<section title="4.1. The Certification and Accreditation Process"><subsection title="Objective"><paragraph
    title="4.1.1."


><![CDATA[<p>Executives and Security Practitioners understand and enforce the use of the Certification and Accreditation (C&amp;A) process and its role in information security governance and assurance.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="4.1.2."


><![CDATA[<p>This section provides a short, high-level description of the C&amp;A process.</p>]]></paragraph>
<paragraph
    title="4.1.3."


><![CDATA[<p>This section must be read in conjunction with the Roles and Responsibilities described in <a title="Roles and responsibilities" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-12255">Chapter 3</a>. Subsequent sections of this chapter describe elements of the C&amp;A process in more detail.</p>]]></paragraph>
</block>
<block title="The Process"><paragraph
    title="4.1.4."


><![CDATA[<p>Certification and Accreditation is a fundamental governance and assurance process, designed to provide the Board, Chief Executive and senior executives confidence that information and its associated technology are well-managed, that risks are properly identified and mitigated and that governance responsibilities can demonstrably be met. It is essential for credible and effective information assurance governance.</p>]]></paragraph>
<paragraph
    title="4.1.5."


><![CDATA[<p>C&amp;A has two important stages where certification must be completed before accreditation can take place. It is based on an assessment of risk, the application of controls described in the NZISM and determination of any residual risk.</p>]]></paragraph>
<paragraph
    title="4.1.6."


><![CDATA[<p>Certification and Accreditation are separate and distinct elements, demonstrate segregation of duties and assist in managing any potential conflicts of interest. These are important attributes in good governance systems.</p>]]></paragraph>
<paragraph
    title="4.1.7."


><![CDATA[<p>The acceptance of residual risk lies with the Chief Executive of each agency, or lead agency where sector, multi-agency or All-of-Government (AoG) systems are implemented.</p>]]></paragraph>
<paragraph
    title="4.1.8."


><![CDATA[<p>An exception applies where High Assurance Cryptographic Equipment (HACE) is required or caveated or compartmented information is processed, stored or communicated. In this case the Director-General, GCSB is the Accreditation Authority.</p>]]></paragraph>
<paragraph
    title="4.1.9."


><![CDATA[<p>The complete C&amp;A process has several elements and stages, illustrated in the Block Diagram at the end of this section.</p>]]></paragraph>
</block>
<block title="Key Participants"><paragraph
    title="4.1.10."


><![CDATA[<p>There are four groups of participants:</p><ul>
<li><strong>System Owners</strong>, responsible for the design, development, system documentation and system maintenance, including any requests for recertification or reaccreditation.</li>
<li>The <strong>Certification Authority</strong>, responsible for the review of information and documentation provided by the system owner to ensure the ICT system complies with minimum standards and the agreed design.</li>
<li>The <strong>Assessor</strong> or Auditor, who will conduct inspections, audits and review as instructed by the Certification Authority.</li>
<li>The <strong>Accreditation Authority</strong> will consider the recommendation of the Certification Authority. If the level of residual risk is acceptable, the Accreditation Authority will issue the system accreditation (the formal authority to operate a system).</li>
</ul>]]></paragraph>
</block>
<block title="Certification"><paragraph
    title="4.1.11."


><![CDATA[<p>Certification is the assertion that an ICT system including any related or support services such as Telecommunications or cloud comply with the minimum standards and controls described in the NZISM, any relevant legislation and regulation and other relevant standards. It is based on a comprehensive evaluation or systems audit. This process is described in <a title="Conducting certifications" href="http://nzism.gcsb.govt.nz/ism-document#Section-12507">Section 4.2 – Conducting Certifications</a>.</p>]]></paragraph>
<paragraph
    title="4.1.12."


><![CDATA[<p>Certification is evidence that due consideration has been paid to risk, security, functionality, business requirements and is a fundamental part of information systems governance and assurance.</p>]]></paragraph>
</block>
<block title="Certification Authorities"><paragraph
    title="4.1.13."


><![CDATA[<p>For all agency information systems the certification authority is the CISO unless otherwise delegated by the Agency Head.</p>]]></paragraph>
<paragraph
    title="4.1.14."


><![CDATA[<p>For external organisations or service providers supporting agencies, the certification authority is the CISO of the agency.</p>]]></paragraph>
<paragraph
    title="4.1.15."


><![CDATA[<p>For multi-national, multi-agency, and AoG systems the certification authority is determined by a formal agreement between the parties involved. Within NZ this is usually the lead agency.</p>]]></paragraph>
</block>
<block title="Accreditation"><paragraph
    title="4.1.16."


><![CDATA[<p>Accreditation is the formal authority to operate a system, evidence that governance requirements have been addressed and that the Chief Executive has fulfilled the requirement to manage risk on behalf of the organisation and stakeholders. This element of the C&amp;A process is described in <a title="Accreditation framework" href="http://nzism.gcsb.govt.nz/ism-document#Section-12591">Section 4.4 – Accreditation Framework</a>.</p>]]></paragraph>
<paragraph
    title="4.1.17."


><![CDATA[<p>Accreditation ensures that either sufficient security measures have been put in place to protect information that is processed, stored or communicated by the system or that deficiencies in such measures have been identified, assessed and acknowledged, including the acceptance of any residual risk.</p>]]></paragraph>
</block>
<block title="Accreditation Authority"><paragraph
    title="4.1.18."


><![CDATA[<p>For agencies the Accreditation Authority is the agency head or their formally authorised delegate.</p>]]></paragraph>
<paragraph
    title="4.1.19."


><![CDATA[<p>For multi-national, multi-agency systems or AoG systems, the Accreditation Authority is determined by a formal agreement between the parties involved.</p>]]></paragraph>
<paragraph
    title="4.1.20."


><![CDATA[<p>In all cases the Accreditation Authority will be at least a senior executive who has an appropriate level of understanding of the security risks they are accepting on behalf of the agency.</p>]]></paragraph>
<paragraph
    title="4.1.21."


><![CDATA[<p>Depending on the circumstances and practices of an agency, the agency head could choose to delegate their authority to multiple senior executives who have the authority to accept security risks for the specific business functions within the agency.</p>]]></paragraph>
</block>
<block title="Conflicts of Interest"><paragraph
    title="4.1.22."


><![CDATA[<p>A conflict of interest is a situation in which a person has duties or responsibilities to more than one person, organisation or elements of a process, but is placed in a position where they cannot do justice to all. This includes, for example, when an individual's vested interests or concerns are inconsistent with organisational outcomes, or when an official has conflicting responsibilities. In the context of the C&amp;A process, a conflict of interest can occur when an individual has multiple roles, such as being both the system owner and the Accreditation Authority.</p>]]></paragraph>
<paragraph
    title="4.1.23."


><![CDATA[<p>A conflict of interest has the potential to undermine impartiality and integrity of a process and the people involved in a process. It will also undermine the integrity of governance and information assurance derived from the C&amp;A process.</p>]]></paragraph>
<paragraph
    title="4.1.24."


><![CDATA[<p>Conflicts of interest are normally managed though segregation of duties, the division of <strong>roles</strong> and <strong>responsibilities</strong> in order to reduce the ability or opportunity for an individual to compromise a critical process. Segregation of duties also reduces errors of interpretation or judgement and better manages risk.</p>]]></paragraph>
<paragraph
    title="4.1.25."


><![CDATA[<p>It is important to note that in the C&amp;A process in the NZISM, the Certification Authority, System Owner and Accreditation Authority are <em>independent</em> of each other. In smaller agencies, the Assessor may also be the Certification Authority. Ideally this role will also be segregated.</p>]]></paragraph>
</block>
<block title="Penetration Testing"><paragraph
    title="4.1.26."


><![CDATA[<p>Penetration tests are an effective method of identifying vulnerabilities in a system or network, and testing existing security measures and the implementation of controls. Penetration testing is also very useful in validating the effectiveness of the defensive mechanisms. This testing provides an increased level of assurance when system certification and accreditation is undertaken. It also demonstrates prudent risk management.</p>]]></paragraph>
<paragraph
    title="4.1.27."


><![CDATA[<p>A penetration test usually involves the use of intrusive methods or attacks conducted by trusted individuals, methods similar to those used by intruders or hackers. Care must be taken not to adversely affect normal operations while these tests are conducted.</p>]]></paragraph>
<paragraph
    title="4.1.28."


><![CDATA[<p>Organisations may conduct their own tests and regular simple tests are effective in maintaining the organisation’s security posture. Because of the level of expertise required to effectively conduct more complex testing, comprehensive penetration tests are often outsourced to specialist organisations.</p>]]></paragraph>
<paragraph
    title="4.1.29."


><![CDATA[<p>Penetration tests can range from simple scans of IP addresses in order to identify devices or systems offering services with known vulnerabilities, to exploiting known vulnerabilities that exist in an unpatched operating system, applications or other software. The results of these tests or attacks are recorded, analysed, documented and presented to the owner of the system. Any deficiencies should then be addressed.</p>]]></paragraph>
</block>
</subsection>
<subsection title="System Certification and Accreditation Diagram"><paragraph
    title="4.1.30."


><![CDATA[<p><img class="leftAlone" title="" src="assets/NZISM/4.1.30-System-Certification-and-Accreditation-Block-Diagram-updated-2020.png" alt="" width="572" height="782"></p>]]></paragraph>
 </subsection>
<subsection title="References"><paragraph
    title="4.1.31."


><![CDATA[<p>Additional information relating to systems governance, certification and accreditation can be found at:</p>
<table class="table-main" style="width: 100%;">
<tbody>
<tr>
<td style="width: 33%;"><strong>Reference</strong></td>
<td style="width: 33%;"><strong>Title</strong></td>
<td style="width: 33%; text-align: center;"><strong>Publisher</strong></td>
<td style="width: 33%;"><strong>Source</strong></td>
</tr>
<tr>
<td style="width: 33%;">&nbsp;</td>
<td style="width: 33%;">
<p><strong>Office of the Auditor-General - Managing conflicts of interest: A Guide for the public sector</strong></p>
</td>
<td style="width: 33%; text-align: center;">&nbsp;Office of the Auditor-General</td>
<td style="width: 33%;"><a title="Managing Conflicts of Interest: A guide for the public sector" rel="noopener noreferrer" href="https://oag.parliament.nz/2020/conflicts/docs/conflicts-of-interest.pdf" target="_blank">https://oag.parliament.nz/2020/conflicts/docs/conflicts-of-interest.pdf [PDF, 445 KB]</a></td>
</tr>
<tr>
<td style="width: 33%;">
<p><strong><strong>ISO/IEC 27000:2018</strong></strong></p>
</td>
<td style="width: 33%;">
<p><strong>Information technology -- Security techniques -- Information security management systems -- Overview and vocabulary</strong></p>
</td>
<td style="width: 33%; text-align: center;">ISO</td>
<td style="width: 33%;">
<p><a href="https://www.iso.org/standard/73906.html">ISO - ISO/IEC 27000:2018 - Information technology — Security techniques — Information security management systems — Overview and vocabulary</a><a title="ISO/IEC 27000:2018" rel="noopener noreferrer" href="https://www.iso.org/standard/73906.html" target="_blank"></a></p>
</td>
</tr>
<tr>
<td style="width: 33%;">
<p><strong><strong>ISO/IEC 27001:2013&nbsp;</strong></strong></p>
</td>
<td style="width: 33%;">
<p><strong>Information technology -- Security techniques -- Information security management systems -- Requirements</strong></p>
</td>
<td style="width: 33%; text-align: center;">ISO</td>
<td style="width: 33%;"><a href="https://www.iso.org/standard/54534.html">ISO - ISO/IEC 27001:2013 - Information technology — Security techniques — Information security management systems — Requirements</a></td>
</tr>
<tr>
<td style="width: 33%;">
<p><strong><strong>ISO/IEC 27002:2022</strong></strong></p>
</td>
<td style="width: 33%;"><strong><strong><span>Information security, cybersecurity, and privacy protection — Information security controls</span></strong></strong></td>
<td style="width: 33%; text-align: center;">ISO</td>
<td style="width: 33%;"><a href="https://www.iso.org/standard/75652.html">ISO - ISO/IEC 27002:2022 - Information security, cybersecurity and privacy protection — Information security controls</a></td>
</tr>
<tr>
<td style="width: 33%;">
<p><strong><strong>ISO/IEC 27006:2015</strong></strong></p>
</td>
<td style="width: 33%;">
<p><strong>Information Technology – Security Techniques - Requirements for bodies providing audit and certification of information security management systems</strong></p>
</td>
<td style="width: 33%; text-align: center;">ISO</td>
<td style="width: 33%;">
<p><a href="https://www.iso.org/standard/62313.html">ISO - ISO/IEC 27006:2015 - Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems</a><a rel="noopener noreferrer" href="http://www.standards.co.nz" target="_blank"><br></a></p>
</td>
</tr>
<tr>
<td style="width: 33%;">
<p><strong><strong>ISO/IEC 27007:2020</strong></strong></p>
</td>
<td style="width: 33%;">
<p><strong>Information Technology – Security Techniques - Guidelines for information security management systems auditing</strong></p>
</td>
<td style="width: 33%; text-align: center;">ISO</td>
<td style="width: 33%;">
<p><a href="https://www.iso.org/standard/77802.html">ISO - ISO/IEC 27007:2020 - Information security, cybersecurity and privacy protection — Guidelines for information security management systems auditing</a><a rel="noopener noreferrer" href="http://www.standards.co.nz" target="_blank"><br></a></p>
</td>
</tr>
<tr>
<td style="width: 33%;">
<p><strong><strong>NIST SP 800-37 Rev. 1, Feb 2010&nbsp;</strong></strong></p>
</td>
<td style="width: 33%;">
<p><strong>Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach</strong></p>
</td>
<td style="width: 33%; text-align: center;">NIST</td>
<td style="width: 33%;"><a title="NIST SP 800-37 Rev. 1, Feb 2010" rel="noopener noreferrer" href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-37r1.pdf" target="_blank">http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-37r1.pdf [PDF, 1.51 MB]</a></td>
</tr>
<tr>
<td style="width: 33%;"><strong><strong>NIST SP 800-171, Feb&nbsp; 2020&nbsp;</strong></strong></td>
<td style="width: 33%;"><strong>Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations</strong></td>
<td style="width: 33%; text-align: center;">NIST</td>
<td style="width: 33%;"><a title="NIST SP 800-171, Feb 2020" rel="noopener noreferrer" href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171.pdf" target="_blank">http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171r2.pdf [PDF, 880 KB]</a></td>
</tr>
<tr>
<td style="width: 33%;">&nbsp;</td>
<td style="width: 33%;">
<p><strong>Mitre Engineering Guide - Create and Assess Certification and Accreditation Strategies</strong></p>
</td>
<td style="width: 33%; text-align: center;">MITRE</td>
<td style="width: 33%;">
<p><a title="Mitre Engineering Guide - Create and Assess Certification and Accreditation Strategies" rel="noopener noreferrer" href="http://www.mitre.org/publications/systems-engineering-guide/se-lifecycle-building-blocks/test-and-evaluation/" target="_blank">http://www.mitre.org/publications/systems-engineering-guide/se-lifecycle-building-blocks/test-and-evaluation/</a></p>
</td>
</tr>
<tr>
<td style="width: 33%;">&nbsp;</td>
<td style="width: 33%;"><strong>RAND National Defense Research Institute - Implications of Aggregated DoD Information Systems for Information Assurance Certification and Accreditation</strong></td>
<td style="width: 33%; text-align: center;">&nbsp;RAND Corporation</td>
<td style="width: 33%;"><a title="RAND - Implications of Aggregated DoD Information Systems for Information Assurance Certification and Accreditation" rel="noopener noreferrer" href="http://www.rand.org/content/dam/rand/pubs/monographs/2010/RAND_MG951.pdf" target="_blank">http://www.rand.org/content/dam/rand/pubs/monographs/2010/RAND_MG951.pdf [PDF, 662 KB]</a></td>
</tr>
<tr>
<td style="width: 33%;">&nbsp;</td>
<td style="width: 33%;"><strong>An Introduction to Certification and Accreditation</strong></td>
<td style="width: 33%; text-align: center;">&nbsp;SANS Institute</td>
<td style="width: 33%;"><a rel="noopener noreferrer" href="https://www.sans.org/white-papers/1259/" target="_blank">https://www.sans.org/white-papers/1259/</a></td>
</tr>
<tr>
<td style="width: 33%;">&nbsp;</td>
<td style="width: 33%;">
<p><strong>A Certification and Accreditation Plan for Information Systems Security Programs (Evaluating the Eff)</strong></p>
</td>
<td style="width: 33%; text-align: center;">&nbsp;SANS Institute</td>
<td style="width: 33%;"><a rel="noopener noreferrer" href="https://www.sans.org/white-papers/597/" target="_blank">https://www.sans.org/white-papers/597/</a></td>
</tr>
<tr>
<td style="width: 33%;">&nbsp;</td>
<td style="width: 33%;">
<p><strong>SANS Institute InfoSec Reading Room, Conducting a Penetration Test on an Organization,</strong></p>
</td>
<td style="width: 33%; text-align: center;">&nbsp;SANS Institute</td>
<td style="width: 33%;"><a rel="noopener noreferrer" href="https://www.sans.org/white-papers/67/" target="_blank">https://www.sans.org/white-papers/67/</a></td>
</tr>
<tr>
<td style="width: 33%;">&nbsp;</td>
<td style="width: 33%;">
<p><strong>Managing Conflict of Interest in the Public Service - OECD GUIDELINES AND COUNTRY EXPERIENCES</strong></p>
</td>
<td style="width: 33%; text-align: center;">&nbsp;OECD</td>
<td style="width: 33%;"><a title="Managing Conflict of Interest in the Public Service - OECD GUIDELINES AND COUNTRY EXPERIENCES" rel="noopener noreferrer" href="http://www.oecd.org/gov/ethics/48994419.pdf" target="_blank">http://www.oecd.org/gov/ethics/48994419.pdf [PDF, 2.59 MB]</a></td>
</tr>
<tr>
<td style="width: 33%;">&nbsp;</td>
<td style="width: 33%;"><strong>Data Security Standard (DSS) Information Supplement, March 2008, PCI Security Standards Council,</strong></td>
<td style="width: 33%; text-align: center;">PCI Security Standards</td>
<td style="width: 33%;"><a title="Data Security Standard (DSS) Information Supplement" rel="noopener noreferrer" href="https://www.pcisecuritystandards.org/documents/information_supplement_11.3.pdf" target="_blank">https://www.pcisecuritystandards.org/documents/information_supplement_11.3.pdf [PDF, 1.44 MB]</a></td>
</tr>
<tr>
<td style="width: 33%;">&nbsp;</td>
<td style="width: 33%;"><strong>OWASP Top Ten for 2021</strong></td>
<td style="width: 33%; text-align: center;">OWASP</td>
<td style="width: 33%;"><a href="https://owasp.org/www-project-top-ten/">OWASP Top Ten | OWASP Foundation</a></td>
</tr>
<tr>
<td style="width: 33%;">&nbsp;</td>
<td style="width: 33%;"><strong>OWASP Web security testing guide</strong></td>
<td style="width: 33%; text-align: center;">&nbsp;OWASP</td>
<td style="width: 33%;"><a href="https://owasp.org/www-project-web-security-testing-guide/">OWASP Web Security Testing Guide | OWASP Foundation</a></td>
</tr>
<tr>
<td style="width: 33%;"><strong><strong><strong>International Standard on Assurance Engagements (ISAE)</strong>&nbsp;3402</strong></strong></td>
<td style="width: 33%;"><strong>Assurance Reports on Controls at a Service Organization</strong></td>
<td style="width: 33%; text-align: center;">International Federation of Accountants (IFAC)</td>
<td style="width: 33%;"><a rel="noopener noreferrer" href="https://www.ifac.org/system/files/downloads/b014-2010-iaasb-handbook-isae-3402.pdf" target="_blank">https://www.ifac.org/system/files/downloads/b014-2010-iaasb-handbook-isae-3402.pdf [PDF, 212 KB]</a></td>
</tr>
</tbody>
</table>
<p>&nbsp;</p>
<p>&nbsp;</p>]]></paragraph>
 </subsection>
<subsection title="PSR references"><paragraph
    title="4.1.32."


><![CDATA[<p>Relevant PSR requirements can be found at:</p>
<table class="table-grey" style="width: 102.125%;">
<tbody>
<tr>
<td style="width: 13.4876%;">
<p><strong>Reference</strong></p>
</td>
<td style="width: 33.4741%;">
<p><strong>Title</strong></p>
</td>
<td style="width: 53.0919%;"><strong>Source</strong></td>
</tr>
<tr>
<td style="width: 13.4876%;">
<p><strong>PSR Mandatory Requirements</strong></p>
</td>
<td style="width: 33.4741%;">GOV2, GOV6, GOV7, GOV8,&nbsp;INFOSEC1, INFOSEC2,&nbsp;INFOSEC3, INFOSEC4,&nbsp;PHYSEC1&nbsp;and&nbsp;PHYSEC2</td>
<td style="width: 53.0919%;">
<p><a title="PSR Home" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/" target="_blank">Home | Protective Security Requirements</a><a title="PSR" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/" target="_blank"></a></p>
<p><a title="Security Governance" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/security-governance" target="_blank">Security governance (GOV) | Protective Security Requirements</a></p>
<p><a title="Information Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/information-security" target="_blank">Information security (INFOSEC) | Protective Security Requirements</a></p>
<p><a title="Physical Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/physical-security" target="_blank">Physical security (PHYSEC) | Protective Security Requirements</a></p>
</td>
</tr>
<tr>
<td style="width: 13.4876%;">
<p><strong>PSR requirements sections</strong></p>
</td>
<td style="width: 33.4741%;">
<p>Self assessment and reporting</p>
<p>&nbsp;</p>
<p>Protective security measures</p>
</td>
<td style="width: 53.0919%;"><br>
<p><a href="https://www.protectivesecurity.govt.nz/about/self-assessment-and-reporting">Self-assessment and reporting | Protective Security Requirements</a></p>
<p><a href="https://www.protectivesecurity.govt.nz/about/compliance">Complying with the Protective Security Requirements | Protective Security Requirements</a></p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
</section>
