<section title="9.1. Information Security Awareness and Training"><subsection title="Objective"><paragraph
    title="9.1.1."


><![CDATA[<p>A security culture is fostered through induction training and ongoing security education tailored to roles, responsibilities, changing threat environment and sensitivity of information, systems and operations.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="9.1.2."


><![CDATA[<p>This section covers information relating specifically to information security awareness and training.</p>]]></paragraph>
</block>
</subsection>
<subsection title="PSR references"><paragraph
    title="9.1.3."


><![CDATA[<p class="NormS6C1">Relevant PSR requirements can be found at:</p>
<table class="table-grey">
<tbody>
<tr>
<td>
<p><strong>Reference</strong></p>
</td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td>
<p><strong>PSR Mandatory Requirements</strong></p>
</td>
<td>
<p><a title="PSR Home" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/" target="_blank">Home | Protective Security Requirements</a><br><br><a title="Security Governance" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/security-governance" target="_blank">Security governance (GOV) | Protective Security Requirements</a></p>
<p><a title="Information Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/information-security" target="_blank">Information security (INFOSEC) | Protective Security Requirements</a> &nbsp;</p>
<a title="Personnel Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/personnel-security" target="_blank">Personnel security (PERSEC) | Protective Security Requirements</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Information security awareness and training responsibility"><paragraph
    title="9.1.4.R.01."

    tags="Governance,Personnel Security"


><![CDATA[<p>Agency management is <span style="text-decoration: underline;">responsible</span> for ensuring that an appropriate information security awareness and a training program is provided for all personnel. Without management support, security personnel might not have sufficient resources to facilitate awareness and training for other personnel.</p>]]></paragraph>
<paragraph
    title="9.1.4.R.02."

    tags="Governance,Personnel Security"


><![CDATA[<p>Awareness and knowledge degrades over time without ongoing refresher training and updates. Providing ongoing information security awareness and training will assist in keeping personnel aware of issues and their responsibilities.</p>]]></paragraph>
<paragraph
    title="9.1.4.R.03."

    tags="Governance,Personnel Security"


><![CDATA[<p>Methods that can be used to continually promote awareness include logon banners, system access forms and departmental bulletins and memoranda.</p>]]></paragraph>
<paragraph
    title="9.1.4.C.01."

    tags="Governance,Personnel Security"


    classification="All Classifications"
    compliance="Must"
    cid="1449"
><![CDATA[<p>Agency management MUST ensure that all personnel who have access to a system have sufficient training and ongoing information security awareness.</p>]]></paragraph>
</block>
<block title="Information security awareness and training"><paragraph
    title="9.1.5.R.01."

    tags="Governance,Personnel Security"


><![CDATA[<p>Information security awareness and training programs are designed to help system users:</p><ul>
<li>become familiar with their roles and responsibilities;</li>
<li>understand any legislative or regulatory mandates and requirements;</li>
<li>understand any national or agency policy mandates and requirements;</li>
<li>understand and support security requirements; </li>
<li>assist in maintaining security; and</li>
<li>learn how to fulfil their security responsibilities.</li>
</ul>]]></paragraph>
<paragraph
    title="9.1.5.C.01."

    tags="Governance,Personnel Security"


    classification="All Classifications"
    compliance="Must"
    cid="1452"
><![CDATA[<p>Agencies MUST provide ongoing information security awareness and a training programme for personnel on topics such as responsibilities, legislation and regulation, consequences of non-compliance with information security policies and procedures, and potential security risks and counter-measures.</p>]]></paragraph>
<paragraph
    title="9.1.5.C.02."

    tags="Governance,Personnel Security"


    classification="All Classifications"
    compliance="Must"
    cid="1453"
><![CDATA[<p>Agencies MUST provide information security awareness training as part of their employee induction programmes.</p>]]></paragraph>
</block>
<block title="Degree and content of information security awareness and training"><paragraph
    title="9.1.6.R.01."

    tags="Governance,Personnel Security"


><![CDATA[<p>The detail, content and coverage of information security awareness and training will depend on the objectives of the organisation. Personnel with responsibilities beyond that of a general user should have tailored training to meet their needs.</p>]]></paragraph>
<paragraph
    title="9.1.6.R.02."

    tags="Governance,Personnel Security"


><![CDATA[<p>As part of the guidance provided to system users, there should be sufficient emphasis placed on the activities that are NOT allowed on systems. The minimum list of content will also ensure that personnel are sufficiently exposed to issues that could cause an information security incident through lack of awareness or through lack of knowledge.</p>]]></paragraph>
<paragraph
    title="9.1.6.C.01."

    tags="Governance,Personnel Security"


    classification="All Classifications"
    compliance="Should"
    cid="1457"
><![CDATA[<p>Agencies SHOULD align the detail, content and coverage of information security awareness and training programmes to system user responsibilities.</p>]]></paragraph>
<paragraph
    title="9.1.6.C.02."

    tags="Governance,Personnel Security"


    classification="All Classifications"
    compliance="Should"
    cid="1458"
><![CDATA[<p>Agencies SHOULD ensure that information security awareness and training includes information on:</p><ul>
<li>the purpose of the training or awareness program;</li>
<li>any legislative or regulatory mandates and requirements;</li>
<li>any national or agency policy mandates and requirements;</li>
<li>agency security appointments and contacts;</li>
<li>the legitimate use of system accounts, software and classified information;</li>
<li>the security of accounts, including shared passwords;</li>
<li>authorisation requirements for applications, databases and data;</li>
<li>the security risks associated with non-agency systems, particularly the Internet;</li>
<li>reporting any suspected compromises or anomalies;</li>
<li>reporting requirements for information security incidents, suspected compromises or anomalies;</li>
<li>classifying, marking, controlling, storing and sanitising media;</li>
<li>protecting workstations from unauthorised access;</li>
<li>informing the support section when access to a system is no longer needed; </li>
<li>observing rules and regulations governing the secure operation and authorised use of systems; and</li>
<li>supporting documentation such as SOPs and user guides.</li>
</ul>]]></paragraph>
<paragraph
    title="9.1.6.C.03."

    tags="Governance,Personnel Security"


    classification="All Classifications"
    compliance="Should"
    cid="1459"
><![CDATA[<p>Agencies SHOULD ensure that information security awareness and training includes advice to system users not to attempt to:</p><ul>
<li>tamper with the system;</li>
<li>bypass, strain or test information security mechanisms;</li>
<li>introduce or use unauthorised IT equipment or software on a system;</li>
<li>replace items such as keyboards, pointing devices and other peripherals with personal equipment;</li>
<li>assume the roles and privileges of others;</li>
<li>attempt to gain access to classified information for which they have no authorisation; or</li>
<li>relocate equipment without proper authorisation.</li>
</ul>]]></paragraph>
</block>
<block title="System familiarisation training"><paragraph
    title="9.1.7.R.01."

    tags="Governance,Personnel Security"


><![CDATA[<p>A TOP SECRET system needs increased awareness by personnel. Ensuring familiarisation with information security policies and procedures, the secure operation of the system and basic information security training, will provide them with specific knowledge relating to these types of systems.</p>]]></paragraph>
<paragraph
    title="9.1.7.C.01."

    tags="Governance,Personnel Security"


    classification="Top Secret"
    compliance="Must"
    cid="1462"
><![CDATA[<p>Agencies MUST provide all system users with familiarisation training on the information security policies and procedures and the secure operation of the system before being granted unsupervised access to the system.</p>]]></paragraph>
</block>
<block title="Disclosure of information while on courses"><paragraph
    title="9.1.8.R.01."

    tags="Governance,Personnel Security"


><![CDATA[<p>Government personnel attending courses with non-government personnel may not be aware of the consequences of disclosing information relating to the security of their agency’s systems. Raising awareness of such consequences in personnel will assist in preventing disclosures that could lead to a targeted attack being launched against an agency’s systems.</p>]]></paragraph>
<paragraph
    title="9.1.8.C.01."

    tags="Governance,Personnel Security"


    classification="All Classifications"
    compliance="Should"
    cid="1465"
><![CDATA[<p>Agencies SHOULD advise personnel attending courses along with non-government personnel not to disclose any details that could be used to compromise agency security.</p>]]></paragraph>
</block>
</subsection>
</section>
