<section title="5.8. Independent Assurance Reports"><subsection title="Objective"><paragraph
    title="5.8.1."

    tags="Governance"


><![CDATA[<p>To provide assurance to System Owners, Certifiers, Practitioners and Accreditors and to assist system designers, enterprise and security architects where assurance reviews cannot be directly undertaken on service providers.</p>]]></paragraph>
 </subsection>
<subsection title="Context "> <block title="Scope"><paragraph
    title="5.8.2."


><![CDATA[<p>Independent assurance reports are also variously referred to as third party assurance reporting, third party reviews, attestation reports and SAS 70 reports. It is important to note that SAS 70 has been superseded by the ISAE 3402 and SSAE 16 standards encompassing Type I and 2 and SOC 1, 2 and 3 reports. For reviews conducted in New Zealand the ISAE (NZ) 3402 or ISAE (NZ) 3000 standards are used. These various standards and report types are discussed later in this section. Agencies are likely to encounter a variety of report types, depending on the country of residence or country of jurisdiction of the service provider, or the geographic location of the data centre.</p>]]></paragraph>
</block>
<block title="Purpose"><paragraph
    title="5.8.3."


><![CDATA[<p>Many organisations are outsourcing key components of their business such as telecommunications, data storage and cloud based services. Managing third-party relationships is particularly challenging with services provided from outside New Zealand. The global nature of these services and the global nature of associated risks must be recognised by organisations. As outsourced services are becoming more integrated with organisation’s operations, they will have a larger impact on organisation’s governance, assurance and control frameworks. It is important to note that risk ownership and accountability remains with agencies and respective risk owners, even when responsibility for specific functions have been outsourced.</p>]]></paragraph>
<paragraph
    title="5.8.4."


><![CDATA[<p>Independent assurance reports provide customers and other interested parties with information on policies, procedures and controls related to the service provider’s internal frameworks, control objectives and controls in cases where physical inspections and reviews by customers are impractical or not feasible. Service providers may also use the findings of such reports for their own purposes. These reports are used to understand the adequacy and effectiveness of the service provider’s frameworks, control objectives, controls and implementation of controls. They allow:</p><ul>
<li>Business owners to identify and understand the risks associated with the service delivery;</li>
<li>System owners to more fully assess system risks;</li>
<li>System designers and security architects to make informed judgements on system structures, controls, defensive measures, and enterprise integration; and</li>
<li>Regulators, certifiers and accreditors to obtain assurance over the service providers internal control structures and assess the suitability of system structures, controls and defensive measures.</li>
</ul>]]></paragraph>
<paragraph
    title="5.8.5."


><![CDATA[<p>An independent assurance review or third-party audit is invariably undertaken by independent auditors who are not employees of the service provider or their customers. There are two common types of independent third-party reviews: attestation reviews and direct non-attestation reviews.</p>]]></paragraph>
<paragraph
    title="5.8.6."


><![CDATA[<p>Attestation reviews, such as an ISAE 3402 review (see below), are generally conducted by accounting or consulting organisations and are based upon recognised attestation standards issued by professional bodies such as the American Institute of Certified Public Accountants (AICPA) or the New Zealand External Reporting Board (XRB).</p>]]></paragraph>
<paragraph
    title="5.8.7."


><![CDATA[<p>Direct or non-attestation reviews include those performed by IT consultants or others and may not follow standards referred to previously. They may be based upon other external standards or industry developed criteria such as ISO 2700x, ISACA’s COBIT, the IIA, NIST, or the Cloud Security Alliance (CSA).</p>]]></paragraph>
</block>
<block title="Assurance"><paragraph
    title="5.8.8."


><![CDATA[<p>Assurance is derived from an assessment of:</p><ul>
<li>A description of the service provider’s business and control environment;</li>
<li>Terms and conditions of the service contract or other legally binding agreement;</li>
<li>Assertions supplied by the service provider (self-assessments);</li>
<li>An independent validation of service provider assertions;</li>
<li>Independent testing of controls implementation and effectiveness;</li>
<li>Assurance in the service design and security architecture; and</li>
<li>Assurance in the service components.</li>
</ul>]]></paragraph>
<paragraph
    title="5.8.9."


><![CDATA[<p>In general terms, the more ICT services that are outsourced in an agency, the less direct control and visibility the CE and management have over enterprise operations. Therefore, there is an increased reliance on assurance reporting from suppliers.  Unless this is recognised in service contracts or legal agreements, agencies may find they are unable to obtain sufficient levels of assurance over the business services and enterprise operations.</p>]]></paragraph>
</block>
</subsection>
<subsection title="Assurance Standards and schemes"> <block title="ISAE (NZ) 3000"><paragraph
    title="5.8.10."


><![CDATA[<p>ISAE (NZ) 3000 (Revised) is issued by the External Reporting Board (XRB) of the New Zealand Audit and Assurance Standards Board and is the umbrella standard for other (non-financial) assurance engagements conducted in New Zealand. The standard covers a wide variety of engagements, ranging from assurance on statements about the effectiveness of internal control, for example, to assurance on sustainability reports and possible future engagements addressing integrated reporting. It is a principle-based standard that underpins current and future subject-specific ISAEs (NZ).</p>]]></paragraph>
</block>
<block title="ISAE (NZ) 3402"><paragraph
    title="5.8.11."


><![CDATA[<p>In New Zealand the XRB issued the ISAE (NZ) 3402 in 2014, revised in 2016.  This standard has essentially the same requirements as the international standard ISAE 3402 (see below), with some New Zealand specific adaptations.  Australia, Singapore and many other jurisdictions have adopted this approach in the issue of this standard with some jurisdiction specific adaptations.</p>]]></paragraph>
</block>
<block title="ISAE 3402"><paragraph
    title="5.8.12."


><![CDATA[<p>The most commonly used international standard for independent assurance reports is the International Standard on Assurance Engagements (ISAE) No. 3402, Assurance Reports on Controls at a Service Organization, issued in December 2009 by the International Auditing and Assurance Standards Board (IAASB), part of the International Federation of Accountants (IFAC).</p>]]></paragraph>
<paragraph
    title="5.8.13."


><![CDATA[<p>Based on its predecessor standard SAS 70 (1992), ISAE 3402 was developed to provide an international assurance standard for allowing public accountants to issue a report for use by user organisations and their auditors (user auditors) on the controls at a service organisation that are likely to impact or be a part of the user organisation’s system of internal control over financial reporting.</p>]]></paragraph>
<paragraph
    title="5.8.14."


><![CDATA[<p>Auditing and associated consulting firms were required to use ISAE 3402 for all related work after June 2011.</p>]]></paragraph>
</block>
<block title="ISAE 3402 Report Types"><paragraph
    title="5.8.15."


><![CDATA[<p>The ISAE 3402 provides for a report on controls at a point in time (Type 1 Report) or covering a specified period of time, usually between six and twelve months (Type 2 Report).</p>]]></paragraph>
<paragraph
    title="5.8.16."


><![CDATA[<p>A Type 1 report is of limited use as it cannot cover the operating effectiveness of controls and is generally used for new operations where there is no evidence or documented history.</p>]]></paragraph>
<paragraph
    title="5.8.17."


><![CDATA[<p>A Type 2 report not only includes the service organisation's description of controls, but also includes detailed testing of the service organisation's controls over a minimum six month period.</p>]]></paragraph>
<paragraph
    title="5.8.18."


><![CDATA[<p>It is important to note that the descriptions Type 1 and Type 2 represent an audit approach and should not be confused with SOC 1, 2 and 3 reports under SSAE 16 (see below).</p>]]></paragraph>
</block>
<block title="ISAE 3402 Report Uses and Limitations"><paragraph
    title="5.8.19."


><![CDATA[<p>This standard is used to obtain reasonable assurance about whether:</p><ul>
<li>The service organisation’s description of its system fairly presents the system as designed and implemented throughout a specified period or a specific date;</li>
<li>The controls related to the control objectives stated in the service organisation’s description of its system were suitably designed throughout the specified period or at the specified date;</li>
<li>Where included in the scope of the engagement, the controls were implemented and operated effectively to provide reasonable assurance that the control objectives stated in the service organisation’s description of its system were achieved throughout the specified period.</li>
</ul>]]></paragraph>
<paragraph
    title="5.8.20."


><![CDATA[<p>This ISAE applies only when the service organisation is responsible for, or otherwise able to make an assertion about, the suitable design of controls. It does not cover situations where:</p><ul>
<li>reporting only whether controls at a service organisation operated as described; or</li>
<li>reporting on controls at a service organisation other than those related to a service relevant to user entities.</li>
</ul>]]></paragraph>
</block>
<block title="ISAE 3402 Report Content"><paragraph
    title="5.8.21."


><![CDATA[<p>The ISAE 3402 report usually comprises:</p><ul>
<li>The service auditor’s report;</li>
<li>Assertions by the service provider;</li>
<li>A description of control objectives and controls provided by the service organisation;</li>
<li>Results of any tests and other information provided by the independent auditor; and</li>
<li>Any other information provided by the service provider.</li>
</ul>]]></paragraph>
</block>
<block title="US Standard SSAE 16"><paragraph
    title="5.8.22."


><![CDATA[<p>The Statement on Standards for Attestation Engagements No. 16 (SSAE 16) is issued by the Auditing Standards Board (ASB) of the American Institute of Certified Public Accountants (AICPA). It includes additional requirements to the superseded SAS 70 standard by requiring management to provide a written assertion (see below) regarding the design and operating effectiveness of the controls being reviewed. It is possible that agencies may encounter an SSAE16 based report for a US-based entity.</p>]]></paragraph>
<paragraph
    title="5.8.23."


><![CDATA[<p>SSAE 16 is the US equivalent of the international ISAE 3402 and came into effect on<br>15 June 2011. While the SSAE 16 and ISAE 3402 standards have a common purpose and intent, , there are nine very specific requirements in SSAE 16, not covered in ISAE 3402:</p><ul>
<li>Intentional acts by the service providers staff;</li>
<li>Anomalies;</li>
<li>Direct assistance;</li>
<li>Subsequent events;</li>
<li>Statement restricting use of the service auditor’s report;</li>
<li>Disclaimer of Opinion;</li>
<li>Documentation completion;</li>
<li>Engagement acceptance and continuance; and</li>
<li>Elements of the SSAE 16 report that are not required in the ISAE 3402 report.</li>
</ul>]]></paragraph>
<paragraph
    title="5.8.24."


><![CDATA[<p>These differences are summarised in the table below:</p><table class="table-main">
<tbody>
<tr>
<td style="width: 20%;"> </td>
<td><strong>SSAE 16</strong></td>
<td><strong>ISAE 3402</strong></td>
</tr>
<tr>
<td style="width: 20%;"><strong>Use of report</strong></td>
<td>Report specifically states it is restricted to intended users.</td>
<td>Report intended for user entities and their auditors but may include other restrictive use conditions.</td>
</tr>
<tr>
<td style="width: 20%;">
<p><strong>Intentional Acts</strong></p>
</td>
<td>Consideration of the impact of intention acts.</td>
<td>No requirement stated.</td>
</tr>
<tr>
<td style="width: 20%;"><strong>Subsequent Events</strong></td>
<td>Auditors must consider Type 2 events after the report date.</td>
<td>Events after the report date are not considered.</td>
</tr>
<tr>
<td style="width: 20%;"><strong>Reporting</strong></td>
<td>Sample deviations may not be discarded even when considered non-representative.</td>
<td>Sample deviations are assessed and may be discarded as not representative of the sample population.</td>
</tr>
</tbody>
</table>]]></paragraph>
<paragraph
    title="5.8.25."


><![CDATA[<p>The SSAE 16 standard specifies Type 1 and 2 audits (as does ISAE 3402).</p>]]></paragraph>
<paragraph
    title="5.8.26."


><![CDATA[<p>A Type 1 is a report on a description of a service organisation’s system and the suitability of the design of controls. A Type 1 report will test the design effectiveness of defined controls by examining a sample of one item per control. This provides a basic level of assurance that the organisation has some controls in place. It does not measure the completeness or effectiveness of these controls and represents a point in time.</p>]]></paragraph>
<paragraph
    title="5.8.27."


><![CDATA[<p>A Type2 report is a report on policies and procedures placed in operation and tests of operating effectiveness for a specified period of time. A Type 2 report undertakes the tests in a Type 1 report together with an evaluation of the operating effectiveness of the controls for a period of at least six consecutive calendar months.</p>]]></paragraph>
</block>
<block title="AICPA Service Organisation Control Reporting (SOC Reports)"><paragraph
    title="5.8.28."


><![CDATA[<p>Service Organization Control (SOC) Reports, often known as SOC 1, SOC 2, and SOC 3 Reports, are derived from a framework published by the American Institute of Certified Public Accountants (AICPA) for reporting on controls at service organisations.</p>]]></paragraph>
<paragraph
    title="5.8.29."


><![CDATA[<p>In New Zealand, SOC 1 reports follow the ISAE (NZ) 3402 standard and SOC 2 reports are follow the ISAE (NZ) 3000 standard, in conjunction with the NZ Standard for Assurance Engagements SAE 3150, for assurance engagements on controls.</p>]]></paragraph>
<paragraph
    title="5.8.30."


><![CDATA[<p>Each of the three SOC reports are designed to meet specific needs and reporting requirements for service organisations themselves, rather than being designed to provide assurance to third parties (customers). It is important to note that these reports follow the US (SSAE 16) and Canadian accounting standards, rather than the international ISAE 3402.</p><p><strong>SOC 1 Report – Report on Controls at a Service Organization Relevant to User Entities’ Internal Control over Financial Reporting.</strong> Reporting on controls relevant to internal control over financial reporting and usually conducted in accordance with Statement on Standards for Attestation Engagements (SSAE) No. 16 and AT 801 – Reporting on Controls at a Service Organization. A SOC 1 report can be based on a Type 1 or a Type 2 audit.</p><p><strong>SOC 2 Report— Report on Controls at a Service Organization Relevant to Security, Availability, Processing Integrity, Confidentiality or Privacy.</strong> SOC 2 Reporting follows the AICPA AT Section 101 (not SSAE 16) and encompasses controls at service organisations on security, availability, processing Integrity, confidentiality and privacy. SOC 2 reports assist in comparing two or more data centres or service providers.</p><p><strong>SOC 3 Report— Trust Services Report for Service Organizations.</strong> As well as reporting on controls relevant to security, availability, processing integrity, confidentiality and privacy a SOC 3 report provides the same level of assurance about controls over security, availability, processing integrity, confidentiality and/or privacy as a SOC 2 report. The key difference is that a SOC 3 report is intended for general release and does not include the detailed description of the testing performed by the auditor. In place of the detailed description a summary opinion regarding the effectiveness of the controls in place at the data centre or service organisation is provided.</p><p><strong>SOC Reports Summary</strong></p><table class="table-main">
<tbody>
<tr>
<td style="width: 15%;"><strong>Report</strong></td>
<td style="width: 18%;"><strong>Standards</strong></td>
<td><strong>Content</strong></td>
<td><strong>Audience</strong></td>
</tr>
<tr>
<td style="width: 15%;"><strong>SOC1 – Type 1</strong></td>
<td style="width: 18%;">
<p>ISAE (NZ) 3402/<br>SAE 3150<br>or<br>SSAE 16/AT 801</p>
</td>
<td>Internal controls over financial reporting at a point in time.</td>
<td>User auditors, organisation finance team, management.</td>
</tr>
<tr>
<td style="width: 15%;"><strong>SOC1 – Type 2</strong></td>
<td style="width: 18%;">
<p>ISAE (NZ) 3402/<br>SAE 3150<br>or<br>SSAE 16/AT 801</p>
</td>
<td>Internal controls over financial reporting over a specified time period, minimum 6 months.</td>
<td>User auditors, organisation finance team, management.</td>
</tr>
<tr>
<td style="width: 15%;"><strong> SOC2 – Type 1</strong></td>
<td style="width: 18%;"> ISAE (NZ) 3000/
<p>SAE 3150<br>or<br>AT 101</p>
</td>
<td>Security, availability, processing integrity, confidentiality and privacy controls at a point in time.</td>
<td>Management, regulators, third parties under Non-Disclosure Agreement.</td>
</tr>
<tr>
<td style="width: 15%;"><strong> SOC2 – Type 2</strong></td>
<td style="width: 18%;"> ISAE (NZ) 3000/
<p>SAE 3150<br>or<br>AT 101</p>
</td>
<td>Security, availability, processing integrity, confidentiality, privacy controls and operating effectiveness over a specified time period, minimum 6 months.</td>
<td>Management, regulators, third parties under Non-Disclosure Agreement.</td>
</tr>
<tr>
<td style="width: 15%;"><strong> SOC3</strong></td>
<td style="width: 18%;"> ISAE (NZ) 3000/
<p>SAE 3150<br>or<br>AT 101</p>
</td>
<td>Security, availability, processing integrity, confidentiality, privacy controls and operating effectiveness.</td>
<td>Public/general use version of SOC 2, excludes details of testing.  Is less detailed and has less technical content than a SOC 2 report.</td>
</tr>
</tbody>
</table>]]></paragraph>
</block>
<block title="Management Assertions"><paragraph
    title="5.8.31."


><![CDATA[<p>See Assertions in Certification and Accreditation (<a title="Assertions in Certification and Accreditation" href="http://nzism.gcsb.govt.nz/ism-document#Block-12423">NZISM 3.4.3 to 3.4.7</a>) for a short discussion on the nature and purpose of assertions.</p>]]></paragraph>
<paragraph
    title="5.8.32."


><![CDATA[<p>The SSAE 16 requires a written assertion by management. Also known as a management’s assertion or service organisation assertion it is essentially an assertion made by the service organisation representing and asserting to a number of elements, including:</p><ul>
<li>The description fairly presents the service organisation's system;</li>
<li>That the control objectives were suitably designed (SSAE 16 Type 1) and operating effectively (SSAE 16 Type 2) during the dates and/or periods covered by the report; and</li>
<li>The criteria used for making these assertions, (which are additional statements with supporting matter regarding risk factors relating to control objectives and underlying controls) were in place (Type 1) and were consistently applied (Type 2).</li>
</ul>]]></paragraph>
</block>
<block title="ISO/IEC 27001 Certification"><paragraph
    title="5.8.33."


><![CDATA[<p>ISO/IEC 27001 is an international standard that provides a framework for Information Security Management Systems. The standard is designed to help organisations of all sizes and types to select suitable and proportionate security controls for information. It provides a structured approach to assist in managing risk by identifying information security vulnerabilities and selecting appropriate controls.</p>]]></paragraph>
<paragraph
    title="5.8.34."


><![CDATA[<p>This standard enables independent, external certification bodies to audit the ISMS and certify that the requirements of the standard have been met. Such certification is another means of deriving assurance over the operations of service providers. The requirements for certification are described in the ISO/IEC 27006:2015 standard. Certification is based on two reviews:</p><ul>
<li>Stage 1 audit (also called Documentation review) checking the systems documentation is compliant with ISO 27001;</li>
<li>Stage 2 audit (also called Main audit) checking that all the organisation’s activities are compliant with both ISO 27001 and the systems documentation.</li>
</ul>]]></paragraph>
</block>
</subsection>
<subsection title="Other Guidance"> <block title="Cloud Security Alliance’s Security, Trust and Assurance Registry (STAR) Attestation"><paragraph
    title="5.8.35."


><![CDATA[<p>STAR Certification is a rigorous third party independent assessment of the security of a cloud service provider. It is based on the ISAE 3402 and SSAE 16 standards, supplemented by the criteria in the Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM).</p>]]></paragraph>
<paragraph
    title="5.8.36."


><![CDATA[<p>STAR is a free, publicly accessible registry that documents the security controls provided by various cloud computing service providers. The registry lists three levels of assurance:</p><ol>
<li>Self-assessment;</li>
<li>Third party assessment based attestation or certification; and</li>
<li>Continuous monitoring based certification.</li>
</ol><p><b>Note: </b>Agencies should note that a self-assessment does not necessarily provide substantive assurance.</p>]]></paragraph>
<paragraph
    title="5.8.37."


><![CDATA[<p>As at March 2017, the STAR scheme is still to be fully implemented although there are a number of cloud service providers listed in the registry.</p>]]></paragraph>
<paragraph
    title="5.8.38."


><![CDATA[<p>Agencies can use this registry to further inform their judgement on the robustness of assurance over cloud service provider’s internal operations and implementation of security controls.</p>]]></paragraph>
</block>
<block title="Cloud Security Alliance’s Cloud Controls Matric (CCM)"><paragraph
    title="5.8.39."


><![CDATA[<p>The CCM covers 16 control domains and provides fundamental security principles to guide cloud service providers and to assist prospective cloud customers in assessing the overall security risk of a cloud service provider.</p>]]></paragraph>
<paragraph
    title="5.8.40."


><![CDATA[<p>The CCM references and maps its controls to internationally accepted industry standards, regulations, and control frameworks, such as ISO 27001/2/17/18, PCI: DSS v3, and AICPA 2014 Trust Service Principles and Criteria, Germany’s BIS, Canada’s PIPEDA, ISACA’s COBIT, the US FedRAMP, HIPAA, Jericho Forum, NIST and the NZISM.</p>]]></paragraph>
</block>
<block title="Cloud Security Alliance’s Consensus Assessments Initiative Questionnaire (CAIQ)"><paragraph
    title="5.8.41."


><![CDATA[<p>The CAIQ is an extension to the CCM that provides exemplar control assertion questions that can be asked of service providers in the context of each CCM control, and can be tailored to suit each unique cloud customer’s evidentiary requirements. The Government Chief Digital Officer (GCDO) maintain a mapping of the CAIQ questions to the <em>GCIO Cloud Security and Privacy Considerations</em> question set to further aid agencies in use of the CAIQ as an alternative to equivalent GCDO questions.</p>]]></paragraph>
</block>
<block title="ISACA IT Audit and Assurance Program for Cloud Computing "><paragraph
    title="5.8.42."


><![CDATA[<p>Based on ISACA’s IT Assurance Framework (ITAF), the Cloud Computing Assurance Program was developed as a comprehensive and good-practice model, aligned with the ISACA COBIT 5 framework. Building on the generic assurance program, the cloud computing guidance identifies a number of cloud specific risk areas encompassing:</p><ul>
<li>Greater dependency on third parties;</li>
<li>Increased complexity of compliance with national and international laws and regulations;</li>
<li>Reliance on the Internet as the primary conduit to the enterprise’s data; and</li>
<li>Risk due to the dynamic nature of cloud computing.</li>
</ul>]]></paragraph>
<paragraph
    title="5.8.43."


><![CDATA[<p>The ITAF assurance focus is on:</p><ul>
<li>The governance affecting cloud computing;</li>
<li>The contractual compliance between the service provider and customer;</li>
<li>Privacy and regulation issues concerning cloud computing; and</li>
<li>Cloud computing specific attention points.</li>
</ul>]]></paragraph>
<paragraph
    title="5.8.44."


><![CDATA[<p>It is important to note that this cloud computing assurance review is not designed to provide assurance on the design and operational effectiveness of the cloud computing service provider’s internal controls, as this assurance is often provided through ISAE 3604 or similar reviews.</p>]]></paragraph>
<paragraph
    title="5.8.45."


><![CDATA[<p>The cloud computing assurance review focusses on the agency’s or organisation’s systems design and operational effectiveness in relation to cloud services. It is also important to note that this is dependent on the effectiveness of the underlying system design and controls and how well these are implemented and managed.</p>]]></paragraph>
</block>
<block title="ASD Certified Cloud Services"><paragraph
    title="5.8.46."


><![CDATA[<p>The Australian Signals Directorate (ASD) conducts certification of cloud services based in Australia for Australian government use. ASD Certifications are based on the Australian Government Information Security Manual (ISM). It is important to note that there are detail differences between the Australian ISM and the NZISM and these documents have a different legislative and regulatory basis.</p>]]></paragraph>
<paragraph
    title="5.8.47."


><![CDATA[<p>The ASD Cloud Computing Security documents describe security risk mitigations associated with cloud computing. Australian Government agencies are also required to perform due diligence reviews of the legal, financial and privacy risks associated with procuring cloud services, aspects which are not covered by the ASD certification.</p>]]></paragraph>
</block>
<block title="NIST 800-53"><paragraph
    title="5.8.48."


><![CDATA[<p>The NIST Special Publication 800-53 Revision 4 - Security and Privacy Controls for Federal Information Systems and Organizations is the US unified information security framework for US federal government agencies. The New Zealand equivalent is the NZISM.</p>]]></paragraph>
<paragraph
    title="5.8.49."


><![CDATA[<p>The underlying mandates are in FIPS Publication 200, Minimum Security Requirements for Federal Information and Information Systems and FIPS Publication 199, Standards for Security Categorization of Federal Information and Information Systems. US federal government agencies are required to categorise and analyse their system in terms of FIPS 199 and 200 then apply appropriate controls from NIST 800-53.</p>]]></paragraph>
</block>
<block title="FedRAMP"><paragraph
    title="5.8.50."


><![CDATA[<p>The US Federal Risk and Authorization Management Program (FedRAMP) is a government-wide program intended to provide a standardised approach to security assessment, authorisation, and continuous monitoring for cloud products and services. This approach is designed to provide reusable cloud security assessments in order to reduce cost, resource and time. In addition it was intended to minimise cybersecurity risk for Federal Agencies as they move operations to the cloud, provide consistent baseline security policies and streamline the procurement process.</p>]]></paragraph>
<paragraph
    title="5.8.51."


><![CDATA[<p>FedRAMP is a collaboration of cybersecurity and cloud experts from the General Services Administration (GSA), National Institute of Standards and Technology (NIST), Department of Homeland Security (DHS), Department of Defense (DOD), National Security Agency (NSA), Office of Management and Budget (OMB), the Federal Chief Information Officer (CIO) Council and its working groups, as well as private industry.</p><p>The FedRAMP programme is run by the FedRAMP Program Management Office as part of the GSA.</p>]]></paragraph>
<paragraph
    title="5.8.52."


><![CDATA[<p>FedRAMP is mandatory for Federal Agency cloud deployments at all risk impact levels.  Private cloud deployments from single agencies and fully implemented within federal facilities are an exception to this mandate.  Quarterly reporting by each agency on their cloud portfolio is required.</p>]]></paragraph>
<paragraph
    title="5.8.53."


><![CDATA[<p>FedRAMP authorises cloud systems in a three step process:</p><ol>
<li><strong>Security Assessment:</strong> The security assessment process uses a standardised set of requirements in accordance with FISMA using a baseline set of NIST 800-53 controls with additional controls specific to cloud deployments, in order to grant security authorisations. Cryptographic elements are governed by the FIPS 140-2 standards.<br><br></li>
<li><strong>Leveraging and Authorisation:</strong> Federal agencies view security authorisation packages in the FedRAMP repository and leverage the security authorisation packages to grant a security authorisation at their own agency.<br><br></li>
<li><strong>Ongoing Assessment &amp; Authorisation:</strong> Once an authorisation is granted, ongoing assessment and authorisation activities are required to maintain the security authorisation.</li>
</ol>]]></paragraph>
<paragraph
    title="5.8.54."


><![CDATA[<p>Again it is important to note that the FedRAMP assessments are conducted on a different legislative and regulatory basis to assessments conducted in New Zealand. A variety of guidance, controls, templates and other documentation is available online from the GSA (see References - Assurance Guidance )</p>]]></paragraph>
</block>
<block title="PCI DSS"><paragraph
    title="5.8.55."


><![CDATA[<p>The Payment Card Industry Security Standards Council was formed by major credit card organisations and is a global open body formed to develop and promote understanding of essential security standards for payment account security. It develops, maintains and promotes the Payment Card Industry Data Security Standards (PCI DSS). It also provides tools to assist the implementation of the standards such as assessment and scanning qualifications, self-assessment questionnaires, training and education, and product certification programs.</p>]]></paragraph>
<paragraph
    title="5.8.56."


><![CDATA[<p>This standard is designed to protect cardholder data (credit and debit cards) held by merchants, banks and other financial organisations. It applies to all organisations that accept, store, process and transmit credit cardholder data.</p>]]></paragraph>
<paragraph
    title="5.8.57."


><![CDATA[<p>This standard is narrowly focussed and has specific applicability to New Zealand Government agencies that operate financial transaction services (e.g. AoG Banking services and citizen fee-paying services; such as vehicle registration, passport renewal, etc.). The PCI has published an information supplement on Third-Party Security Assurance (updated March 2016).</p>]]></paragraph>
</block>
<block title="COSO"><paragraph
    title="5.8.58."


><![CDATA[<p>The Committee of Sponsoring Organizations of the Treadway Commission (COSO) initially developed the COSO Internal Control-Integrated Framework in 1992. A revised framework was published in 2013 which included guidance on “outsourced service providers” and how they impact risk assessment, controls, monitoring, information flows and assurance. The 2013 Framework incorporates how organisations should manage IT innovation in light of globalisation, complex business processes, regulatory demands and security risk assessments. It is frequently used as the basis for SSAE16 assignments and the production of SOC reports.</p>]]></paragraph>
</block>
</subsection>
<subsection title="References – Assurance Standards"><paragraph
    title="5.8.59."


><![CDATA[<p class="NormS5C8">Further information on Assurance Standards can be found in:</p><table class="table-main">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td style="text-align: center;"><strong>Publisher</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td>&nbsp;<strong>SSAE No. 16</strong></td>
<td>
<p><strong><span>Statement on Standards for Attestation Engagements -&nbsp;</span>Reporting on Controls at a Service Organization</strong></p>
</td>
<td style="text-align: center;">AICPA</td>
<td><a title="SSAE No.16" rel="noopener noreferrer" href="https://competency.aicpa.org/media_resources/208710-statement-on-standards-for-attestation-engagements" target="_blank">https://competency.aicpa.org/media_resources/208710-statement-on-standards-for-attestation-engagements</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Service Organization Controls (SOC) Reports for Service Organizations&nbsp;</strong></p>
</td>
<td style="text-align: center;">AICPA</td>
<td><a title="SOC - Reports for Service Organizations" rel="noopener noreferrer" href="http://www.aicpa.org/interestareas/frc/assuranceadvisoryservices/pages/serviceorganization&#039;smanagement.aspx" target="_blank"></a><a href="https://us.aicpa.org/interestareas/frc/assuranceadvisoryservices/serviceorganization-smanagement">SOC for Service Organizations: Information for Service Organizations (aicpa.org)</a><a title="SOC - Reports for Service Organizations" rel="noopener noreferrer" href="http://www.aicpa.org/interestareas/frc/assuranceadvisoryservices/pages/serviceorganization&#039;smanagement.aspx" target="_blank"></a></td>
</tr>
<tr>
<td>&nbsp;<strong>AT Section 101&nbsp;</strong></td>
<td>
<p><strong>Attest Engagements</strong></p>
</td>
<td style="text-align: center;">AICPA</td>
<td>
<p><a title="AT Section 101 - Attest Engagements" rel="noopener noreferrer" href="http://www.aicpa.org/Research/Standards/AuditAttest/DownloadableDocuments/AT-00101.pdf" target="_blank">https://aicpa.org/Research/Standards/AuditAttest/DownloadableDocuments/AT-00101.pdf</a><a title="AT Section 101 - Attest Engagements" rel="noopener noreferrer" href="http://www.aicpa.org/Research/Standards/AuditAttest/DownloadableDocuments/AT-00101.pdf" target="_blank"></a></p>
</td>
</tr>
<tr>
<td>&nbsp;<strong>AT Section 801</strong></td>
<td>
<p><strong>Reporting on Controls at a Service Organization</strong></p>
</td>
<td style="text-align: center;">AICPA</td>
<td>
<p><a title="AT Section 801 - Reporting on Controls at a Service Organization" rel="noopener noreferrer" href="http://www.aicpa.org/Research/Standards/AuditAttest/DownloadableDocuments/AT-00801.pdf" target="_blank"></a><a href="https://us.aicpa.org/content/dam/aicpa/research/standards/auditattest/downloadabledocuments/at-00801.pdf"></a><a title="AT Section 801 - Reporting on controls at Service Organisation" rel="noopener noreferrer" href="http://www.aicpa.org/Research/Standards/AuditAttest/DownloadableDocuments/AT-00801.pdf" target="_blank">https://aicpa.org/Research/Standards/AuditAttest/DownloadableDocuments/AT-at-00801.pdf</a><a title="AT Section 801 - Reporting on Controls at a Service Organization" rel="noopener noreferrer" href="http://www.aicpa.org/Research/Standards/AuditAttest/DownloadableDocuments/AT-00801.pdf" target="_blank"></a></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>COBIT 5 Framework</strong></p>
</td>
<td style="text-align: center;">ISACA</td>
<td><a rel="noopener noreferrer" href="https://www.isaca.org/resources/cobit/cobit-5" target="_blank">https://www.isaca.org/resources/cobit/cobit-5</a></td>
</tr>
<tr>
<td>
<p><strong>ISAE (NZ) 3000 (Revised)</strong></p>
</td>
<td>
<p><strong><strong>International Standard on Assurance Engagements&nbsp; -&nbsp;</strong>Assurance Engagements Other than Audits or Reviews of Historical Financial Information&nbsp;</strong></p>
</td>
<td style="text-align: center;">XRB</td>
<td><a rel="noopener noreferrer" href="https://xrb.govt.nz/standards/assurance-standards/other-assurance-engagement-standards/" target="_blank">https://xrb.govt.nz/standards/assurance-standards/other-assurance-engagement-standards/</a></td>
</tr>
<tr>
<td>
<p><strong>ISAE (NZ) 3402</strong></p>
</td>
<td>
<p><strong><strong>International Standard on Assurance Engagements&nbsp; -&nbsp;</strong>Assurance Reports on Controls at a Service Organisation</strong></p>
</td>
<td style="text-align: center;">XRB</td>
<td><a rel="noopener noreferrer" href="https://xrb.govt.nz/standards/assurance-standards/other-assurance-engagement-standards/" target="_blank">https://xrb.govt.nz/standards/assurance-standards/other-assurance-engagement-standards/</a><a title="ISAE (NZ) 3402" rel="noopener noreferrer" href="https://xrb.govt.nz/Site/Auditing_Assurance_Standards/Current_Standards/Other_Assurance_Engagements_Standards.aspx" target="_blank"></a></td>
</tr>
<tr>
<td>
<p><strong>SAE 3150</strong></p>
</td>
<td>
<p><strong>Standard on Assurance Engagements - Assurance Engagement on Controls</strong></p>
</td>
<td style="text-align: center;">XRB</td>
<td><a rel="noopener noreferrer" href="https://xrb.govt.nz/standards/assurance-standards/other-assurance-engagement-standards/" target="_blank">https://xrb.govt.nz/standards/assurance-standards/other-assurance-engagement-standards/</a></td>
</tr>
<tr>
<td>
<p><strong>NIST Special Publication 800-53 Revision 4&nbsp;</strong></p>
</td>
<td>
<p><strong>Security and Privacy Controls for Federal Information Systems and Organizations</strong></p>
</td>
<td style="text-align: center;">
<p>NIST</p>
</td>
<td><a title="NIST SP 800-53" rel="noopener noreferrer" href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf" target="_blank">https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf [PDF, 5.05 MB]</a></td>
</tr>
<tr>
<td>
<p><strong>NIST Special Publication&nbsp;500-291, Revision 2, July 2013</strong></p>
</td>
<td>
<p><strong>NIST Cloud Computing Standards Roadmap</strong></p>
</td>
<td style="text-align: center;">
<p>NIST</p>
</td>
<td><a title="NIST SP 500-291" rel="noopener noreferrer" href="https://www.nist.gov/system/files/documents/itl/cloud/NIST_SP-500-291_Version-2_2013_June18_FINAL.pdf" target="_blank">https://www.nist.gov/system/files/documents/itl/cloud/NIST_SP-500-291_Version-2_2013_June18_FINAL.pdf [PDF, 2.2 MB]</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong><strong>PCI DSS&nbsp;</strong>Information Supplement: Third-Party Security Assurance</strong></p>
</td>
<td style="text-align: center;">
<p>PCI Security Standards Council</p>
</td>
<td><a title="Information Supplement: Third-Party Security Assurance" rel="noopener noreferrer" href="https://www.pcisecuritystandards.org/documents/ThirdPartySecurityAssurance_March2016_FINAL.pdf" target="_blank">https://www.pcisecuritystandards.org/documents/ThirdPartySecurityAssurance_March2016_FINAL.pdf [PDF, 1.16 MB]</a></td>
</tr>
<tr>
<td>
<p><strong>ISO 19011:2018</strong></p>
</td>
<td>
<p class="no-uppercase"><strong>Guidelines for auditing management systems</strong></p>
</td>
<td style="text-align: center;">ISO</td>
<td><a href="https://www.iso.org/standard/70017.html">ISO - ISO 19011:2018 - Guidelines for auditing management systems</a> <a rel="noopener noreferrer" href="http://www.iso.org/" target="_blank"></a></td>
</tr>
<tr>
<td>
<p><strong>ISO/IEC 27000:2018</strong></p>
</td>
<td>
<p class="no-uppercase"><strong>Information technology — Security techniques — Information security management systems — Overview and vocabulary</strong></p>
</td>
<td style="text-align: center;">ISO</td>
<td><a title="ISO/IEC 27000:2018" rel="noopener noreferrer" href="https://www.iso.org/standard/73906.html" target="_blank">https://www.iso.org/standard/73906.html</a></td>
</tr>
<tr>
<td>
<p><strong>ISO/IEC 27001:2013</strong></p>
</td>
<td>
<p class="no-uppercase"><strong>Information technology — Security techniques — Information security management systems — Requirements</strong></p>
</td>
<td style="text-align: center;">ISO</td>
<td><a title="ISO/IEC 27001:2013" rel="noopener noreferrer" href="https://www.iso.org/standard/54534.html" target="_blank">https://www.iso.org/standard/54534.html</a></td>
</tr>
<tr>
<td>
<p><strong>ISO/IEC 27006:2015</strong></p>
</td>
<td>
<p class="no-uppercase"><strong>Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems</strong></p>
</td>
<td style="text-align: center;">ISO</td>
<td><a title="ISO/IEC 27006:2015" rel="noopener noreferrer" href="https://www.iso.org/standard/62313.html" target="_blank">https://www.iso.org/standard/62313.html</a></td>
</tr>
<tr>
<td>
<p><strong>ISO/IEC 27007:2020</strong></p>
</td>
<td>
<p class="no-uppercase"><strong>Information security, cybersecurity and privacy protection — Guidelines for information security management systems auditing</strong></p>
</td>
<td style="text-align: center;">ISO</td>
<td><a title="ISO/IEC 27007:2020" rel="noopener noreferrer" href="https://www.iso.org/standard/77802.html" target="_blank">https://www.iso.org/standard/77802.html</a></td>
</tr>
<tr>
<td>
<p><strong>ISO/IEC TS 27008:2019</strong></p>
</td>
<td>
<p class="no-uppercase"><strong>Information technology — Security techniques — Guidelines for the assessment of information security controls</strong></p>
</td>
<td style="text-align: center;">ISO</td>
<td><a title="ISO/IEC TS 27008:2019" rel="noopener noreferrer" href="https://www.iso.org/standard/67397.html" target="_blank">https://www.iso.org/standard/67397.html</a></td>
</tr>
<tr>
<td>
<p><strong>ISO/IEC 27014:2020</strong></p>
</td>
<td>
<p class="no-uppercase"><strong>Information security, cybersecurity and privacy protection — Governance of information security</strong></p>
</td>
<td style="text-align: center;">ISO</td>
<td><a title="ISO/IEC 27014:2020" rel="noopener noreferrer" href="https://www.iso.org/standard/74046.html" target="_blank">https://www.iso.org/standard/74046.html</a></td>
</tr>
<tr>
<td>
<p><strong>ISO/IEC 27017:2015</strong></p>
</td>
<td>
<p class="no-uppercase"><strong>Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services</strong></p>
</td>
<td style="text-align: center;">ISO</td>
<td><a title="ISO/IEC 27017:2015" rel="noopener noreferrer" href="https://www.iso.org/standard/43757.html" target="_blank">https://www.iso.org/standard/43757.html</a></td>
</tr>
<tr>
<td>
<p><strong>ISO/IEC 27018:2019&nbsp;</strong></p>
</td>
<td>
<p><strong>Information technology -- Security techniques -- Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors</strong></p>
</td>
<td style="text-align: center;">ISO</td>
<td><a title="ISO/IEC 27018:2019" rel="noopener noreferrer" href="https://www.iso.org/standard/76559.html" target="_blank">https://www.iso.org/standard/76559.html</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="References – Assurance Guidance"><paragraph
    title="5.8.60."


><![CDATA[<table class="table-main">
<tbody>
<tr>
<td style="width: 20%;"><strong>Reference</strong></td>
<td style="width: 20%;"><strong>Title</strong></td>
<td style="width: 15%; text-align: center;"><strong>Publisher</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td style="width: 20%;">&nbsp;</td>
<td style="width: 20%;"><strong>All-Of-Government Portfolio, Programme and Project Assurance Framework</strong></td>
<td style="width: 15%; text-align: center;">DIA</td>
<td><a title="AoG Portfolio, Programme and Project Assurance Framework" rel="noopener noreferrer" href="https://digital.govt.nz/standards-and-guidance/governance/system-assurance/all-of-government-portfolio-programme-and-project-assurance-framework/" target="_blank">https://digital.govt.nz/standards-and-guidance/governance/system-assurance/all-of-government-portfolio-programme-and-project-assurance-framework/</a>&nbsp;</td>
</tr>
<tr>
<td style="width: 20%;">&nbsp;</td>
<td style="width: 20%;"><strong>All-Of-Government ICT Operations Assurance Framework</strong></td>
<td style="width: 15%; text-align: center;">DIA</td>
<td><a title="AoG ICT Operations Assurance Framework" rel="noopener noreferrer" href="https://digital.govt.nz/standards-and-guidance/governance/system-assurance/all-of-government-ict-operations-assurance-framework/" target="_blank">https://digital.govt.nz/standards-and-guidance/governance/system-assurance/all-of-government-ict-operations-assurance-framework/</a></td>
</tr>
<tr>
<td style="width: 20%;">&nbsp;</td>
<td style="width: 20%;">
<p><strong>All-Of-Government Enterprise Risk Maturity Assessment Framework (gERMAF)</strong></p>
</td>
<td style="width: 15%; text-align: center;">DIA</td>
<td><a title="AoG Risk Maturity Assessment Framework" rel="noopener noreferrer" href="https://digital.govt.nz/standards-and-guidance/governance/system-assurance/enterprise-risk-maturity/" target="_blank">https://digital.govt.nz/standards-and-guidance/governance/system-assurance/enterprise-risk-maturity/</a><a rel="noopener noreferrer" href="http://www.aicpa.org/interestareas/frc/assuranceadvisoryservices/downloadabledocuments/faqs_service_orgs.pdf" target="_blank"></a></td>
</tr>
<tr>
<td style="width: 20%;">&nbsp;</td>
<td style="width: 20%;">
<p><strong>FAQs — New Service Organization Standards and Implementation Guidance</strong></p>
</td>
<td style="width: 15%; text-align: center;">American Institute of Certified Public Accountants (AICPA)</td>
<td><a title="FAQs - New Service Organization Standards and Implementation Guidance" rel="noopener noreferrer" href="https://docplayer.net/13378742-Faqs-new-service-organization-standards-and-implementation-guidance.html" target="_blank">https://docplayer.net/13378742-Faqs-new-service-organization-standards-and-implementation-guidance.html</a></td>
</tr>
<tr>
<td style="width: 20%;">&nbsp;</td>
<td style="width: 20%;">
<p><strong>The Federal Risk and Authorization Management Program (FedRAMP)</strong></p>
</td>
<td style="width: 15%; text-align: center;">General Services Administration, US Federal Government</td>
<td><a title="FedRAMP" rel="noopener noreferrer" href="https://www.fedramp.gov/" target="_blank">https://www.fedramp.gov/</a></td>
</tr>
<tr>
<td style="width: 20%;">&nbsp;</td>
<td style="width: 20%;">
<p><strong>FedRAMP Documents &amp; Templates</strong></p>
</td>
<td style="width: 15%; text-align: center;">General Services Administration, US Federal Government</td>
<td><a title="FedRAMP Documents and Templates" rel="noopener noreferrer" href="https://www.fedramp.gov/documents-templates/" target="_blank">https://www.fedramp.gov/documents-templates/</a></td>
</tr>
<tr>
<td style="width: 20%;">&nbsp;</td>
<td style="width: 20%;">
<p><strong>Controls and Assurance in the Cloud Using COBIT 5</strong></p>
</td>
<td style="width: 15%; text-align: center;">ISACA</td>
<td><a href="https://store.isaca.org/s/store#/store/browse/detail/a2S4w000004Ko9UEAS">Store - Controls &amp; Assurance in the Cloud: Using COBIT 5 | Digital | English - ISACA Portal</a></td>
</tr>
<tr>
<td style="width: 20%;">&nbsp;</td>
<td style="width: 20%;">
<p><strong>IIA Position Paper:<br>THE THREE LINES OF DEFENSE <br>IN EFFECTIVE RISK MANAGEMENT <br>AND CONTROL<br>JANUARY 2013<br></strong></p>
</td>
<td style="width: 15%; text-align: center;">IIA</td>
<td><a href="https://theiia.fi/wp-content/uploads/2017/01/pp-the-three-lines-of-defense-in-effective-risk-management-and-control.pdf">121691 PROF-Position Paper 3 Lines of Defense_Digital Version_CX.indd (theiia.fi)</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Risk Assessment "><paragraph
    title="5.8.61.R.01."

    tags="Governance,Information Security Documentation,Risk Assessment,Assurance"


><![CDATA[<p>The Security Risk Management Plan (<a title="SRMP" href="http://nzism.gcsb.govt.nz/ism-document#Section-12761">SRMP – Section 5.3</a>) encompasses all risks associated with the security of agency systems. The growth in outsourced services, particularly cloud services, has created situations where risk, controls and assurance cannot be directly examined and assessed. In such cases independent assurance reports are an effective means, possibly the only means, of obtaining some assurance on the service provider’s operations.</p>]]></paragraph>
<paragraph
    title="5.8.61.R.02."

    tags="Governance,Information Security Documentation,Risk Assessment,Assurance"


><![CDATA[<p>No single independent assurance scheme/standard covers the full range of considerations and control requirements of the NZISM. Agencies may find duplication of aspects analysed if multiple schemes are applied. It is also important to note that none of the common mature assurance schemes cover specific government requirements and handling of Official Information; such as the personnel aspects (PERSEC) of user and administration vetting and security clearances, or sovereignty aspects of the information/data. Careful selection and consideration is required when placing reliance on reports available for a particular outsourced or cloud service.</p>]]></paragraph>
<paragraph
    title="5.8.61.R.03."

    tags="Governance,Information Security Documentation,Risk Assessment,Assurance"


><![CDATA[<p>Reports from different assurance scheme have varying levels of detail as well as risk area coverage. Selection and usage of reports should be considered in the context of the intended service/system business and information value.</p><p>Understanding the business and technical risk context will drive the size and depth of a risk assessment, and the associated assurance process. Though even a lighter-weight risk assurance process will follow the C&amp;A process model, such that the CE or authorised delegate is still formally accountable and responsible.</p><p>Re-use of assessments completed by other agencies is encouraged, noting the business or information value context may differ. To assist agencies and promote efficiency, the Government Chief Digital Officer (GCDO) facilitates the sharing and re-use of existing cloud assessment materials among agencies.</p>]]></paragraph>
<paragraph
    title="5.8.61.C.01."

    tags="Governance,Information Security Documentation,Risk Assessment,Assurance"


    classification="All Classifications"
    compliance="Must"
    cid="1019"
><![CDATA[<p>Agencies MUST conduct a risk assessment in order to determine the type and level of independent assurance required to satisfy certification and accreditation requirements.</p>]]></paragraph>
<paragraph
    title="5.8.61.C.02."

    tags="Governance,Information Security Documentation,Risk Assessment,Assurance"


    classification="All Classifications"
    compliance="Should"
    cid="1020"
><![CDATA[<p>In all cases where assurance on service provider operations cannot be obtained directly, agencies SHOULD obtain independent assurance reports.</p>]]></paragraph>
<paragraph
    title="5.8.61.C.03."

    tags="Governance,Information Security Documentation,Risk Assessment,Assurance"


    classification="All Classifications"
    compliance="Should"
    cid="1021"
><![CDATA[<p>In order to address identified risk areas, agencies SHOULD obtain relevant assurance reports and service provider certifications to inform a risk assessment and Certification activities as well as other aspects of the certification processes such as evidence of controls effectiveness and remediation plans.</p>]]></paragraph>
</block>
<block title="Independent Assurance"><paragraph
    title="5.8.62.R.01."

    tags="Governance,Information Security Documentation,Assurance"


><![CDATA[<p>Independent assurance can be obtained directly from the service provider through Service Organisation Control (SOC) reports, as well as other internationally recognised assurance frameworks. It will be important to corroborate individual reports by comparison with other reporting mechanisms and independent certifications.</p>]]></paragraph>
<paragraph
    title="5.8.62.C.01."

    tags="Governance,Information Security Documentation,Assurance"


    classification="All Classifications"
    compliance="Must"
    cid="1024"
><![CDATA[<p>Agencies MUST incorporate the results of any independent assurance reports into the agency Certification process, to understand the residual risk position and controls required to manage risk appropriately.</p>]]></paragraph>
</block>
</subsection>
</section>
