international standards, and has been introduced to ensure that information security is managed at the senior executive level within agencies.  Without a CISO there is a risk that an agency may not be resourced to effectively manage information security.</p>]]></paragraph>
<paragraph
    title="3.2.8.R.02."

    tags="Governance"


><![CDATA[<p>The CISO within an agency is responsible predominately for facilitating communications between security personnel, ICT personnel and business personnel to ensure alignment of business and security objectives within the agency.</p>]]></paragraph>
<paragraph
    title="3.2.8.R.03."

    tags="Governance"


><![CDATA[<p>The CISO is also responsible for providing strategic level guidance for the agency security program and ensuring compliance with national policy, standards, regulations and legislation.</p>]]></paragraph>
<paragraph
    title="3.2.8.R.04."

    tags="Governance"


><![CDATA[<p class="Normal-nonumbering">Where multiple roles are held by the CISO, potential conflicts of interest should be identified and carefully managed so the agency is not disadvantaged. </p>]]></paragraph>
<paragraph
    title="3.2.8.R.05."

    tags="Governance"


><![CDATA[<p class="Normal-nonumbering">Conflicts of interest may also be apparent where the agency outsources the CISO function and that CISO deals with other vendors and organisations. In particular required availability, response times and related operational criteria should be identified and carefully managed to ensure the agency is not disadvantaged.</p>]]></paragraph>
<paragraph
    title="3.2.8.C.01."

    tags="Governance"


    classification="All Classifications"
    compliance="Must"
    cid="307"
><![CDATA[<p>The CISO MUST be:</p><ul>
<li>cleared for access to all classified information processed by the agency’s systems, and</li>
<li>able to be briefed into any compartmented information on the agency’s systems.</li>
</ul>]]></paragraph>
<paragraph
    title="3.2.8.C.02."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="308"
><![CDATA[<p>Agencies SHOULD appoint a person to the role of CISO or have the role undertaken by an existing person within the agency.</p>]]></paragraph>
<paragraph
    title="3.2.8.C.03."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="309"
><![CDATA[<p>The CISO role SHOULD be undertaken by a member of the Senior Executive Team or an equivalent management position.</p>]]></paragraph>
<paragraph
    title="3.2.8.C.04."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="310"
><![CDATA[<p>The CISO SHOULD be responsible for overseeing the management of security personnel within the agency.</p>]]></paragraph>
<paragraph
    title="3.2.8.C.05."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="311"
><![CDATA[<p class="Normal-nonumbering">Where multiple roles are held by the CISO any potential conflicts of interest SHOULD be identified and carefully managed.</p>]]></paragraph>
</block>
<block title="Responsibilities – Reporting"><paragraph
    title="3.2.9.R.01."

    tags="Governance"


><![CDATA[<p>As the CISO is responsible for the overall management of information security within an agency it is important that they report directly to the agency head on any information security issues.</p>]]></paragraph>
<paragraph
    title="3.2.9.C.01."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="314"
><![CDATA[<p>The CISO SHOULD report directly to the agency head on matters of information security within the agency.</p>]]></paragraph>
</block>
<block title="Responsibilities – Security programs"><paragraph
    title="3.2.10.R.01."

    tags="Governance"


><![CDATA[<p>Without a comprehensive strategic level information security and security risk management program an agency will lack high-level direction on information security issues and may expose the agency to unnecessary risk.</p>]]></paragraph>
<paragraph
    title="3.2.10.R.02."

    tags="Governance"


><![CDATA[<p class="Normal-nonumbering">Working with system owners, assessors and accreditors will facilitate the determination of appropriate information security policies consistent with agency strategies, the requirements of the PSR and in particular the NZISM.</p>]]></paragraph>
<paragraph
    title="3.2.10.C.01."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="317"
><![CDATA[<p>The CISO SHOULD develop and maintain a comprehensive strategic level information security and security risk management program within the agency aimed at protecting the agency’s official and classified information.</p>]]></paragraph>
<paragraph
    title="3.2.10.C.02."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="318"
><![CDATA[<p>The CISO SHOULD be responsible for the development of an information security communications plan.</p>]]></paragraph>
<paragraph
    title="3.2.10.C.03."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="319"
><![CDATA[<p>The CISO SHOULD create and facilitate the agency security risk management process.</p>]]></paragraph>
<paragraph
    title="3.2.10.C.04."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="7084"
><![CDATA[<p>The CISO SHOULD work with system owners, system certifiers and system accreditors to determine appropriate information security policies for their systems and ensure consistency with the&nbsp;<a title="PSR" rel="noopener noreferrer" href="https://protectivesecurity.govt.nz/" target="_blank">Protective Security Requirements (PSR)</a> and in particular the relevant NZISM components.</p>]]></paragraph>
</block>
<block title="Responsibilities – Ensuring compliance"><paragraph
    title="3.2.11.R.01."

    tags="Governance"


><![CDATA[<p>Without having a person responsible for ensuring compliance with the information security policies and standards within the agency, security measures of the agency are unlikely to meet minimum government requirements and may expose the agency to unnecessary risk.</p>]]></paragraph>
<paragraph
    title="3.2.11.C.01."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="322"
><![CDATA[<p>The CISO SHOULD be responsible for establishing mechanisms and programs to ensure compliance with the information security policies and standards within the agency.</p>]]></paragraph>
<paragraph
    title="3.2.11.C.02."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="323"
><![CDATA[<p class="Normal-nonumbering">The CISO SHOULD be responsible for ensuring agency compliance with the NZISM through facilitating a continuous program of certification and accreditation of all agency systems.</p>]]></paragraph>
<paragraph
    title="3.2.11.C.03."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="324"
><![CDATA[<p>The CISO SHOULD be responsible for the implementation of information security measurement metrics and key performance indicators within the agency.</p>]]></paragraph>
</block>
<block title="Responsibilities – Coordinating security"><paragraph
    title="3.2.12.R.01."

    tags="Governance"


><![CDATA[<p>One of the core roles of the CISO is to ensure appropriate communication between business and information security teams within their agency. This includes interpreting information security concepts and language into business concepts and language as well as ensuring that business teams consult with information security teams to determine appropriate security measures when planning new business projects for the agency.</p>]]></paragraph>
<paragraph
    title="3.2.12.C.01."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="327"
><![CDATA[<p>The CISO SHOULD facilitate information security and business alignment and communication through an information security steering committee or advisory board which meets formally and on a regular basis, and comprises key business and ICT executives.</p>]]></paragraph>
<paragraph
    title="3.2.12.C.02."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="328"
><![CDATA[<p>The CISO SHOULD be responsible for coordinating information security and security risk management projects between business and information security teams.</p>]]></paragraph>
<paragraph
    title="3.2.12.C.03."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="329"
><![CDATA[<p>The CISO SHOULD work with business teams to facilitate security risk analysis and security risk management processes, including the identification of acceptable levels of risk consistently across the agency.</p>]]></paragraph>
</block>
<block title="Responsibilities – Working with ICT projects"><paragraph
    title="3.2.13.R.01."

    tags="Governance"


><![CDATA[<p>As the CISO is responsible for the development of the strategic level information security program within an agency they are best placed to advise ICT projects on the strategic direction of information security within the agency.</p>]]></paragraph>
<paragraph
    title="3.2.13.R.02."

    tags="Governance"


><![CDATA[<p>As the CISO is responsible for the overall management of information security within an agency, they are best placed to recommend to the accreditation authority the acceptance of residual security risks associated with the operation of agency systems.</p>]]></paragraph>
<paragraph
    title="3.2.13.C.01."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="333"
><![CDATA[<p>The CISO SHOULD provide strategic level guidance for agency ICT projects and operations.</p>]]></paragraph>
<paragraph
    title="3.2.13.C.02."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="334"
><![CDATA[<p class="Normal-nonumbering">The CISO SHOULD liaise with agency technology architecture teams to ensure alignment between security and agency architectures.</p>]]></paragraph>
</block>
<block title="Responsibilities – Working with vendors"><paragraph
    title="3.2.14.R.01."

    tags="Governance"


><![CDATA[<p>Having the CISO coordinate the use of external information security resources will ensure that a consistent approach is being applied across the agency.</p>]]></paragraph>
<paragraph
    title="3.2.14.C.01."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="337"
><![CDATA[<p>The CISO SHOULD coordinate the use of external information security resources to the agency including contracting and managing the resources.</p>]]></paragraph>
</block>
<block title="Responsibilities – Budgeting"><paragraph
    title="3.2.15.R.01."

    tags="Governance"


><![CDATA[<p>Controlling the information security budget will ensure that the CISO has sufficient access to funding to support information security projects and initiatives.</p>]]></paragraph>
<paragraph
    title="3.2.15.C.01."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="341"
><![CDATA[<p>The CISO SHOULD be responsible for controlling the information security budget.</p>]]></paragraph>
</block>
<block title="Responsibilities – Information security incidents "><paragraph
    title="3.2.16.R.01."

    tags="Governance"


><![CDATA[<p>To ensure that the CISO is able to accurately report to the Agency Head on information security issues within their agency, it is important that they remain fully aware of all information security incidents within their agency.</p>]]></paragraph>
<paragraph
    title="3.2.16.C.01."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="345"
><![CDATA[<p>The CISO SHOULD be fully aware of all information security incidents within the agency.</p>]]></paragraph>
</block>
<block title="Responsibilities – Disaster recovery"><paragraph
    title="3.2.17.R.01."

    tags="Governance"


><![CDATA[<p>Restoring business-critical services to an operational state after a disaster is an important function of business continuity. As such it will need high level support from the CISO.</p>]]></paragraph>
<paragraph
    title="3.2.17.C.01."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="348"
><![CDATA[<p>The CISO SHOULD coordinate the development of disaster recovery policies and standards within the agency to ensure that business-critical services are supported appropriately and that information security is maintained in the event of a disaster.</p>]]></paragraph>
</block>
<block title="Responsibilities – Training"><paragraph
    title="3.2.18.R.01."

    tags="Governance"


><![CDATA[<p>To ensure personnel within an agency are actively contributing to the information security posture of the agency, an information security awareness and training program will need to be developed. As the CISO is responsible for information security within the agency they will need to oversee the development and operation of the program.</p>]]></paragraph>
<paragraph
    title="3.2.18.C.01."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="351"
><![CDATA[<p>The CISO SHOULD be responsible for overseeing the development and operation of information security awareness and training programs within the agency.</p>]]></paragraph>
</block>
<block title="Responsibilities – Providing security knowledge"><paragraph
    title="3.2.19.R.01."

    tags="Governance"


><![CDATA[<p>The CISO is not expected to be a technical expert on all information security matters; however, knowledge of national and international standards and good practice will assist in communicating with technical experts within their agency on information security matters</p>]]></paragraph>
<paragraph
    title="3.2.19.C.01."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="354"
><![CDATA[<p>The CISO SHOULD provide authoritative security advice and have familiarity with a range of national and international standards and good practice.</p>]]></paragraph>
</block>
</subsection>
</section>
