<section title="4.2. Conducting Certifications"><subsection title="Objective"><paragraph
    title="4.2.1."


><![CDATA[<p>The security posture of the organisation has been incorporated into its system security design, controls are correctly implemented, are performing as intended and that changes and modifications are reviewed for any security impact or implications.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="4.2.2."


><![CDATA[<p>This section covers information on the process of undertaking a certification as part of the accreditation process for a system.</p>]]></paragraph>
</block>
<block title="Certification"><paragraph
    title="4.2.3."


><![CDATA[<p>Certification is the assertion that a given ICT system complies with minimum standards and the agreed design. It is based on a comprehensive evaluation and may involve:</p><ul>
<li>development and review of security documentation;</li>
<li>assurance over externally provided services such as Telecommunications and Cloud;</li>
<li>a physical inspection;</li>
<li>a technical review of the system and environment; and/or</li>
<li>technical testing.</li>
</ul>]]></paragraph>
<paragraph
    title="4.2.4."


><![CDATA[<p>Certification is a <strong>prerequisite</strong> for accreditation. The Accreditation Authority for a specific system MUST NOT accredit that system until all relevant certifications have been provided.</p>]]></paragraph>
</block>
<block title="Certification outcome"><paragraph
    title="4.2.5."


><![CDATA[<p>The outcome of certification is a certificate to the system owner acknowledging that the system has been appropriately audited and that the findings have been found to be of an acceptable standard.</p>]]></paragraph>
</block>
<block title="Certification authorities"><paragraph
    title="4.2.6."


><![CDATA[<p>For all agency information systems the certification authority is the CISO unless otherwise delegated by the Agency Head.</p>]]></paragraph>
<paragraph
    title="4.2.7."


><![CDATA[<p>For external organisations or service providers supporting agencies, the certification authority is the CISO of the agency.</p>]]></paragraph>
<paragraph
    title="4.2.8."


><![CDATA[<p>For multi-national, multi-agency, and AoG systems the certification authority is determined by a formal agreement between the parties involved. Within NZ this is usually the lead agency.</p>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="4.2.9."


><![CDATA[<p>Additional information relating to system auditing is contained in:</p><p>&nbsp;</p><table class="table-main">
<tbody>
<tr>
<td><strong><strong>Reference</strong></strong></td>
<td><strong>Title</strong></td>
<td style="text-align: center;"><strong>Publisher</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td><strong>ISO/IEC 27006:2015</strong></td>
<td>
<p><strong><strong><span>Information Technology – Security Techniques - Requirements for bodies providing audit and certification of information security management systems</span></strong></strong></p>
</td>
<td style="text-align: center;">
<p>ISO</p>
</td>
<td>
<p><a title="ISO/IEC 27006:2015" rel="noopener noreferrer" href="https://www.iso.org/standard/62313.html" target="_blank">https://www.iso.org/standard/62313.html</a></p>
<p>&nbsp;</p>
</td>
</tr>
<tr>
<td>
<p><strong>ISO/IEC 27007:2020&nbsp;</strong></p>
</td>
<td>
<p><strong><strong>Information Technology – Security Techniques - Guidelines for information security management systems auditing</strong></strong></p>
</td>
<td style="text-align: center;">
<p>ISO</p>
</td>
<td>
<p><a title="ISO/IEC 27007:2020" rel="noopener noreferrer" href="https://www.iso.org/standard/77802.html" target="_blank">https://www.iso.org/standard/77802.html</a></p>
<p>&nbsp;</p>
</td>
</tr>
<tr>
<td>
<p><strong>ISO 19011:2018&nbsp;</strong></p>
</td>
<td>
<p><strong><strong><span>Guidelines for auditing management systems</span></strong></strong></p>
</td>
<td style="text-align: center;">
<p>ISO</p>
</td>
<td>
<p><a title="ISO 19011:2018" rel="noopener noreferrer" href="https://www.iso.org/standard/70017.html" target="_blank">https://www.iso.org/standard/70017.html</a><a rel="noopener noreferrer" href="http://www.iso27001security.com/html/27006.html" target="_blank"></a></p>
</td>
</tr>
<tr>
<td>
<p><strong><strong>AS/NZ ISO 19011:2019</strong></strong></p>
</td>
<td>
<p><strong><strong><span><strong><strong><span><strong><strong><span>Guidelines for auditing management systems</span></strong></strong></span></strong></strong></span></strong></strong></p>
</td>
<td style="text-align: center;">
<p>Standards NZ</p>
</td>
<td>
<p><a title="Standards NZ" rel="noopener noreferrer" href="https://standards.govt.nz/" target="_blank">https://standards.govt.nz/</a></p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Certification Audit"><paragraph
    title="4.2.10.R.01."

    tags="Governance,Accreditation,Certification"


><![CDATA[<p>The purpose of a Certification Audit is to assess the actual implementation and effectiveness of controls for a system against the agency’s risk profile, security posture, design specifications, agency policies and compliance with the <a title="PSR" rel="noopener noreferrer" href="https://protectivesecurity.govt.nz/" target="_blank">Protective Security Requirements (PSR)</a>&nbsp;and in particular the relevant NZISM components.</p>]]></paragraph>
<paragraph
    title="4.2.10.R.02."

    tags="Governance,Accreditation,Certification"


><![CDATA[<p class="Normal-nonumbering">The extent and scope of the Certification Audit should consider the feasibility and cost-effectiveness of the audit against the risks and benefits of the system under review. Major or high-risk systems will require more detailed and extensive review than low-risk or minor systems.  See also Section 4.3 Conducting Audits.</p>]]></paragraph>
<paragraph
    title="4.2.10.C.01."

    tags="Governance,Accreditation,Certification"


    classification="All Classifications"
    compliance="Must"
    cid="535"
><![CDATA[<p>All systems MUST undergo an audit as part of the certification process.</p>]]></paragraph>
</block>
<block title="Certification decision"><paragraph
    title="4.2.11.R.01."

    tags="Governance,Accreditation,Certification"


><![CDATA[<p>To award certification for a system the certification authority will need to be satisfied that the selected controls are appropriate, are consistent with the <a title="PSR" rel="noopener noreferrer" href="https://protectivesecurity.govt.nz/" target="_blank">Protective Security Requirements (PSR)</a>&nbsp;and in particular the relevant NZISM components, have been properly implemented and are operating effectively.</p>]]></paragraph>
<paragraph
    title="4.2.11.R.02."

    tags="Governance,Accreditation,Certification"


><![CDATA[<p>To cater for the different responsibilities for physical and technical Certification &amp; Accreditation, separate reports and recommendations may be required.</p>]]></paragraph>
<paragraph
    title="4.2.11.R.03."

    tags="Governance,Accreditation,Certification"


><![CDATA[<p>Certification acknowledges only that controls were appropriate, properly implemented and are operating effectively. Certification does NOT imply that the residual security risk is acceptable or an approval to operate has been granted.</p>]]></paragraph>
<paragraph
    title="4.2.11.C.01."

    tags="Governance,Accreditation,Certification"


    classification="All Classifications"
    compliance="Must"
    cid="540"
><![CDATA[<p>The certification authority MUST accept that the controls are appropriate, effective and comply with the <a title="PSR" rel="noopener noreferrer" href="https://protectivesecurity.govt.nz/" target="_blank">Protective Security Requirements (PSR)</a>&nbsp;and in particular the relevant NZISM components, in order to award certification.</p>]]></paragraph>
</block>
<block title="Residual security risk assessment"><paragraph
    title="4.2.12.R.01."

    tags="Governance,Residual Risk,Risk Management,Accreditation,Certification"


><![CDATA[<p>The purpose of the residual security risk assessment is to assess the risks, controls and residual security risk relating to the operation of a system. In situations where the system is non-conformant, the system owner may have taken corrective actions. The residual risk may not be great enough to preclude a certification authority recommending to the Accreditation Authority that accreditation be awarded but the risk MUST be acknowledged and appropriate qualifications or limitations documented.</p>]]></paragraph>
<paragraph
    title="4.2.12.C.01."

    tags="Governance,Residual Risk,Risk Management,Accreditation,Certification"


    classification="All Classifications"
    compliance="Should"
    cid="543"
><![CDATA[<p>Following the audit, the certification authority SHOULD produce an assessment for the Accreditation Authority outlining the residual security risks relating to the operation of the system and a recommendation on whether to award accreditation or not.</p>]]></paragraph>
</block>
</subsection>
</section>
