<section title="7.2. Reporting Information Security Incidents"><subsection title="Objective"><paragraph
    title="7.2.1."


><![CDATA[<p>Reporting of information security incidents is incorporated as an essential part of incident management, whether the reporting is within an agency or reports are provided to another government agency.&nbsp;</p>]]></paragraph>
<paragraph
    title="7.2.2."


><![CDATA[<p>Reporting helps to maintain an accurate threat environment picture for government systems, particularly when All-of-Government (AoG) or multi-agency systems are involved.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="7.2.3."


><![CDATA[<p class="NormS7C2">This section covers information relating specifically to the reporting of information security incidents.&nbsp; It does <strong>not </strong>cover the reporting of physical or personnel security incidents <strong>unless</strong> there is an impact on information systems.<br>For example, keypads and access cards are part of a wider information technology system, where physical key locks are not.</p>]]></paragraph>
<paragraph
    title="7.2.4."


><![CDATA[<p class="NormS7C2">It is important to note that, in most cases, information systems are likely to be affected.</p>]]></paragraph>
</block>
<block title="Requirement for information security incident reporting"><paragraph
    title="7.2.5."


><![CDATA[<p class="NormS7C2">The requirement to report an information security incident report applies irrespective of whether incident management is internally managed or if an agency has outsourced some or all of its information technology functions and services.</p>]]></paragraph>
<paragraph
    title="7.2.6."


><![CDATA[<p class="NormS7C2">The information security threat and intelligence landscape continues to evolve, partly  driven by more advanced, capable, well-resourced and motivated adversaries, as well as the need to improve management and governance of information systems.  To assist in managing these requirements, a standardised form of information exchange is essential.</p>]]></paragraph>
<paragraph
    title="7.2.7."


><![CDATA[<p>Agencies must have a comprehensive understanding of their assets, both physical and intellectual. By establishing clear boundaries, they can effectively manage their scope, ensuring informed decisions and efficient incident response.&nbsp;&nbsp;</p>]]></paragraph>
<paragraph
    title="7.2.8."


><![CDATA[<p>Agencies need to consider that vendor contract(s) and agreement(s) enable sharing of information relating to incidents with the NCSC.</p>
<p>&nbsp;</p>]]></paragraph>
</block>
<block title="Definition of a Security Incident"><paragraph
    title="7.2.9."


><![CDATA[<p>A <strong>security incident</strong> is a violation, breach or infringement of a security policy or an attempt to gain unauthorised access to official resources. It is important to note that security incidents include physical incidents (such as lost documents) as well as “cyber” incidents.</p>]]></paragraph>
</block>
<block title="Definition of a Cyber Security Incident"><paragraph
    title="7.2.10."


><![CDATA[<p>A <strong>cyber security incident</strong> is any event that jeopardises or may jeopardise the confidentiality, integrity, or availability of an information system or the information a system processes, stores, or communicates.&nbsp; This includes a violation or potential violation of security policies, security procedures, acceptable use policies or any relevant regulation or legislation.</p>]]></paragraph>
</block>
<block title="Background"><paragraph
    title="7.2.11."


><![CDATA[<p>The detection,&nbsp;triaging, recording, management and response to an incident depends primarily on effective prevention and detection mechanisms and a robust response plan.&nbsp; Effective detection and response mechanisms also provide an important record of events and assist in preventing repeat events, improving defences and streamlining response measures.</p>]]></paragraph>
<paragraph
    title="7.2.12."


><![CDATA[<p>A key part of the detection and response is incident reporting, including internal security system reports as well as any essential external reporting.&nbsp; It is essential that response is timely and methodical in order to minimise the effects of the incident.&nbsp; In all cases it is vital that steps are taken to quickly contain the incident, minimise damage and implement measures to prevent or contain any reoccurrence.</p>]]></paragraph>
<paragraph
    title="7.2.13."


><![CDATA[<p>Not&nbsp;every cybersecurity event is serious enough to warrant detailed investigation and reporting, for example a single multi-factor authentication challenge failure from an employee on premises.&nbsp; Multiple multi-factor challenge failures, however, may indicate a malicious access attempt.&nbsp; Thresholds should be established which will trigger an incident response.&nbsp; In all cases, once an incident has been determined, it should be recorded to support analysis and reporting.</p>]]></paragraph>
<paragraph
    title="7.2.14."


><![CDATA[<p>It&nbsp;is also important to categorise incidents in order to better manage allocation of resources to the containment and remediation of the incident.&nbsp; A three-tier categorisation is suggested:</p>
<ol>
<li class="NormS7C2"><strong>Critical</strong>: Incident affecting critical systems or information with potential to impact operations, revenue, customers or information disclosed in data breach.<br>For example, distributed denial of service attack, unauthorised access to system, multi-system ransomware.<br><br></li>
<li><strong>Serious</strong>: Incident affecting noncritical systems or information, impact on operations, revenue, customers or information disclosed in data breach.<br>For example, execution of malware on a single system, potentially compromised credentials.<br><br></li>
<li><strong>Low</strong>: Possible incident affecting noncritical systems.&nbsp; Incidents or employee investigations that are not time sensitive.&nbsp; <br>For example, blocked phishing attempts.</li>
</ol>]]></paragraph>
<paragraph
    title="7.2.15."


><![CDATA[<p>Incidents where the scope or cause of activity has not yet been determined should be categorised as serious or critical and actioned accordingly.</p>]]></paragraph>
<paragraph
    title="7.2.16."


><![CDATA[<p>Fa<span>ctors that assist in determining the severity of an incident include:</span></p>
<ul>
<li>Whether the incident affects a single agency or multiple agencies;</li>
<li><!--[endif]-->Functional impact of the incident (availability);</li>
<li><!--[endif]-->Information impact of the incident (confidentiality, integrity);</li>
<li><!--[endif]-->Recoverability from the incident;</li>
<li><!--[endif]-->Whether a breach of personal information held by the agency has occurred;</li>
<li><!--[endif]-->Whether unauthorised access to agency information systems may have occurred;</li>
<li><!--[endif]-->Reputational risk to the agency;</li>
<li><!--[endif]-->Impact on any MOUs, MOAs and similar formal agreements;</li>
<li><!--[endif]-->Impact on the disclosure of information theft of data.</li>
</ul>
<p class="NormS7C2" style="mso-list: l0 level1 lfo1;">&nbsp;</p>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="7.2.17."


><![CDATA[<p>Additional information relating to information security incidents can be found at:</p>
<table class="table-main" style="width: 100%; height: 537.6px;">
<tbody>
<tr style="height: 18.4px;">
<td style="width: 17.2114%; height: 18.4px;"><strong>Reference</strong></td>
<td style="width: 30.4242%; height: 18.4px;"><strong>Title</strong></td>
<td style="text-align: center; width: 13.3866%; height: 18.4px;"><strong>Publisher</strong></td>
<td style="width: 39.1168%; height: 18.4px;"><strong>Source</strong></td>
</tr>
<tr style="height: 110.4px;">
<td style="width: 17.2114%; height: 110.4px;">
<p><strong>SP 800-61r3&nbsp;</strong></p>
<p><strong>April 2025</strong></p>
</td>
<td style="width: 30.4242%; height: 110.4px;"><strong>Computer Security Incident Handling Guide,&nbsp;</strong></td>
<td style="text-align: center; width: 13.3866%; height: 110.4px;"><strong>NIST</strong></td>
<td style="width: 39.1168%; height: 110.4px;"><strong><span style="font-size: 12.0pt; font-family: &#039;Aptos&#039;,sans-serif; mso-fareast-font-family: Aptos; mso-fareast-theme-font: minor-latin; mso-bidi-font-family: Aptos; mso-ligatures: standardcontextual; mso-ansi-language: EN-NZ; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;"><a href="https://aus01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fnvlpubs.nist.gov%2Fnistpubs%2FSpecialPublications%2FNIST.SP.800-61r3.pdf&amp;data=05%7C02%7Crs01%40ncsc.govt.nz%7C308085111632488f2efd08dd90d248f7%7C27dc6ab39c394134a7b2beddcf3638e6%7C1%7C0%7C638825955031506612%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=ZquQJEntfDLQqfIid8gI7Vr0PMf4wo%2FIrUudBHOFihY%3D&amp;reserved=0">Incident Response Recommendations and Considerations for Cybersecurity Risk Management: A CSF 2.0 Community Profile</a></span></strong></td>
</tr>
<tr style="height: 124px;">
<td style="width: 17.2114%; height: 124px;"><strong>SP&nbsp;800-60 Volume 1 Revision 1</strong></td>
<td style="width: 30.4242%; height: 124px;">
<p><strong>Guide for Mapping Types of Information and Information Systems to Security Categories</strong></p>
</td>
<td style="text-align: center; width: 13.3866%; height: 124px;">
<p>NIST</p>
</td>
<td style="width: 39.1168%; height: 124px;"><a href="https://csrc.nist.gov/pubs/sp/800/60/v1/r1/final">SP 800-60 Vol. 1 Rev. 1, Guide for Mapping Types of Information and Information Systems to Security Categories | CSRC</a></td>
</tr>
<tr style="height: 142.4px;">
<td style="width: 17.2114%; height: 142.4px;">
<p><strong>SP&nbsp;800-60 Volume 2 Revision 1</strong></p>
</td>
<td style="width: 30.4242%; height: 142.4px;">
<p><strong>Guide for Mapping Types of Information and Information Systems to Security Categories, Volume ll: Appendices</strong></p>
</td>
<td style="text-align: center; width: 13.3866%; height: 142.4px;">NIST</td>
<td style="width: 39.1168%; height: 142.4px;"><a href="https://csrc.nist.gov/pubs/sp/800/60/v2/r1/final">SP 800-60 Vol. 2 Rev. 1, Guide for Mapping Types of Information and Information Systems to Security Categories: Appendices | CSRC</a></td>
</tr>
<tr style="height: 68.8px;">
<td style="width: 17.2114%; height: 68.8px;">&nbsp;</td>
<td style="width: 30.4242%; height: 68.8px;">
<p><strong>Guide to cyber threat sharing</strong></p>
</td>
<td style="text-align: center; width: 13.3866%; height: 68.8px;">NIST</td>
<td style="width: 39.1168%; height: 68.8px;"><a rel="noopener noreferrer" href="https://www.us-cert.gov/Information-Sharing-Specifications-Cybersecurity" target="_blank">Guide to cyber threat sharing</a></td>
</tr>
<tr style="height: 73.6px;">
<td style="width: 17.2114%; height: 73.6px;">&nbsp;</td>
<td style="width: 30.4242%; height: 73.6px;">
<p><strong>Cyber Threats and Advisories</strong></p>
</td>
<td style="text-align: center; width: 13.3866%; height: 73.6px;">CISA</td>
<td style="width: 39.1168%; height: 73.6px;"><a href="https://www.cisa.gov/topics/cyber-threats-and-advisories">Cyber Threats and Advisories | Cybersecurity and Infrastructure Security Agency CISA</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Reporting information security incidents"><paragraph
    title="7.2.18.R.01."

    tags="Governance,Information Security Incidents"


><![CDATA[<p class="NormS7C2">Reporting information security incidents provides management with a means to assess and minimise damage to a system and to take remedial actions.&nbsp; Incidents should be reported to an ITSM, as soon as possible. The ITSM or CISO may seek advice from NCSC as required.&nbsp;</p>]]></paragraph>
<paragraph
    title="7.2.18.C.01."

    tags="Governance,Information Security Incidents"


    classification="All Classifications"
    compliance="Must"
    cid="1203"
><![CDATA[<p>Agencies MUST direct personnel to report information security incidents to an ITSM as soon as possible after the information security incident is discovered in accordance with agency procedures.</p>]]></paragraph>
<paragraph
    title="7.2.18.C.02."

    tags="Governance,Information Security Incidents"


    classification="All Classifications"
    compliance="Should"
    cid="1205"
><![CDATA[<p class="Normal-nonumbering">Agencies SHOULD:</p>
<ul>
<li>encourage personnel to note and report any observed or suspected security weaknesses in, or threats to, systems or services;</li>
<li>establish and follow procedures for reporting system, software or other malfunctions;</li>
<li>put mechanisms in place to enable the types, volumes and costs of information security incidents and malfunctions to be quantified and monitored; and</li>
<li>deal with the violation of agency information security policies and procedures by personnel through training and, where warranted, a formal disciplinary process.</li>
</ul>]]></paragraph>
</block>
<block title="Responsibilities when reporting an information security incident"><paragraph
    title="7.2.19.R.01."

    tags="Governance,Information Security Incidents"


><![CDATA[<p class="Normal-nonumbering">The ITSM actively manages information security incidents and MUST ensure the CISO has sufficient awareness of and information on any information security incidents within an agency.</p>
<p class="Normal-nonumbering">The CISO is required to keep the CSO and/or Agency Head informed of information security incidents within their agency.&nbsp;</p>]]></paragraph>
<paragraph
    title="7.2.19.R.02."

    tags="Governance,Information Security Incidents"


><![CDATA[<p class="Normal-nonumbering">Reporting on Critical and Serious incidents requires immediate action.</p>
<p class="Normal-nonumbering">Reporting on incidents categorised as Low can usually be adequately managed through periodic (weekly or monthly) reports.&nbsp;</p>]]></paragraph>
<paragraph
    title="7.2.19.C.01."

    tags="Governance,Information Security Incidents"


    classification="All Classifications"
    compliance="Must"
    cid="1211"
><![CDATA[<p>The ITSM MUST keep the CISO fully informed of information security incidents within an agency.</p>]]></paragraph>
</block>
<block title="Reporting information security incidents to National Cyber Security Centre (NCSC)"><paragraph
    title="7.2.20.R.01."

    tags="Governance,Information Security Incidents"


><![CDATA[<p>The NCSC uses significant information security incident reports as the basis for identifying and responding to information security events across government, and New Zealand. Reports are also used to develop new policy, procedures, techniques and training measures to prevent the recurrence of similar information security incidents across government.</p>]]></paragraph>
<paragraph
    title="7.2.20.R.02."


><![CDATA[<p>Reporting on Critical and Serious incidents requires <span style="color: #c00000;">immediate action</span>.</p>
<p>Reporting of Critical or Serious information security incidents to the NCSC through the appropriate channels ensures that appropriate and timely assistance can be provided to the agency.&nbsp;&nbsp; In addition, it allows the NCSC to maintain an accurate threat environment view across government systems.</p>]]></paragraph>
<paragraph
    title="7.2.20.R.03."


><![CDATA[<p>Reporting&nbsp;on incidents categorised as Low can be scheduled to a suitable timeframe e.g. weekly.&nbsp;</p>]]></paragraph>
<paragraph
    title="7.2.20.C.01."

    tags="Governance,Information Security Incidents"


    classification="All Classifications"
    compliance="Must"
    cid="1216"
><![CDATA[<p class="NormS7C2">The Agency ITSM, MUST report information security incidents categorised as:</p>
<ul>
<li><strong>Critical</strong>;</li>
<li><strong>Serious</strong>; or</li>
<li>incidents related to multi-agency or government systems;</li>
</ul>
<p class="NormS7C2">to the NCSC as soon as possible.</p>
<p>A Report Form is provided on the NCSC website under Reporting an Incident at <a rel="noopener noreferrer" href="https://www.ncsc.govt.nz/incidents/report-an-incident-and-request-support" target="_blank">Report an incident and request support | National Cyber Security Centre</a></p>
<p class="NormS7C2" style="margin-left: 70.9pt; text-indent: 0cm; mso-list: none;">&nbsp;</p>]]></paragraph>
<paragraph
    title="7.2.20.C.02."

    tags="Governance,Information Security Incidents"


    classification="All Classifications"
    compliance="Should"
    cid="1220"
><![CDATA[<p class="NormS7C2">Agencies SHOULD report information security incidents categorised as <strong>Low</strong> to the NCSC.</p>
<p class="NormS7C2">A <span>Report Form is provided on the NCSC website under Reporting an Incident at <a href="https://www.ncsc.govt.nz/incidents/report-an-incident-and-request-support">Report an incident and request support | National Cyber Security Centre</a></span></p>]]></paragraph>
<paragraph
    title="7.2.20.C.03."

    tags="Information Security Incidents"


    classification="All Classifications"
    compliance="Should"
    cid="7536"
><![CDATA[<p>Agencies SHOULD formally share post-incident review reports by emailing them to <a title="NCSC incidents" href="mailto:incidents@ncsc.govt.nz">incidents@ncsc.govt.nz</a>.</p>]]></paragraph>
</block>
<block title="Outsourcing and information security incidents"><paragraph
    title="7.2.21.R.01."

    tags="Governance,Information Security Incidents"


><![CDATA[<p class="NormS7C2">In the case of outsourcing of information technology services and functions, the agency remains responsible for the reporting of all information security incidents.&nbsp; This includes any outsourced cloud services used by the agency.&nbsp; As such, the agency MUST ensure that the service provider informs them of all information security incidents to enable them to assess the incident and provide formal reporting.</p>]]></paragraph>
<paragraph
    title="7.2.21.C.01."

    tags="Governance,Information Security Incidents"


    classification="All Classifications"
    compliance="Must"
    cid="1226"
><![CDATA[<p class="NormS7C2">Agencies that outsource their information technology services and functions MUST ensure that the service provider advises and consults with the agency when an information security incident occurs.</p>]]></paragraph>
</block>
<block title="Cryptographic keying material"><paragraph
    title="7.2.22.R.01."

    tags="Governance,Key Management,Information Security Incidents"


><![CDATA[<p>Reporting any information security incident involving the loss or misuse of cryptographic keying material is particularly important. Systems users in this situation are those that rely on the use of cryptographic keying material for the confidentiality and integrity of their secure communications.</p>]]></paragraph>
<paragraph
    title="7.2.22.R.02."

    tags="Governance,Key Management,Information Security Incidents"


><![CDATA[<p class="Normal-nonumbering">It is important to note that a loss or compromise of keying material is a Critical or Serious information security incident and strict procedures must be followed to minimise the impact of the incident.</p>]]></paragraph>
<paragraph
    title="7.2.22.C.01."

    tags="Governance,Key Management,Information Security Incidents"


    classification="All Classifications"
    compliance="Must"
    cid="1233"
><![CDATA[<p class="NormS7C2">Agencies MUST notify all system users of any suspected or confirmed loss or compromise of keying material.</p>]]></paragraph>
</block>
<block title="Replacement of Cryptographic Key (HACE) keying material"><paragraph
    title="7.2.23.R.01."

    tags="Governance,Key Management,Information Security Incidents"


><![CDATA[<p class="NormS7C2">If an encryption key is compromised, there is no need to attack the algorithm itself and it is a trivial matter to decrypt any encrypted data.&nbsp; This is why strong key management is vital in order to protect the encryption keying materials.&nbsp; If a compromise of keying materials is known or even suspected, the cryptographic key must be replaced as a matter of urgency and measures taken to reduce the impact of the key compromise.&nbsp; See also Section 17.9 – Key Management.</p>]]></paragraph>
<paragraph
    title="7.2.23.C.01."

    tags="Governance,Key Management,Information Security Incidents"


    classification="All Classifications"
    compliance="Must"
    cid="6592"
><![CDATA[<p class="Normal-nonumbering">Agencies MUST replace compromised cryptographic keys as a matter of urgency and record the replacement in the incident reporting.</p>]]></paragraph>
</block>
<block title="High Assurance Cryptographic Equipment (HACE) keying material"><paragraph
    title="7.2.24.R.01."

    tags="Governance,High Assurance Products,Key Management,Information Security Incidents"


><![CDATA[<p>For information security incidents involving the suspected loss or compromise of HACE keying material, GCSB will investigate the possibility of compromise, and where possible, initiate action to reduce the impact of the compromise.</p>]]></paragraph>
<paragraph
    title="7.2.24.C.01."

    tags="Governance,High Assurance Products,Key Management,Information Security Incidents"


    classification="All Classifications"
    compliance="Must"
    cid="1237"
><![CDATA[<p class="Normal-nonumbering">Agencies MUST urgently notify GCSB of any suspected loss or compromise of keying material associated with HACE.</p>]]></paragraph>
</block>
</subsection>
</section>
