<section title="4.5. Conducting Accreditations"><subsection title="Objective"><paragraph
    title="4.5.1."


><![CDATA[<p>As a governance good practice, systems are accredited before they are used operationally.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="4.5.2."


><![CDATA[<p>This section covers information accreditation processes.</p>]]></paragraph>
</block>
<block title="Accreditation aim"><paragraph
    title="4.5.3."


><![CDATA[<p>The aim of accreditation is to give formal recognition and acceptance of the residual security risk to a system and the information it processes, stores or communicates as part of the agency’s governance arrangements.</p>]]></paragraph>
</block>
<block title="Accreditation outcome"><paragraph
    title="4.5.4."


><![CDATA[<p>The outcome of accreditation is an approval to operate issued by the Accreditation Authority to the system owner.</p>]]></paragraph>
</block>
<block title="Accreditation Authorities"><paragraph
    title="4.5.5."


><![CDATA[<p>For agencies the Accreditation Authority is the agency head or their formally authorised delegate.</p>]]></paragraph>
<paragraph
    title="4.5.6."


><![CDATA[<p>For organisations supporting agencies the Accreditation Authority is the head of the supported agency or their authorised delegate.</p>]]></paragraph>
<paragraph
    title="4.5.7."


><![CDATA[<p>For multi-national and multi-agency systems the Accreditation Authority is determined by a formal agreement between the parties involved.</p>]]></paragraph>
<paragraph
    title="4.5.8."


><![CDATA[<p>For agencies with systems that process, store or communicate endorsed or compartmented information, or the use of High Assurance Cryptographic Equipment (HACE), the Director-General GCSB is the Accreditation Authority.</p>]]></paragraph>
<paragraph
    title="4.5.9."


><![CDATA[<p>In all cases the Accreditation Authority will be at least a senior executive who has an appropriate level of understanding of the security risks they are accepting on behalf of the agency.</p>]]></paragraph>
<paragraph
    title="4.5.10."


><![CDATA[<p>Depending on the circumstances and practices of an agency, the agency head could choose to delegate their authority to multiple senior executives who have the authority to accept security risks for the specific business functions within the agency, for example the CISO and the system owner.</p>]]></paragraph>
<paragraph
    title="4.5.11."


><![CDATA[<p>More information on the delegation of the agency head’s authority can be found in <a title="Agency Head" href="http://nzism.gcsb.govt.nz/ism-document#Section-12256">Section 3.1 - Agency Head</a>.</p>]]></paragraph>
</block>
<block title="Accreditation outcomes"><paragraph
    title="4.5.12."


><![CDATA[<p>Accreditation is awarded when the systems comply with the NZISM, the Accreditation Authority understands and accepts the residual security risk relating to the operation of the system and the Accreditation Authority gives formal approval for the system to operate.</p>]]></paragraph>
<paragraph
    title="4.5.13."


><![CDATA[<p>In some cases the Accreditation Authority may not accept the residual security risk relating to the operation of the system. This outcome is predominately caused by security risks being insufficiently considered and documented within the SRMP resulting in an inaccurate scoping of security measures within the SSP. In such cases the Accreditation Authority may request that the SRMP and SSP be amended and security measures reassessed before accreditation is awarded.</p>]]></paragraph>
<paragraph
    title="4.5.14."


><![CDATA[<p>In awarding accreditation for a system the Accreditation Authority may choose to define a reduced timeframe before reaccreditation, less than that specified in this manual, or place restrictions on the use of the system which are enforced until reaccreditation or until changes are made to the system within a specified timeframe.</p>]]></paragraph>
</block>
<block title="Exception for undertaking certification"><paragraph
    title="4.5.15."


><![CDATA[<p>In exceptional circumstances the Accreditation Authority may elect not to have a certification conducted on a system before making an accreditation decision. The test to be satisfied in such circumstances is that if the system is not operated immediately it would have a devastating and potentially long lasting effect on the operations of the agency. This exception MUST be formally recorded and accepted.</p>]]></paragraph>
<paragraph
    title="4.5.16."


><![CDATA[<p>Certification MUST occur as soon as possible as this is an essential part of the governance and assurance mechanism.</p>]]></paragraph>
</block>
</subsection>
<subsection title="Rationale &amp; Controls"> <block title="Certification"><paragraph
    title="4.5.17.R.01."

    tags="Governance,Accreditation,Certification"


><![CDATA[<p>Certification is an essential component of the governance and assurance process and assists and supports risk management.</p>]]></paragraph>
<paragraph
    title="4.5.17.C.01."

    tags="Governance,Accreditation,Certification"


    classification="All Classifications"
    compliance="Must"
    cid="666"
><![CDATA[<p>All systems MUST be certified as part of the accreditation process.</p>]]></paragraph>
</block>
<block title="Accreditation decision"><paragraph
    title="4.5.18.R.01."

    tags="Governance,Accreditation"


><![CDATA[<p>In order to determine the agency’s security posture, a system accreditation:</p><ul>
<li>examines the risks to systems identified in the certification process;</li>
<li>reviews the controls applied to manage those risks; and then</li>
<li>determines the acceptability of any residual risk.</li>
</ul>]]></paragraph>
<paragraph
    title="4.5.18.R.02."

    tags="Governance,Accreditation"


><![CDATA[<p>The accreditation process should also examine compliance with national policy, relevant international standards and good practice so that residual risk is managed prudently and pragmatically.</p>]]></paragraph>
<paragraph
    title="4.5.18.R.03."

    tags="Governance,Accreditation"


><![CDATA[<p>It is especially important that All-of-Government systems and effects on systems of other agencies are also considered in the examination of risk and determination of residual risk.</p>]]></paragraph>
<paragraph
    title="4.5.18.R.04."

    tags="Governance,Accreditation"


><![CDATA[<p>To assist in making an accreditation decision the Accreditation Authority may choose to review:</p><ul>
<li>Information Security Documentation as described in Chapter 5;</li>
<li>any interaction with systems of other agencies or All-of-Government systems;</li>
<li>compliance audit reports;</li>
<li>the accreditation recommendation from the certification authority;</li>
<li>supporting documentation for any decisions to be non-compliant with any controls specified in this manual; </li>
<li>any additional security risk reduction strategies that have been implemented; and</li>
<li>any third party reviews or assurance reports available.</li>
</ul>]]></paragraph>
<paragraph
    title="4.5.18.R.05."

    tags="Governance,Accreditation"


><![CDATA[<p>The Accreditation Authority may also choose to seek the assistance of one or more technical experts in understanding the technical components of information presented to them during the accreditation process to assist in making an informed accreditation decision.</p>]]></paragraph>
<paragraph
    title="4.5.18.C.01."

    tags="Governance,Accreditation"


    classification="All Classifications"
    compliance="Must"
    cid="673"
><![CDATA[<p>The Accreditation Authority MUST accept the residual security risk relating to the operation of a system in order to award accreditation.</p>]]></paragraph>
<paragraph
    title="4.5.18.C.02."

    tags="Governance,Accreditation"


    classification="All Classifications"
    compliance="Must"
    cid="674"
><![CDATA[<p>The Accreditation Authority MUST advise other agencies where the accreditation decision may affect those agencies.</p>]]></paragraph>
<paragraph
    title="4.5.18.C.03."

    tags="Governance,Accreditation"


    classification="All Classifications"
    compliance="Must"
    cid="675"
><![CDATA[<p>The Accreditation Authority MUST advise the GCDO where the accreditation decision may affect any All-of-Government systems.</p>]]></paragraph>
</block>
</subsection>
</section>
