<section title="5.3. Security Risk Management Plans"><subsection title="Objective"><paragraph
    title="5.3.1."


><![CDATA[<p>Security Risk Management Plans (SRMP) identify security risks and appropriate treatment measures for systems.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="5.3.2."


><![CDATA[<p>This section relates to the development of SRMPs, focusing on risks associated with the security of systems. Information relating to other mandatory documentation can be found in <a title="Documentation Fundamentals" href="http://nzism.gcsb.govt.nz/ism-document#Section-12683">Section 5.1 - Documentation Fundamentals</a>.</p>]]></paragraph>
<paragraph
    title="5.3.3."


><![CDATA[<p>SRMPs may be developed on a functional basis, systems basis or project basis. For example, where physical elements will apply to all systems is use within that agency, a single SRMP covering all physical elements is acceptable. Generally each system will require a separate SRMP.</p>]]></paragraph>
<paragraph
    title="5.3.4."


><![CDATA[<p class="NormS5C3">The agency’s risk identification and assessment process should include:</p><ul>
<li>How risks are found, recognised and described; and</li>
<li>How sources of possible risks are to be considered.</li>
</ul>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="5.3.5."


><![CDATA[<p>Information on the development of SRMPs can be found in:</p><table class="table-main">
<tbody>
<tr>
<td><strong>Reference&nbsp;</strong></td>
<td><strong>Title</strong></td>
<td style="text-align: center;"><strong>Publisher</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td><strong><strong><strong><strong>HB 436:2013</strong></strong></strong></strong></td>
<td>
<p><strong>Risk management guidelines - Companion to AS/NZS ISO 31000:2009</strong></p>
</td>
<td style="text-align: center;">Standards NZ</td>
<td><a title="Standards NZ" rel="noopener noreferrer" href="https://standards.govt.nz/" target="_blank">https://standards.govt.nz/</a><br><a rel="noopener noreferrer" href="http://www.standards.co.nz" target="_blank"></a></td>
</tr>
<tr>
<td><strong><strong><strong>ISO</strong>&nbsp;22301:2019</strong></strong></td>
<td><strong>Business Continuity</strong></td>
<td style="text-align: center;">
<p>ISO</p>
</td>
<td><a title="ISO 22301:2019" rel="noopener noreferrer" href="https://www.iso.org/standard/75106.html" target="_blank">https://www.iso.org/standard/75106.html</a></td>
</tr>
<tr>
<td><strong><strong><strong>ISO</strong>&nbsp;31000:2018</strong></strong></td>
<td><strong>Risk Management - Guidelines</strong></td>
<td style="text-align: center;">
<p>ISO</p>
</td>
<td>
<p><a title="ISO 31000:2018" rel="noopener noreferrer" href="https://www.iso.org/standard/65694.html" target="_blank">https://www.iso.org/standard/65694.html</a></p>
</td>
</tr>
<tr>
<td><strong><strong><strong>IEC</strong>&nbsp;31010:2019</strong></strong></td>
<td><strong>Risk Management – Risk Assessment Techniques</strong></td>
<td style="text-align: center;">
<p>ISO</p>
</td>
<td>
<p><a title="IEC 31010:2019" rel="noopener noreferrer" href="https://www.iso.org/standard/72140.html" target="_blank">https://www.iso.org/standard/72140.html</a></p>
</td>
</tr>
<tr>
<td><strong><strong><strong>ISO</strong>&nbsp;Guide 73:2009</strong></strong></td>
<td><strong>Risk Management &nbsp;- Vocabulary</strong></td>
<td style="text-align: center;">
<p>ISO</p>
</td>
<td>
<p><a title="ISO Guide 73:2009" rel="noopener noreferrer" href="https://www.iso.org/standard/44651.html" target="_blank">https://www.iso.org/standard/44651.html</a></p>
</td>
</tr>
<tr>
<td><strong><strong>ISO</strong>&nbsp;19011:2018</strong></td>
<td><strong>Guidelines for auditing management systems</strong></td>
<td style="text-align: center;">ISO</td>
<td><a title="ISO 19011:2018" rel="noopener noreferrer" href="https://www.iso.org/standard/70017.html" target="_blank">https://www.iso.org/standard/70017.html</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 27000:2018</strong></td>
<td><strong>Information technology - Security techniques - Information security management systems - Overview and vocabulary</strong></td>
<td style="text-align: center;">ISO</td>
<td>
<p><a title="ISO/IEC 27000:2018" rel="noopener noreferrer" href="https://www.iso.org/standard/73906.html" target="_blank">https://www.iso.org/standard/73906.html</a></p>
</td>
</tr>
<tr>
<td><strong>ISO/IEC 27001:2013</strong></td>
<td><strong>Information technology - Security techniques -&nbsp;<strong>Information security management systems - Requirements</strong></strong></td>
<td style="text-align: center;">ISO</td>
<td>
<p><a title="ISO/IEC 27001:2013" rel="noopener noreferrer" href="https://www.iso.org/standard/54534.html" target="_blank">https://www.iso.org/standard/54534.html</a></p>
</td>
</tr>
<tr>
<td><strong><strong><strong>ISO/IEC</strong>&nbsp;27005:2018</strong></strong></td>
<td><strong>Information Security Risk Management&nbsp;</strong></td>
<td style="text-align: center;">ISO</td>
<td><a title="ISO/IEC 27005:2018" rel="noopener noreferrer" href="https://www.iso.org/standard/75281.html" target="_blank">https://www.iso.org/standard/75281.html</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 27006:2015</strong></td>
<td><strong>Information technology - Security techniques - Requirements for bodies providing audit and certification of information security management systems</strong></td>
<td style="text-align: center;">ISO</td>
<td>
<p><a title="ISO/IEC 27006:2015" rel="noopener noreferrer" href="https://www.iso.org/standard/62313.html" target="_blank">https://www.iso.org/standard/62313.html</a></p>
</td>
</tr>
<tr>
<td><strong>ISO/IEC 27007:2020</strong></td>
<td><strong>Information technology - Security techniques - Guidelines for information security management systems auditing</strong></td>
<td style="text-align: center;">ISO</td>
<td>
<p><a title="ISO/IEC 27007:2020" rel="noopener noreferrer" href="https://www.iso.org/standard/77802.html" target="_blank">https://www.iso.org/standard/77802.html</a></p>
</td>
</tr>
<tr>
<td><strong>ISO/IEC TS 27008:2019</strong></td>
<td>
<p class="no-uppercase"><strong>Information technology - Security techniques - Guidelines for the assessment of information security controls</strong></p>
</td>
<td style="text-align: center;">ISO</td>
<td><a title="ISO/IEC TS 27008:2019" rel="noopener noreferrer" href="https://www.iso.org/standard/67397.html" target="_blank">https://www.iso.org/standard/67397.html</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 27017:2015</strong></td>
<td>
<p class="no-uppercase"><strong>Information technology - Security techniques - Code of practice for information security controls based on ISO/IEC 27002 for cloud services</strong></p>
</td>
<td style="text-align: center;">ISO</td>
<td><a title="ISO/IEC 27017:2015" rel="noopener noreferrer" href="https://www.iso.org/standard/43757.html" target="_blank">https://www.iso.org/standard/43757.html</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 27018:2019</strong></td>
<td><strong><strong>Information technology - Security techniques - Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors</strong></strong></td>
<td style="text-align: center;">ISO</td>
<td><a title="ISO/IEC 27018:2019" rel="noopener noreferrer" href="https://www.iso.org/standard/76559.html" target="_blank">https://www.iso.org/standard/76559.html</a><br><a rel="noopener noreferrer" href="http://www.iso.org" target="_blank"></a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Agency and system specific security risks"><paragraph
    title="5.3.6.R.01."

    tags="Governance,Information Security Documentation,SRMP"


><![CDATA[<p>While a baseline of security risks with associated levels of security risk and corresponding risk treatments are provided in this manual, agencies will almost certainly have variations to those considered during the security risk assessment. Such variations could be in the form of differing risk sources and threats, assets and vulnerabilities, or exposure and severity. In such cases an agency will need to follow its own risk management procedures to determine its risk appetite and associated risk acceptance, risk avoidance and risk tolerance thresholds. Risk owners must be identified.</p>]]></paragraph>
<paragraph
    title="5.3.6.C.01."

    tags="Governance,Information Security Documentation,SRMP"


    classification="All Classifications"
    compliance="Should"
    cid="802"
><![CDATA[<p>Agencies SHOULD determine agency and system specific security risks that could warrant additional controls to those specified in this manual.</p>]]></paragraph>
</block>
<block title="Contents of SRMPs"><paragraph
    title="5.3.7.R.01."

    tags="Governance,Information Security Documentation,SRMP"


><![CDATA[<p>Risks within an agency cannot be managed if they are not known, and if they are known, failing to treat or accept them is also a failure of risk management. For this reason SRMPs consist of two components, a security risk assessment and a corresponding treatment strategy.</p>]]></paragraph>
<paragraph
    title="5.3.7.C.01."

    tags="Governance,Information Security Documentation,SRMP"


    classification="All Classifications"
    compliance="Should"
    cid="805"
><![CDATA[<p>The Security Risk Management Plan SHOULD contain a security risk assessment and a corresponding treatment strategy.</p>]]></paragraph>
</block>
<block title="Agency risk management"><paragraph
    title="5.3.8.R.01."

    tags="Governance,Information Security Documentation,SRMP"


><![CDATA[<p>If an agency fails to incorporate SRMPs for systems into their wider agency risk management plan then the agency will be unable to manage risks in a coordinated and consistent manner across the agency.</p>]]></paragraph>
<paragraph
    title="5.3.8.C.01."

    tags="Governance,Information Security Documentation,SRMP"


    classification="All Classifications"
    compliance="Should"
    cid="808"
><![CDATA[<p>Agencies SHOULD incorporate their SRMP into their wider agency risk management plan.</p>]]></paragraph>
</block>
<block title="Risk Management standards"><paragraph
    title="5.3.9.R.01."

    tags="Governance,Information Security Documentation,Risk Management,SRMP"


><![CDATA[<p>For security risk management to be of true value to an agency there must be direct relevance to the specific circumstances of an agency and its systems, as well as being based on an industry recognised approach or risk management guidelines. For example, guidelines and standards produced by Standards New Zealand and the International Organization for Standardization.</p>
<p>The <a title="PSR" rel="noopener noreferrer" href="https://protectivesecurity.govt.nz/" target="_blank">Protective Security Requirements&nbsp;</a>requires that agencies adopt risk management approaches in accordance with <a title="ISO 31000:2018 - Risk Management Principles and Guidance" rel="noopener noreferrer" href="https://www.iso.org/standard/65694.html" target="_blank">ISO 31000:2018</a>. Refer to <a title="PSR Governance Mandatory Requirements" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/security-governance" target="_blank">PSR governance requirement GOV2</a>.</p>]]></paragraph>
<paragraph
    title="5.3.9.R.02."

    tags="Governance,Information Security Documentation,Risk Management,SRMP"


><![CDATA[<p>The <a title="ISO - International Organization for Standardisation" rel="noopener noreferrer" href="https://www.iso.org/home.html" target="_blank">International Organization for Standardization </a>has developed an international risk management standard, including principles and guidelines on implementation, outlined in <a title="ISO 31000:2018 Risk Management - Guidelines" rel="noopener noreferrer" href="https://www.iso.org/standard/65694.html" target="_blank">ISO&nbsp;31000:2018, Risk Management – Guidelines</a>. The terms and definitions for this standard can be found in <a title="ISO 31073:2022 Risk Management - Vocabulary" rel="noopener noreferrer" href="https://www.iso.org/standard/79637.html" target="_blank">ISO/IEC 31073:2022, Risk Management – Vocabulary</a>. The <a title="ISO/IEC 27000 family - Information security management systems" rel="noopener noreferrer" href="https://www.iso.org/isoiec-27001-information-security.html" target="_blank">ISO/IEC 2700x series of standards</a> also provides guidance.</p>]]></paragraph>
<paragraph
    title="5.3.9.C.01."

    tags="Governance,Information Security Documentation,Risk Management,SRMP"


    classification="All Classifications"
    compliance="Should"
    cid="812"
><![CDATA[<p>Agencies SHOULD develop their SRMP in accordance with international standards for risk management.</p>]]></paragraph>
</block>
</subsection>
</section>
