<section title="6.1. Information Security Reviews"><subsection title="Objective"><paragraph
    title="6.1.1."


><![CDATA[<p>Information security reviews maintain the security of agency systems and detect gaps and deficiencies.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="6.1.2."


><![CDATA[<p>This section covers information on conducting reviews of any agency’s information security posture and security implementation.</p>]]></paragraph>
</block>
<block title="Information security reviews"><paragraph
    title="6.1.3."


><![CDATA[<p>An information security review:</p><ul>
<li>identifies any changes to the business requirements or concept of operation for the subject of the review;</li>
<li>identifies any changes to the security risks faced by the subject of the review;</li>
<li>assesses the effectiveness of the existing counter-measures;</li>
<li>validates the implementation of controls and counter-measures; and</li>
<li>reports on any changes necessary to maintain an effective security posture.</li>
</ul>]]></paragraph>
<paragraph
    title="6.1.4."


><![CDATA[<p>An information security review can be scoped to cover anything from a single system to an entire agency’s systems.</p>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="6.1.5."


><![CDATA[<p>Additional information relating to system auditing is contained in:</p><table class="table-main">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title&nbsp;</strong></td>
<td style="text-align: center;"><strong>Publisher</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td><strong>ISO/IEC 27006:2015&nbsp;</strong></td>
<td>
<p class="no-uppercase"><strong>Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems</strong></p>
</td>
<td style="text-align: center;">ISO</td>
<td>
<p><a rel="noopener noreferrer" href="http://www.iso27001security.com/html/27006.html" target="_blank">https://www.iso.org/standard/62313.html</a></p>
</td>
</tr>
<tr>
<td><strong>ISO/IEC 27007:2020&nbsp;</strong></td>
<td>
<p class="no-uppercase"><strong>Information security, cybersecurity and privacy protection — Guidelines for information security management systems auditing</strong></p>
</td>
<td style="text-align: center;">ISO</td>
<td>
<p><a rel="noopener noreferrer" href="http://www.iso27001security.com/html/27007.html" target="_blank">https://www.iso.org/standard/77802.html</a></p>
</td>
</tr>
<tr>
<td><strong>ISO/IEC TS 27008:2019&nbsp;</strong></td>
<td>
<p class="no-uppercase"><strong>Information technology — Security techniques — Guidelines for the assessment of information security controls</strong></p>
</td>
<td style="text-align: center;">ISO</td>
<td>
<p><a rel="noopener noreferrer" href="http://www.iso27001security.com/html/27008.html" target="_blank">https://www.iso.org/standard/67397.html</a></p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="PSR references"><paragraph
    title="6.1.6."


><![CDATA[<p class="NormS6C1">Relevant PSR requirements can be found at:</p>
<table class="table-grey" style="width: 99.9838%; height: 304.333px;">
<tbody>
<tr style="height: 18.6667px;">
<td style="width: 22.7368%; height: 18.6667px;"><strong>Reference</strong></td>
<td style="width: 32.0648%; height: 18.6667px;"><strong>Title</strong></td>
<td style="width: 45.1822%; height: 18.6667px;"><strong>Source</strong></td>
</tr>
<tr style="height: 144.333px;">
<td style="width: 22.7368%; height: 144.333px;">
<p><strong>PSR Mandatory Requirements</strong></p>
</td>
<td style="width: 32.0648%; height: 144.333px;">
<p>GOV3, INFOSEC1, INFOSEC2, INFOSEC3 and INFOSEC4</p>
</td>
<td style="width: 45.1822%; height: 144.333px;">
<p><a title="PSR Home" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/" target="_blank">Home | Protective Security Requirements<br></a></p>
<p><a title="Security Governance" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/security-governance" target="_blank">Security governance (GOV) | Protective Security Requirements</a></p>
<p><a title="Information Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/information-security" target="_blank">Information security (INFOSEC) | Protective Security Requirements&nbsp;</a></p>
</td>
</tr>
<tr style="height: 141.333px;">
<td style="width: 22.7368%; height: 141.333px;">
<p><strong>PSR requirements sections</strong></p>
</td>
<td style="width: 32.0648%; height: 141.333px;">
<p>Self-assessment &amp; reporting</p>
<p>Protective security measures</p>
</td>
<td style="width: 45.1822%; height: 141.333px;">
<p><a href="https://www.protectivesecurity.govt.nz/about/self-assessment-and-reporting">Self-assessment and reporting | Protective Security Requirements</a><br><a rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/about/compliance" target="_blank"></a></p>
<p><a rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/about/compliance" target="_blank">Complying with the Protective Security Requirements | Protective Security Requirements</a></p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Conducting information security reviews"><paragraph
    title="6.1.7.R.01."

    tags="Governance,Information Security Review"


><![CDATA[<p>Annual reviews of an agency’s information security posture can assist with ensuring that agencies are responding to the latest threats, environmental changes and that systems are properly configured in accordance with any changes to information security documentation and guidance.</p>]]></paragraph>
<paragraph
    title="6.1.7.C.01."

    tags="Governance,Information Security Review"


    classification="All Classifications"
    compliance="Should"
    cid="1040"
><![CDATA[<p>Agencies SHOULD undertake and document information security reviews of their systems at least annually.</p>]]></paragraph>
</block>
<block title="Managing Conflicts of Interest"><paragraph
    title="6.1.8.R.01."

    tags="Governance,Information Security Review"


><![CDATA[<p>Reviews may be undertaken by personnel independent of the target of evaluation or by an independent third party to ensure that there is no (perceived or actual) conflict of interest and that an information security review is undertaken in an objective manner.</p>]]></paragraph>
<paragraph
    title="6.1.8.C.01."

    tags="Governance,Information Security Review"


    classification="All Classifications"
    compliance="Should"
    cid="1043"
><![CDATA[<p>Agencies SHOULD have information security reviews conducted by personnel independent to the target of the review or by an independent third party.</p>]]></paragraph>
</block>
<block title="Focus of information security reviews "><paragraph
    title="6.1.9.R.01."

    tags="Governance,Information Security Review"


><![CDATA[<p>Incidents, significant changes or an aggregation of minor changes may require a security review to determine and support any necessary changes and to demonstrate good systems governance. An agency may choose to undertake an information security review:</p><ul>
<li>as a result of a specific information security incident;</li>
<li>because a change to a system or its environment that significantly impacts on the agreed and implemented system architecture and information security policy; or</li>
<li>as part of a regular scheduled review.</li>
</ul>]]></paragraph>
<paragraph
    title="6.1.9.R.02."

    tags="Governance,Information Security Review"


><![CDATA[<p>In order to review risk, an information security review should analyse the threat environment and the highest classification of information that is stored, processed or communicated by that system.</p>]]></paragraph>
<paragraph
    title="6.1.9.R.03."

    tags="Governance,Information Security Review"


><![CDATA[<p>Depending on the scope and subject of the information security review, agencies may gather information on areas including:</p><ul>
<li>agency priorities, business requirements and/or concept of operations;</li>
<li>threat data;</li>
<li>risk likelihood and consequence estimates;</li>
<li>effectiveness of existing counter-measures;</li>
<li>other possible counter-measures; </li>
<li>changes to standards, policies and guidelines;</li>
<li>recommended good practices; and</li>
<li>significant system incidents and changes.</li>
</ul>]]></paragraph>
<paragraph
    title="6.1.9.C.01."

    tags="Governance,Information Security Review"


    classification="All Classifications"
    compliance="Should"
    cid="1048"
><![CDATA[<p>Agencies SHOULD review the components detailed in the table below. Agencies SHOULD also ensure that any adjustments and changes as a result of any vulnerability analysis are consistent with the vulnerability disclosure policy.</p><table class="table-secondary">
<tbody>
<tr>
<td>Component</td>
<td>Review</td>
</tr>
<tr>
<td>Information security documentation</td>
<td>The SecPol, Systems Architecture, SRMPs, SSPs, SitePlan, SOPs, the VDP, the IRP, and any third party assurance reports.</td>
</tr>
<tr>
<td>Dispensations</td>
<td>Prior to the identified expiry date.</td>
</tr>
<tr>
<td>Operating environment</td>
<td>When an identified threat emerges or changes, an agency gains or loses a function or the operation of functions are moved to a new physical environment.</td>
</tr>
<tr>
<td>Procedures</td>
<td>After an information security incident or test exercise.</td>
</tr>
<tr>
<td>System security</td>
<td>Items that could affect the security of the system on a regular basis.</td>
</tr>
<tr>
<td>Threats</td>
<td>Changes in threat environment and risk profile.</td>
</tr>
<tr>
<td>NZISM</td>
<td>Changes to baseline or other controls, any new controls and guidance.</td>
</tr>
</tbody>
</table>]]></paragraph>
</block>
</subsection>
</section>
