<section title="9.2. Authorisations, Security Clearances And Briefings"><subsection title="Objective"><paragraph
    title="9.2.1."


><![CDATA[<p>Only appropriately authorised, cleared and briefed personnel are allowed access to systems.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="9.2.2."


><![CDATA[<p>This section covers information relating to the authorisations, security clearances and briefings required by personnel to access systems. Information on the technical implementation of access controls for systems can be found in Section 16.2 - System Access.</p>]]></paragraph>
</block>
<block title="Security clearances – New Zealand and foreign"><paragraph
    title="9.2.3."


><![CDATA[<p>Where this manual refers to security clearances, the reference applies to a National Security Clearance granted by a New Zealand government agency. Foreign nationals may be granted a National Security Clearance if <strong>identified</strong> risks can be mitigated. Refer to <a title="Personnel Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/personnel-security" target="_blank">PSR&nbsp;Personnel Security</a> for more information.&nbsp;</p>]]></paragraph>
<paragraph
    title="9.2.4."


><![CDATA[<p>Such security clearances are required for many roles worldwide by government, commercial and other organisations where there is a requirement for assurance of the ability of an individual and organisation to securely access, manage, and protect confidential, sensitive or classified information.  Not all security clearances will grant the same level or types of access.</p>]]></paragraph>
<paragraph
    title="9.2.5."


><![CDATA[<p>The process invariably includes background or security checks on the individual, a briefing and then signing documents, in which the individual formally acknowledges the legal requirements to not share such information with unauthorised individuals or organisations.  This will include a requirement not to inappropriately remove, store or access classified documents or other sensitive information.</p>]]></paragraph>
<paragraph
    title="9.2.6."


><![CDATA[<p>In New Zealand there are two security authorisation processes:</p><ol style="list-style-type: lower-roman;">
<li>for information classified CONFIDENTIAL and above; and</li>
<li>for information classified RESTRICTED and below.</li>
</ol>]]></paragraph>
<paragraph
    title="9.2.7."


><![CDATA[<p>For information classified&nbsp;<strong>CONFIDENTIAL and above</strong>&nbsp;a formal vetting process is required to gain a <strong>National Security Clearance</strong>.&nbsp; Refer to the&nbsp;<a title="PSR" rel="noopener noreferrer" href="https://protectivesecurity.govt.nz" target="_blank">PSR</a>&nbsp;for more detail of vetting requirements and the process for applying for National Security Clearance.</p>]]></paragraph>
<paragraph
    title="9.2.8."


><![CDATA[<p>For information classified <strong>RESTRICTED and below</strong>, the authorisations, security checks and supporting briefings form part of the Agency’s recruitment and induction processes for all staff.  These authorisations, security checks and briefings are evidenced by a formal record of approval of the authorisation, the requirement for a security check and a signed acknowledgement from the individual staff member. The level of detail for the agency's process will depend on the role, tasks and position of the agency employee.</p>]]></paragraph>
</block>
</subsection>
<subsection title="PSR References"><paragraph
    title="9.2.9."


><![CDATA[<p>Additional policy and information on granting and maintaining security clearances can be found in:</p>
<table class="table-grey">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td>
<p><strong>PSR Mandatory Requirements</strong></p>
</td>
<td>
<p>GOV4, INFOSEC1, PERSEC1, PERSEC2, PERSEC3, PERSEC4, PHYSEC1 and PHYSEC2</p>
</td>
<td>
<p><a title="PSR Home" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz" target="_blank">Home | Protective Security Requirements<br></a></p>
<p><a title="Security Governance" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/security-governance" target="_blank">Security governance (GOV) | Protective Security Requirements</a></p>
<p><a title="Information Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/information-security" target="_blank">Information security (INFOSEC) | Protective Security Requirements</a></p>
<p><a title="Personnel Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/personnel-security" target="_blank">Personnel security (PERSEC) | Protective Security Requirements</a></p>
<a title="Physical Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/physical-security" target="_blank">Physical security (PHYSEC) | Protective Security Requirements</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Documenting authorisations, security clearance and briefing requirements"><paragraph
    title="9.2.10.R.01."

    tags="Governance,Information Security Documentation,Personnel Security"


><![CDATA[<p>Ensuring that the requirements for access to a system are documented and agreed upon will assist in determining if system users have appropriate authorisations, security clearances and need-to-know to access the system.</p>]]></paragraph>
<paragraph
    title="9.2.10.R.02."

    tags="Governance,Information Security Documentation,Physical Security"


><![CDATA[<p>Types of system users for which access requirements will need to be documented include general users, privileged users, system administrators, contractors and visitors.</p>]]></paragraph>
<paragraph
    title="9.2.10.C.01."

    tags="Governance,Information Security Documentation,Personnel Security"


    classification="All Classifications"
    compliance="Must"
    cid="1480"
><![CDATA[<p>Agencies MUST specify in the System Security Plan (SSP) any authorisations, security clearances and briefings necessary for system access.</p>]]></paragraph>
</block>
<block title="Authorisation and system access"><paragraph
    title="9.2.11.R.01."

    tags="Governance,Personnel Security,System Access"


><![CDATA[<p>Personnel seeking access to a system will need to have a genuine business requirement to access the system as verified by their supervisor or manager. Once a requirement to access a system is established, the system user should be given only the privileges that they need to undertake their duties. Providing all system users with privileged access when there is no such requirement can cause significant security vulnerabilities in a system.</p>]]></paragraph>
<paragraph
    title="9.2.11.C.01."

    tags="Governance,Personnel Security,System Access"


    classification="Top Secret"
    compliance="Must"
    cid="1483"
><![CDATA[<p>Agencies MUST:</p><ul>
<li>limit system access on a need-to-know/need-to-access basis;</li>
<li>provide system users with the least amount of privileges needed to undertake their duties; and</li>
<li>have any requests for access to a system authorised by the supervisor or manager of the system user.</li>
</ul>]]></paragraph>
<paragraph
    title="9.2.11.C.02."

    tags="Governance,Personnel Security,System Access"


    classification="All Classifications"
    compliance="Should"
    cid="1484"
><![CDATA[<p>Agencies SHOULD:</p><ul>
<li>limit system access on a need-to-know/need-to-access basis;</li>
<li>provide system users with the least amount of privileges needed to undertake their duties;</li>
<li>have any requests for access to a system authorised by the supervisor or manager of the system user; and</li>
<li>ensure a formal acknowledgement of the security briefing is obtained and recorded.</li>
</ul>]]></paragraph>
</block>
<block title="Recording authorisation for personnel to access systems"><paragraph
    title="9.2.12.R.01."

    tags="Governance,Information Security Documentation,Personnel Security,System Access"


><![CDATA[<p>In many cases, the requirement to maintain a secure record of all personnel authorised to access a system, their user identification, who provided the authorisation and when the authorisation was granted, can be met by retaining a completed system account request form signed by the supervisor or manager of the system user.</p>]]></paragraph>
<paragraph
    title="9.2.12.C.01."

    tags="Governance,Information Security Documentation,Personnel Security,System Access"


    classification="All Classifications"
    compliance="Should"
    cid="1487"
><![CDATA[<p>Agencies SHOULD:</p><ul>
<li>maintain a secure record of:
<ul>
<li>all authorised system users;</li>
<li>their user identification;</li>
<li>why access is required;</li>
<li>role and privilege level,</li>
<li>who provided the authorisation to access the system;</li>
<li>when the authorisation was granted; and</li>
</ul>
</li>
<li>keep a copy of&nbsp;the acknowledgement signed by the individual granted a clearance; and</li>
<li>maintain the record, for the life of the system or information to which access is granted, or the length of employment, whichever is the longer.</li>
</ul>]]></paragraph>
</block>
<block title="Security clearance for system access"><paragraph
    title="9.2.13.R.01."

    tags="Governance,Personnel Security,System Access"


><![CDATA[<p>Information classified as CONFIDENTIAL and above requires personnel to have been granted a formal security clearance before access is granted. Refer to the <a title="Personnel Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/personnel-security" target="_blank">PSR Policy Framework - Personnel Security</a>.</p>]]></paragraph>
<paragraph
    title="9.2.13.C.01."

    tags="Governance,Personnel Security,System Access"


    classification="Confidential, Top Secret, Secret"
    compliance="Must Not"
    cid="1490"
><![CDATA[<p>System users MUST NOT be granted access to systems or information classified CONFIDENTIAL or above unless vetting procedures have been completed and formal security clearance granted.</p>]]></paragraph>
<paragraph
    title="9.2.13.C.02."

    tags="Governance,Personnel Security,System Access"


    classification="All Classifications"
    compliance="Must"
    cid="1491"
><![CDATA[<p>All system users MUST:</p>
<ul>
<li>hold a security clearance or other authorisation appropriate for the system classification; or</li>
<li>have been granted access in accordance with the requirements in the <a title="PSR Personnel security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/personnel-security" target="_blank">PSR</a> for emergency access.</li>
</ul>]]></paragraph>
</block>
<block title="System access briefings"><paragraph
    title="9.2.14.R.01."

    tags="Governance,Personnel Security,System Access"


><![CDATA[<p>Some systems process endorsed or compartmented information. As such, unique briefings may exist that system users need to receive before being granted access to the system. All system users will require a briefing on their responsibilities on access to and use of the system to which they have been granted access to avoid inadvertent errors and security breaches. Specialised system training may also be required.</p>]]></paragraph>
<paragraph
    title="9.2.14.C.01."

    tags="Governance,Personnel Security,System Access"


    classification="All Classifications"
    compliance="Must"
    cid="1494"
><![CDATA[<p>All system users MUST have received any necessary briefings before being granted access to compartmented or endorsed information or systems.</p>]]></paragraph>
</block>
<block title="Access by foreign nationals to NZEO systems"><paragraph
    title="9.2.15.R.01."

    tags="Governance,Personnel Security,System Access"


><![CDATA[<p>NZEO information is restricted to New Zealand nationals.</p>]]></paragraph>
<paragraph
    title="9.2.15.C.01."

    tags="Governance,Personnel Security,System Access"


    classification="All Classifications"
    compliance="Must Not"
    cid="1497"
><![CDATA[<p>Where systems process, store or communicate unprotected NZEO information, agencies MUST NOT allow foreign nationals, including seconded foreign nationals, to have access to the system.</p>]]></paragraph>
<paragraph
    title="9.2.15.C.02."

    tags="Governance,Personnel Security,System Access"


    classification="All Classifications"
    compliance="Must Not"
    cid="1498"
><![CDATA[<p>Where agencies protect NZEO information on a system by implementing controls to ensure that NZEO information is not passed to, or made accessible to, foreign nationals, agencies MUST NOT allow foreign nationals, including seconded foreign nationals, to have access to the system.</p>]]></paragraph>
</block>
<block title="Access by foreign nationals to New Zealand systems"><paragraph
    title="9.2.16.R.01."

    tags="Governance,Personnel Security,System Access"


><![CDATA[<p>When information from foreign nations is entrusted to the New Zealand Government, care needs to be taken to ensure that foreign nationals do not have access to such information unless it has also been released to their country.</p>]]></paragraph>
<paragraph
    title="9.2.16.C.01."

    tags="Governance,Personnel Security,System Access"


    classification="All Classifications"
    compliance="Must Not"
    cid="1501"
><![CDATA[<p>Where systems process, store or communicate classified information with nationality releasability markings, agencies MUST NOT allow foreign nationals, including seconded foreign nationals, to have access to such information that is not marked as releasable to their nation.</p>]]></paragraph>
</block>
<block title="Granting limited higher access"><paragraph
    title="9.2.17.R.01."

    tags="Governance,Personnel Security,System Access"


><![CDATA[<p>Under exceptional circumstances, temporary access to systems classified RESTRICTED and below may be granted.</p>]]></paragraph>
<paragraph
    title="9.2.17.C.01."

    tags="Governance,Personnel Security,System Access"


    classification="Confidential, Top Secret, Secret"
    compliance="Must Not"
    cid="1504"
><![CDATA[<p>Agencies MUST NOT permit limited higher access for systems and information classified CONFIDENTIAL or above.</p>]]></paragraph>
<paragraph
    title="9.2.17.C.02."

    tags="Governance,Personnel Security,System Access"


    classification="All Classifications"
    compliance="Must"
    cid="1505"
><![CDATA[<p>Agencies granting <strong>limited</strong> higher access to information or systems MUST ensure that:</p><ul>
<li>the requirement to grant limited higher access is temporary in nature and is an exception rather than the norm;</li>
<li>an ITSM has recommended the limited higher access;</li>
<li>a cessation date for limited higher access has been set;</li>
<li>the access period does not exceed two months;</li>
<li>the limited higher access is granted on an occasional NOT non-ongoing basis;</li>
<li>the system user is not granted privileged access to the system;</li>
<li>the system user’s access is formally documented; and</li>
<li>the system user’s access is approved by the CISO.</li>
</ul>]]></paragraph>
</block>
<block title="Controlling limited higher access"><paragraph
    title="9.2.18.R.01."

    tags="Governance,Personnel Security,System Access"


><![CDATA[<p>When personnel are granted access to a system under the provisions of limited higher access they need to be closely supervised or have their access controlled such that they have access only to that information they require to undertake their duties.</p>]]></paragraph>
<paragraph
    title="9.2.18.C.01."

    tags="Governance,Personnel Security,System Access"


    classification="All Classifications"
    compliance="Must"
    cid="1508"
><![CDATA[<p>Agencies granting <strong>limited</strong> higher access to a system MUST ensure that:</p><ul>
<li>the approval for access is formally acknowledged and recorded; and either
<ul>
<li>effective controls are in place to restrict access <strong>only</strong> to classified information that is necessary to undertake the system user’s duties; or</li>
<li>the system user is continually supervised by another system user who has the appropriate security clearances to access the system.</li>
</ul>
</li>
</ul>]]></paragraph>
</block>
<block title="Granting emergency access"><paragraph
    title="9.2.19.R.01."

    tags="Governance,Personnel Security,System Access"


><![CDATA[<p>Emergency access to a system may be granted where there is an immediate and critical need to access information for which personnel do not have the appropriate security clearances. Such access will need to be granted by the agency head or their delegate and be formally documented.</p>]]></paragraph>
<paragraph
    title="9.2.19.R.02."

    tags="Governance,Personnel Security,System Access"


><![CDATA[<p>It is important that appropriate debriefs take place at the conclusion of any emergency in order to manage the ongoing security of information and systems and to identify “lessons learned”.</p>]]></paragraph>
<paragraph
    title="9.2.19.C.01."

    tags="Governance,Personnel Security,System Access"


    classification="Confidential, Top Secret, Secret"
    compliance="Must Not"
    cid="1512"
><![CDATA[<p>Emergency access MUST NOT be granted unless personnel have a security clearance to at least CONFIDENTIAL level.</p>]]></paragraph>
<paragraph
    title="9.2.19.C.02."

    tags="Governance,Personnel Security,System Access"


    classification="Confidential, Secret, Top Secret"
    compliance="Must Not"
    cid="1513"
><![CDATA[<p>Emergency access MUST NOT be used on reassignment of duties while awaiting completion of full security clearance procedures.</p>]]></paragraph>
<paragraph
    title="9.2.19.C.03."

    tags="Governance,Personnel Security,System Access"


    classification="All Classifications"
    compliance="Must"
    cid="1514"
><![CDATA[<p>Agencies granting emergency access to a system MUST ensure that:</p><ul>
<li>the requirements to grant emergency access is due to an immediate and critical need to access classified information and there is insufficient time to complete clearance procedures;</li>
<li>the agency head or their delegate has approved the emergency access;</li>
<li>the system user’s access is formally documented;</li>
<li>the system user’s access is reported to the CISO; </li>
<li>appropriate briefs and debriefs for the information and system are conducted;</li>
<li>access is limited to information and systems necessary to deal with the particular emergency and is governed by strict application of the “need to know” principle; </li>
<li>emergency access is limited to ONE security clearance level higher than the clearance currently held; and</li>
<li>the security clearance process is completed as soon as possible.</li>
</ul>]]></paragraph>
<paragraph
    title="9.2.19.C.04."

    tags="Governance,Personnel Security,System Access"


    classification="Secret, Top Secret, Confidential"
    compliance="Must"
    cid="1515"
><![CDATA[<p>Personnel granted emergency access MUST be debriefed at the conclusion of the emergency.</p>]]></paragraph>
</block>
<block title="Accessing endorsed or compartmented information"><paragraph
    title="9.2.20.R.01."

    tags="Governance,Personnel Security,System Access"


><![CDATA[<p>Limited higher access to systems processing, storing or communicating endorsed or compartmented information is not permitted.</p>]]></paragraph>
<paragraph
    title="9.2.20.C.01."

    tags="Governance,Personnel Security,System Access"


    classification="All Classifications"
    compliance="Must Not"
    cid="1518"
><![CDATA[<p>Agencies MUST NOT grant limited higher access to systems that process, store or communicate endorsed or compartmented information.</p>]]></paragraph>
</block>
</subsection>
</section>
