<section title="5.1. Documentation Fundamentals"><subsection title="Objective"><paragraph
    title="5.1.1."


><![CDATA[<p>Information security documentation is produced for systems, to support and demonstrate good governance.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="5.1.2."


><![CDATA[<p>This section is an overview of the information security documentation that each agency will need to develop. More specific information on each document can be found in subsequent sections of this chapter.</p>]]></paragraph>
<paragraph
    title="5.1.3."


><![CDATA[<p>While this section describes a number of different but essential documents, it may be more advantageous and efficient to provide agency wide documentation for some elements (for example Physical Security) which can then be re-used for all agency systems.</p>]]></paragraph>
<paragraph
    title="5.1.4."


><![CDATA[<p>Similarly some consolidation may be appropriate, for example, SOPs IRPs and EPs can easily be combined into a single document.</p><p class="NormS5C1">Note: For smaller agencies and smaller systems it is acceptable that all documentation elements are combined into a single document provided each documentation element is clearly identifiable.</p><p class="NormS5C1">Note: Agencies may choose to name the documentation in different terms. This is acceptable provided the required level of detail is captured.&nbsp; Naming conventions presented in the NZISM are not mandatory.</p>]]></paragraph>
</block>
<block title="Information Security Documentation"><paragraph
    title="5.1.5."


><![CDATA[<p>Information Security Documentation requirements are summarised in the table below.</p><table class="table-main">
<tbody>
<tr>
<td><strong>Title</strong></td>
<td><strong>Abbreviation</strong></td>
<td><strong>Reference</strong></td>
</tr>
<tr>
<td>
<p><strong>Information Security Policy (incorporates the vulnerability disclosure policy)</strong></p>
</td>
<td>
<p>SecPol</p>
<p>VDP</p>
</td>
<td>
<p><a title="Information security policy" href="http://nzism.gcsb.govt.nz/ism-document#Block-12696">5.1.7</a></p>
<p><a title="Vulnerability disclosure policy" href="http://nzism.gcsb.govt.nz/ism-document#Section-12947">5.9</a></p>
</td>
</tr>
<tr>
<td><strong>Systems Architecture</strong></td>
<td>-</td>
<td><a title="Systems architecture" href="http://nzism.gcsb.govt.nz/ism-document#Block-12699">5.1.8</a></td>
</tr>
<tr>
<td>
<p><strong>Security Risk Management Plan</strong></p>
</td>
<td>SRMP</td>
<td>
<p><a title="Security risk management plan" href="http://nzism.gcsb.govt.nz/ism-document#Block-12703">5.1.9</a></p>
</td>
</tr>
<tr>
<td>
<p><strong>System Security Plan</strong></p>
</td>
<td>SSP</td>
<td><a title="System security plan" href="http://nzism.gcsb.govt.nz/ism-document#Block-12706">5.1.10</a></td>
</tr>
<tr>
<td><strong>Site Security Plan</strong></td>
<td>SitePlan</td>
<td><a title="Site security plan" href="http://nzism.gcsb.govt.nz/ism-document#Block-13278">8.2.7</a></td>
</tr>
<tr>
<td><strong>Standard Operating Procedures</strong></td>
<td>
<p>SOPs</p>
</td>
<td>
<p><a title="SOPs" href="http://nzism.gcsb.govt.nz/ism-document#Block-12709">5.1.11</a></p>
</td>
</tr>
<tr>
<td>
<p><strong>Incident Response Plan</strong></p>
</td>
<td>IRP</td>
<td>
<p><a title="Incident response plan" href="http://nzism.gcsb.govt.nz/ism-document#Block-12712">5.1.12</a></p>
</td>
</tr>
<tr>
<td>
<p><strong>Emergency Procedures</strong></p>
</td>
<td>EP</td>
<td>
<p><a title="Emergency Procedures" href="http://nzism.gcsb.govt.nz/ism-document#Block-12716">5.1.13</a></p>
</td>
</tr>
<tr>
<td>
<p><strong>Independent Assurance reports for externally provided services</strong></p>
</td>
<td>-</td>
<td>
<p><a title="Independent assurance reports" href="http://nzism.gcsb.govt.nz/ism-document#Section-12847">5.8</a></p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
</block>
</subsection>
<subsection title="PSR references"><paragraph
    title="5.1.6."


><![CDATA[<p>Additional information on third party providers is provided in the PSR.&nbsp;</p>
<table class="table-grey mceItemTable">
<tbody>
<tr>
<td>Reference</td>
<td>Title</td>
<td>Source</td>
</tr>
<tr>
<td><strong>PSR Mandatory Requirements</strong></td>
<td>
<p>GOV4, GOV5, INFOSEC1, INFOSEC2, PERSEC1, PERSEC2, PERSEC3 and PERSEC4</p>
</td>
<td>
<p><a title="PSR Home" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz" target="_blank">Home | Protective Security Requirements<br></a></p>
<p><a title="Security Governance" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/security-governance" target="_blank">Security governance (GOV) | Protective Security Requirements</a></p>
<p><a title="Information Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/information-security" target="_blank">Information security (INFOSEC) | Protective Security Requirements</a></p>
<a title="Personnel Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/personnel-security" target="_blank">Personnel security (PERSEC) | Protective Security Requirements</a></td>
</tr>
</tbody>
</table>
<p>&nbsp;</p>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Information Security Policy (SecPol)"><paragraph
    title="5.1.7.R.01."

    tags="Governance,Information Security Documentation"


><![CDATA[<p>The SecPol is an essential part of information security documentation as it outlines the high-level policy objectives. The SecPol can form part of the overall agency security policy.</p>]]></paragraph>
<paragraph
    title="5.1.7.C.01."

    tags="Governance,Information Security Documentation"


    classification="All Classifications"
    compliance="Must"
    cid="692"
><![CDATA[<p>Agencies MUST have a SecPol for their agency. The SecPol is usually sponsored by the Chief Executive and managed by the CISO or Chief Information Officer (CIO). The ITSM should be the custodian of the SecPol. The SecPol should include an acceptable use policy for any agency technology equipment, systems, resources and data.</p>]]></paragraph>
</block>
<block title="Systems Architecture"><paragraph
    title="5.1.8.R.01."

    tags="Governance,Information Security Documentation"


><![CDATA[<p>The systems architecture illustrates the design of the system (including any outsourced services), consistency with the SecPol and provides the basis for the Security Risk Management Plan (SRMP).</p>]]></paragraph>
<paragraph
    title="5.1.8.R.02."

    tags="Governance,Information Security Documentation"


><![CDATA[<p>In this context Systems Architecture includes Security Architecture.</p>]]></paragraph>
<paragraph
    title="5.1.8.C.01."

    tags="Governance,Information Security Documentation"


    classification="All Classifications"
    compliance="Must"
    cid="696"
><![CDATA[<p>All systems MUST have a documented Systems Architecture.</p>]]></paragraph>
</block>
<block title="Security Risk Management Plan (SRMP)"><paragraph
    title="5.1.9.R.01."

    tags="Governance,Information Security Documentation"


><![CDATA[<p>The SRMP is considered to be a good practice approach to identifying and reducing identified security risks. Depending on the documentation framework chosen, multiple systems can refer to, or build upon, a single SRMP.</p>]]></paragraph>
<paragraph
    title="5.1.9.C.01."

    tags="Governance,Information Security Documentation"


    classification="All Classifications"
    compliance="Must"
    cid="699"
><![CDATA[<p>Agencies MUST ensure that every system is covered by a Security Risk Management Plan, which includes identification of <span style="text-decoration: underline;">risk owners</span>.</p>]]></paragraph>
</block>
<block title="System Security Plan (SSP)"><paragraph
    title="5.1.10.R.01."

    tags="Governance,Information Security Documentation"


><![CDATA[<p>The SSP describes the implementation and operation of controls within the system derived from the NZISM and the SRMP. Depending on the documentation framework chosen, some details common to multiple systems can be consolidated in a higher level SSP.</p>]]></paragraph>
<paragraph
    title="5.1.10.C.01."

    tags="Governance,Information Security Documentation"


    classification="All Classifications"
    compliance="Must"
    cid="702"
><![CDATA[<p>Agencies MUST ensure that every system is covered by a SSP.</p>]]></paragraph>
</block>
<block title="Standard Operating Procedures (SOPs)"><paragraph
    title="5.1.11.R.01."

    tags="Governance,Information Security Documentation,SOPs"


><![CDATA[<p>SOPs provide step-by-step guides to undertaking information security related tasks and processes. They provide assurance that tasks can be undertaken in a secure and repeatable manner, even by system users without strong technical knowledge of the system’s mechanics. Depending on the documentation framework chosen, some procedures common to multiple systems could be consolidated into a higher level SOP.</p>]]></paragraph>
<paragraph
    title="5.1.11.C.01."

    tags="Governance,Information Security Documentation,SOPs"


    classification="All Classifications"
    compliance="Must"
    cid="705"
><![CDATA[<p>Agencies MUST ensure that Standard Operating Procedures (SOPs) are developed for systems.</p>]]></paragraph>
</block>
<block title="Incident Response Plan (IRP)"><paragraph
    title="5.1.12.R.01."

    tags="Governance,Information Security Documentation,Incident Management,IRP"


><![CDATA[<p>The purpose of developing an IRP is to ensure that information security incidents are appropriately managed. In most situations the aim of the response will be to contain the incident and prevent the information security incident from escalating. The preservation of any evidence relating to the information security incident for criminal, forensic and process improvement purposes is also an important consideration.</p>]]></paragraph>
<paragraph
    title="5.1.12.C.01."

    tags="Governance,Information Security Documentation,Incident Management,IRP"


    classification="All Classifications"
    compliance="Must"
    cid="708"
><![CDATA[<p>Agencies MUST develop an Incident Response Plan and supporting procedures.</p>]]></paragraph>
<paragraph
    title="5.1.12.C.02."

    tags="Governance,Information Security Documentation,Incident Management,IRP"


    classification="All Classifications"
    compliance="Must"
    cid="709"
><![CDATA[<p>Agency personnel MUST be trained in and periodically exercise the Incident Response Plan.</p>]]></paragraph>
</block>
<block title="Emergency Procedures (EP)"><paragraph
    title="5.1.13.R.01."

    tags="Governance,Information Security Documentation,Emergency Procedures"


><![CDATA[<p>Classified information and systems are secured if a building emergency or evacuation is required.</p>]]></paragraph>
<paragraph
    title="5.1.13.C.01."

    tags="Governance,Information Security Documentation,Emergency Procedures"


    classification="All Classifications"
    compliance="Should"
    cid="712"
><![CDATA[<p>Agencies SHOULD document procedures relating to securing classified information and systems when required to evacuate a facility in the event of an emergency.</p>]]></paragraph>
</block>
<block title="Developing content"><paragraph
    title="5.1.14.R.01."

    tags="Governance,Information Security Documentation"


><![CDATA[<p>Ensuring personnel developing information security documentation are sufficiently knowledgeable of information security issues and business requirements will assist in achieving the most useful and accurate set of documentation.</p>]]></paragraph>
<paragraph
    title="5.1.14.C.01."

    tags="Governance,Information Security Documentation"


    classification="All Classifications"
    compliance="Should"
    cid="715"
><![CDATA[<p>Agencies SHOULD ensure that information security documentation is developed by personnel with a good understanding of policy requirements, the subject matter, essential processes and the agency’s business and operations</p>]]></paragraph>
</block>
<block title="Documentation content"><paragraph
    title="5.1.15.R.01."

    tags="Governance,Information Security Documentation"


><![CDATA[<p>As the SRMP, Systems Architecture, SSP, SOPs and IRP are developed as a documentation suite for a system it is essential that they are logically connected and consistent within themselves and with other agency systems. Furthermore, each documentation suite developed for a system will need to be consistent with the agency’s overarching SecPol.</p>]]></paragraph>
<paragraph
    title="5.1.15.C.01."

    tags="Governance,Information Security Documentation"


    classification="All Classifications"
    compliance="Should"
    cid="718"
><![CDATA[<p>Agencies SHOULD ensure that their SRMP, Systems Architecture, SSP, SOPs and IRP are logically connected and consistent for each system, other agency systems and with the agency’s SecPol.</p>]]></paragraph>
</block>
<block title="Documentation framework"><paragraph
    title="5.1.16.R.01."

    tags="Governance,Information Security Documentation"


><![CDATA[<p>The implementation of an overarching information security document framework ensures that all documentation is accounted for, complete and maintained appropriately. Furthermore, it can be used to describe linkages between documents, especially when higher level documents are used to avoid repetition of information in lower level documents.</p>]]></paragraph>
<paragraph
    title="5.1.16.C.01."

    tags="Governance,Information Security Documentation"


    classification="All Classifications"
    compliance="Should"
    cid="721"
><![CDATA[<p>Agencies SHOULD create and maintain an overarching document describing the agency’s documentation framework, including a complete listing of all information security documentation that shows a document hierarchy and defines how each document is related to the other.</p>]]></paragraph>
<paragraph
    title="5.1.16.C.02."

    tags="Governance,Information Security Documentation"


    classification="All Classifications"
    compliance="Should"
    cid="722"
><![CDATA[<p>Where an agency lacks an existing, well-defined documentation framework, they SHOULD use the document names defined in this manual.</p>]]></paragraph>
</block>
<block title="Documentation Consistency"><paragraph
    title="5.1.17.R.01."

    tags="Governance,Information Security Documentation"


><![CDATA[<p>Consistency in approach, terminology and documentation simplifies the use and interpretation of documentation for different systems and agencies.</p>]]></paragraph>
<paragraph
    title="5.1.17.R.02."

    tags="Governance,Information Security Documentation"


><![CDATA[<p>Factors which should be taken into account when determining the classification of systems documentation include:</p><ul>
<li>Highest classification of information stored, processed or communicated over that system;</li>
<li>Sensitivity including existence of the facility;</li>
<li>Inclusion of vulnerability information, security mechanisms or special processing capability in the systems documentation;</li>
<li>Potential data aggregation;</li>
<li>Risk and threat levels; and</li>
<li>Scope and use of the system.</li>
</ul>]]></paragraph>
<paragraph
    title="5.1.17.C.01."

    tags="Governance,Information Security Documentation"


    classification="All Classifications"
    compliance="Should"
    cid="726"
><![CDATA[<p>Where an agency uses alternative documentation names to those defined within this manual for their information security documentation they SHOULD convert the documentation names to those used in this manual.</p>]]></paragraph>
</block>
<block title="Documentation Classification"><paragraph
    title="5.1.18.R.01."

    tags="Governance,Information Security Documentation"


><![CDATA[<p>Systems documentation will usually reflect the importance or sensitivity of particular systems.</p>]]></paragraph>
<paragraph
    title="5.1.18.C.01."

    tags="Governance,Information Security Documentation"


    classification="All Classifications"
    compliance="Must"
    cid="729"
><![CDATA[<p>Agencies MUST ensure that their SecPol, SRMP, SSP, SOPs and IRP are appropriately classified.</p>]]></paragraph>
</block>
<block title="Outsourcing development of content"><paragraph
    title="5.1.19.R.01."

    tags="Governance,Information Security Documentation"


><![CDATA[<p>Agencies outsourcing the development of information security documentation need to be aware of the contents of the documentation produced. As such, they will still need to review and control the documentation contents to make sure it is appropriate and meets their requirements.</p>]]></paragraph>
<paragraph
    title="5.1.19.C.01."

    tags="Governance,Information Security Documentation"


    classification="All Classifications"
    compliance="Should"
    cid="732"
><![CDATA[<p>When information security documentation development is outsourced, agencies SHOULD:</p><ul>
<li>review the documents for suitability;</li>
<li>retain control over the content; and</li>
<li>ensure that all policy requirements are met.</li>
</ul>]]></paragraph>
</block>
<block title="Obtaining formal sign-off"><paragraph
    title="5.1.20.R.01."

    tags="Governance,Information Security Documentation"


><![CDATA[<p>Without appropriate sign-off of information security documentation within an agency, the security personnel will have a reduced ability to ensure appropriate security procedures are selected and implemented. Having sign-off at an appropriate level assists in reducing this security risk as well as ensuring that senior management is aware of information security issues and security risks to the agency’s business.</p>]]></paragraph>
<paragraph
    title="5.1.20.C.01."

    tags="Governance,Information Security Documentation"


    classification="All Classifications"
    compliance="Should"
    cid="735"
><![CDATA[<p>All information security documentation SHOULD be formally approved and signed off by a person with an appropriate level of seniority and authority.</p>]]></paragraph>
<paragraph
    title="5.1.20.C.02."

    tags="Governance,Information Security Documentation"


    classification="All Classifications"
    compliance="Should"
    cid="736"
><![CDATA[<p>Agencies SHOULD ensure that:</p><ul>
<li>all high-level information security documentation is approved by the CISO and the agency head or their delegate; and</li>
<li>all system-specific documents are reviewed by the ITSM and approved by the system owner.</li>
</ul>]]></paragraph>
</block>
<block title="Documentation Maintenance"><paragraph
    title="5.1.21.R.01."

    tags="Governance,Information Security Documentation"


><![CDATA[<p>The threat environment and agencies’ businesses are dynamic. If an agency fails to keep their information security documentation up to date to reflect the changing environment, they do not have a means of ascertaining that their security measures and processes continue to be effective.</p>]]></paragraph>
<paragraph
    title="5.1.21.R.02."

    tags="Governance,Information Security Documentation"


><![CDATA[<p>Changes to risk and technology may dictate a reprioritisation of resources in order to maximise the effectiveness of security measures and processes.</p>]]></paragraph>
<paragraph
    title="5.1.21.C.01."

    tags="Governance,Information Security Documentation"


    classification="All Classifications"
    compliance="Should"
    cid="767"
><![CDATA[<p>Agencies SHOULD develop a regular schedule for reviewing all information security documentation.</p>]]></paragraph>
<paragraph
    title="5.1.21.C.02."

    tags="Governance,Information Security Documentation"


    classification="All Classifications"
    compliance="Should"
    cid="768"
><![CDATA[<p>Agencies SHOULD ensure that information security documentation is reviewed:</p><ul>
<li>at least annually; or</li>
<li>in response to significant changes in the environment, business or system; and</li>
<li>with the date of the most recent review being recorded on each document.</li>
</ul>]]></paragraph>
</block>
</subsection>
</section>
