<section title="5.2. Information Security Policies"><subsection title="Objective"><paragraph
    title="5.2.1."


><![CDATA[<p>Information security policies (SecPol) set the strategic direction for information security.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="5.2.2."


><![CDATA[<p>This section relates to the development of Information Security Policies and any supporting plans. Information relating to other mandatory documentation can be found in <a title="Documentation fundamentals" href="http://nzism.gcsb.govt.nz/ism-document#Section-12683">Section 5.1 - Documentation Fundamentals</a>.</p>]]></paragraph>
</block>
</subsection>
<subsection title="Rationale &amp; Controls"> <block title="The Information Security Policy (SecPol)"><paragraph
    title="5.2.3.R.01."

    tags="Governance,Information Security Documentation"


><![CDATA[<p>To provide consistency in approach and documentation, agencies should consider the following when developing their SecPol:</p><ul>
<li>policy objectives;</li>
<li>how the policy objectives will be achieved;</li>
<li>the guidelines and legal framework under which the policy will operate;</li>
<li>stakeholders;</li>
<li>education and training;</li>
<li>what resourcing will be available to support the implementation of the policy; </li>
<li>what performance measures will be established to ensure that the policy is being implemented effectively; and</li>
<li>a review cycle.</li>
</ul>]]></paragraph>
<paragraph
    title="5.2.3.R.02."

    tags="Governance,Information Security Documentation"


><![CDATA[<p>In developing the contents of the SecPol, agencies may also consult any agency-specific directives that are applicable to information security within their agency.</p>]]></paragraph>
<paragraph
    title="5.2.3.R.03."

    tags="Governance,Information Security Documentation"


><![CDATA[<p>Agencies should also avoid outlining controls for systems within their SecPol. The controls for a system will be determined by this manual and based on the scope of the system, along with any additional controls as determined by the SRMP, and documented within the SSP.</p>]]></paragraph>
<paragraph
    title="5.2.3.C.01."

    tags="Governance,Information Security Documentation"


    classification="All Classifications"
    compliance="Should"
    cid="780"
><![CDATA[<p>The Information Security Policy (SecPol) SHOULD document the information security guidelines, standards and responsibilities of an agency.</p>]]></paragraph>
<paragraph
    title="5.2.3.C.02."

    tags="Governance,Information Security Documentation"


    classification="All Classifications"
    compliance="Should"
    cid="781"
><![CDATA[<p>The Information Security Policy (SecPol) SHOULD include topics such as:</p><ul>
<li>accreditation processes;</li>
<li>personnel responsibilities;</li>
<li>configuration control;</li>
<li>access control;</li>
<li>networking and connections with other systems;</li>
<li>physical security and media control;</li>
<li>emergency procedures and information security incident management;</li>
<li>vulnerability disclosure;</li>
<li>change management; and</li>
<li>information security awareness and training.</li>
</ul>]]></paragraph>
</block>
</subsection>
</section>
