<section title="3.4. System Owners"><subsection title="Objective"><paragraph
    title="3.4.1."


><![CDATA[<p class="NormS3C4">All systems are allocated a <b>system owner</b> who has responsibility for the overall operation, including obtaining and maintaining any certification and accreditation, of the allocated system(s).</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="3.4.2."


><![CDATA[<p>This section covers the role that system owners undertake with respect to information security.</p>]]></paragraph>
<paragraph
    title="3.4.3."


><![CDATA[<p class="NormS3C4">System owners are responsible for the overall operation of the system, including any outsourced services such as support, telecommunications and cloud.</p>]]></paragraph>
<paragraph
    title="3.4.4."


><![CDATA[<p class="NormS3C4">System owners MUST ensure their systems are certified and accredited to meet their agency’s operational requirements and that this status in maintained.</p>]]></paragraph>
</block>
<block title="Assertions in Certification and Accreditation"><paragraph
    title="3.4.5."


><![CDATA[<p>Originating in financial auditing, assertions are now widely used as the basis for assurance processes covering a wide range of business activities and the related technology.</p>]]></paragraph>
<paragraph
    title="3.4.6."


><![CDATA[<p>Assertions are formal statements by management or system owners. They are claims on the completeness, accuracy and validity of events, presentations, disclosure, transactions and related assurance, risk and governance aspects of certification and accreditation.</p>]]></paragraph>
<paragraph
    title="3.4.7."


><![CDATA[<p>It is the responsibility of the management (or system owner) to prepare and validate assertions relating to the governance, assurance and security of information systems, in accordance with national policy and related standards.</p>]]></paragraph>
<paragraph
    title="3.4.8."


><![CDATA[<p>When such assertions are made it means management (or system owners) have presented and disclosed information appropriately giving a true, fair and balanced view of the activities. In preparing assertions, implicit and explicit claims are made on the validity and completeness of the assertions.</p>]]></paragraph>
<paragraph
    title="3.4.9."


><![CDATA[<p>Assertions are typically characterised as follows:</p><p><strong>Transactions and events</strong></p><ul>
<li>Occurrence — the activities recorded have actually taken place.</li>
<li>Completeness — all aspects are properly recorded.</li>
<li>Accuracy — the assets and activities are accurately allocated and recorded.</li>
<li>Cutoff — the activities have been recorded in the correct time period.</li>
<li>Classifications — are accurate and appropriate.</li>
</ul><p><strong>Position on project completion</strong></p><ul>
<li>Existence — assets, liabilities and equity balances exist.</li>
<li>Rights and Obligations — the entity legally controls rights to its assets and its liabilities and accurately records obligations.</li>
<li>Completeness — all aspects are properly recorded.</li>
<li>Valuation and Allocation — costs and assets appropriately valued and allocated.</li>
</ul><p><strong>Presentation and disclosure</strong></p><ul>
<li>Occurrence — the events and implementations have actually occurred.</li>
<li>Rights and Obligations — contracts, licences, support and supply agreements</li>
<li>Completeness — all disclosures have been included in the statements.</li>
<li>Classification — statements are clear and appropriately presented.</li>
<li>Accuracy and Valuation — information is disclosed at the appropriate amounts.</li>
</ul>]]></paragraph>
</block>
</subsection>
<subsection title="Rationale &amp; Controls"> <block title="Requirement for system owners"><paragraph
    title="3.4.10.R.01."

    tags="Governance"


><![CDATA[<p>The system owner is responsible for the overall operation of the system, including any directly related support or outsourced service such as cloud. They may delegate the day-to-day management and operation of the system to a system manager or managers.</p>]]></paragraph>
<paragraph
    title="3.4.10.R.02."

    tags="Governance"


><![CDATA[<p>All systems should have a system owner in order to ensure IT governance processes are followed and that business requirements are met.</p>]]></paragraph>
<paragraph
    title="3.4.10.R.03."

    tags="Governance"


><![CDATA[<p>It is strongly recommended that a system owner be a member of the Senior Executive Team or in an equivalent management position, however this does not imply that the system manager(s) should also be at such a level.</p>]]></paragraph>
<paragraph
    title="3.4.10.C.01."

    tags="Governance"


    classification="All Classifications"
    compliance="Must"
    cid="442"
><![CDATA[<p>Each system MUST have a system owner who is responsible for the operation and maintenance of the system.</p>]]></paragraph>
<paragraph
    title="3.4.10.C.02."

    tags="Governance"


    classification="All Classifications"
    compliance="Should"
    cid="443"
><![CDATA[<p>System owners SHOULD be a member of the Senior Executive Team or an equivalent management position, for large or critical agency systems.</p>]]></paragraph>
</block>
<block title="Accreditation responsibilities"><paragraph
    title="3.4.11.R.01."

    tags="Governance,Accreditation"


><![CDATA[<p>The system owner is responsible for the operation of their system and as such they need to ensure that systems are accredited to meet the agency’s operational requirements. If modifications are undertaken to a system the system owner will need to ensure that the changes are undertaken in an appropriate manner, documented adequately and that any necessary reaccreditation activities are completed.</p>]]></paragraph>
<paragraph
    title="3.4.11.C.01."

    tags="Governance,Accreditation"


    classification="All Classifications"
    compliance="Must"
    cid="446"
><![CDATA[<p>System owners MUST obtain and maintain accreditation of their system(s).</p>]]></paragraph>
</block>
<block title="Documentation responsibilities"><paragraph
    title="3.4.12.R.01."

    tags="Governance,Information Security Documentation"


><![CDATA[<p class="Normal-nonumbering">The system owner is responsible for ensuring the development, maintenance and implementation of Systems Information Security documentation, in particular the Security Risk Management Plans (SRMPs), System Security Plans (SSPs) and Standard Operating Procedures (SOPs).</p>]]></paragraph>
<paragraph
    title="3.4.12.R.02."

    tags="Governance,Information Security Documentation"


><![CDATA[<p>The system owner should involve security personnel in the process of developing, redeveloping or updating Systems Information Security documentation, to ensure that a holistic approach to information security is mapped to the system owner’s understanding of security risks for their specific system. Information security documentation is detailed in&nbsp;<a title="Information Security Documentation" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-12682">Chapter 5 - Information Security documentation</a>. Refer also to&nbsp;<a title="System Certification &amp; Accreditation" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-12459">Chapter 4 - System Certification and Accreditation</a>.</p>]]></paragraph>
<paragraph
    title="3.4.12.C.01."

    tags="Governance,Information Security Documentation"


    classification="All Classifications"
    compliance="Must"
    cid="449"
><![CDATA[<p>System owners MUST ensure the development, maintenance and implementation of complete, accurate and up to date Information Security documentation for systems under their ownership. Such actions MUST be documented.</p>]]></paragraph>
<paragraph
    title="3.4.12.C.02."

    tags="Governance,Information Security Documentation"


    classification="All Classifications"
    compliance="Must"
    cid="450"
><![CDATA[<p>System Owners MUST involve the ITSM in the redevelopment and updates of the Information Security documentation.</p>]]></paragraph>
</block>
</subsection>
</section>
