<section title="13.1. System Decommissioning"><subsection title="Objective"><paragraph
    title="13.1.1."


><![CDATA[<p>To ensure systems are safely decommissioned and that software, system logic and data are properly transitioned to new systems or archived in accordance with agency, legal and statutory requirements.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="13.1.2."


><![CDATA[<p>This section discusses the retirement and safe decommissioning of systems. Specific requirements on media handling, usage, sanitisation, destruction and disposal are discussed later in this chapter. System decommissioning is the retirement or termination of a system and its operations. System decommissioning does NOT deal with the theft or loss of equipment.</p>]]></paragraph>
</block>
<block title="Definitions"><paragraph
    title="13.1.3."


><![CDATA[<p>A system decommissioning will have one or more of the following characteristics:</p><ul>
<li>Ending a capability completely i.e. no migration, redevelopment or new version of a capability occurs;</li>
<li>Combining parts of existing capabilities services into a new, different system;</li>
<li>As part of wider redesign, where a capability is no longer provided and is decommissioned or merged with other capabilities or systems.</li>
</ul>]]></paragraph>
<paragraph
    title="13.1.4."


><![CDATA[<p>ICT requirements evolve as business needs change and technology advances. In some cases this will lead to the retirement and decommissioning of obsolete systems or systems surplus to requirements.</p>]]></paragraph>
<paragraph
    title="13.1.5."


><![CDATA[<p>Security requires a structured approach to decommissioning in order to cease information system operations in a planned, orderly and secure manner. It is also important that the approach for decommissioning systems is consistent and coordinated. Sanitisation is important to eliminate any remnant data that could be retrieved by unauthorised parties. These procedures include the following:</p><ul>
<li>A migration plan;</li>
<li>A decommissioning plan;</li>
<li>Archiving;</li>
<li>Safe disposal of equipment and media;</li>
<li>Robust procedures to manage any residual data and associated risk; and</li>
<li>Audit and final signoff.</li>
</ul>]]></paragraph>
<paragraph
    title="13.1.6."


><![CDATA[<p>As a final step, a review of the decommissioning should be undertaken to ensure no important elements, data or equipment have been overlooked.</p>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="13.1.7."


><![CDATA[<table class="table-main">
<tbody>
<tr>
<td>
<p><strong>Reference&nbsp;</strong></p>
</td>
<td>
<p><strong>Title</strong></p>
</td>
<td><strong>Publisher</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Risk Management And Accreditation Of Information Systems Also Released As HMG Infosec Standard No. 2, August 2005</strong></p>
</td>
<td>
<p>UK Centre for the Protection of National Infrastructure (CPNI)</p>
</td>
<td>http://www.cpni.gov.uk/Documents/Publications/2005/2005003-Risk_management.pdf</td>
</tr>
<tr>
<td>
<p><strong>SP&nbsp;<strong>800-88</strong></strong></p>
</td>
<td>
<p><strong>NIST Special Publication 800-88 Guidelines for Media Sanitization, Rev.1, December, 2014</strong></p>
</td>
<td>
<p>National Institute of Standards and Technology (NIST), U.S. Department of Commerce</p>
</td>
<td><a rel="noopener noreferrer" href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-88r1.pdf" target="_blank">https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-88r1.pdf [PDF, 532 KB]</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Better Practice Checklist – Decommissioning Government Websites, March 2011</strong></p>
</td>
<td>
<p>Australian Government Information Management Office (AGIMO)</p>
</td>
<td><a rel="noopener noreferrer" href="http://agict.gov.au/policy-guides-procurement/better-practice-checklists-guidance/bpc-decommissioning" target="_blank">http://agict.gov.au/policy-guides-procurement/better-practice-checklists-guidance/bpc-decommissioning</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="PSR references"><paragraph
    title="13.1.8."


><![CDATA[<p class="NormS6C1">Relevant PSR requirements can be found at:</p>
<table class="table-grey" style="width: 107.465%; height: 220.694px;">
<tbody>
<tr style="height: 58px;">
<td style="width: 17.2375%; height: 58px;"><strong>Reference</strong></td>
<td style="width: 15.0889%; height: 58px;"><strong>Title</strong></td>
<td style="width: 66.1834%; height: 58px;"><strong>Source</strong></td>
</tr>
<tr style="height: 162.694px;">
<td style="width: 17.2375%; height: 162.694px;">
<p><strong>PSR Mandatory Requirements</strong></p>
</td>
<td style="width: 15.0889%; height: 162.694px;">GOV3, INFOSEC1, INFOSEC2, INFOSEC3, INFOSEC4, PHYSEC1 and PHYSEC2</td>
<td style="width: 66.1834%; height: 162.694px;">
<p><a title="PSR Home" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/" target="_blank">Home | Protective Security Requirements<br></a></p>
<p><a title="Security Governance" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/security-governance" target="_blank">Security governance (GOV) | Protective Security Requirements</a></p>
<p><a title="Information Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/information-security" target="_blank">Information security (INFOSEC) | Protective Security Requirements</a></p>
<a title="Physical Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/physical-security" target="_blank">Physical security (PHYSEC) | Protective Security Requirements</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Agency Policy"><paragraph
    title="13.1.9.R.01."

    tags="Governance,Information Security Documentation,Disposal,Media Management,System Decomissioning"


><![CDATA[<p>Information systems are often supported by service and supply contracts and may also be subject to obligations to provide a service, capability or information. Decommissioning of a system will require the termination of these contracts and service obligations. Other aspects of system decommission may be subject to security, regulatory or legislative requirements. An Agency policy will provide a comprehensive approach to system decommissioning from the inception of a system, thus facilitating the termination of supply contracts and service obligations while managing any risks to the Agency.</p>]]></paragraph>
<paragraph
    title="13.1.9.C.01."

    tags="Governance,Information Security Documentation,Media Management,System Decomissioning"


    classification="All Classifications"
    compliance="Should"
    cid="3829"
><![CDATA[<p>When the Information System reaches the end of its service life in an organisation, policy and procedures SHOULD be in place to ensure secure decommissioning and transfer or disposal, in order to satisfy corporate, legal and statutory requirements.</p>]]></paragraph>
</block>
<block title="Migration plan"><paragraph
    title="13.1.10.R.01."

    tags="Governance,Information Security Documentation,Media Management,System Decomissioning"


><![CDATA[<p>Once the decision to decommission a system has been taken, it is important to migrate processes, data, users and licences to replacement systems or to cease activities in an orderly fashion. It is also important to carefully plan the decommissioning process in order to avoid disruption to other systems, ensure business continuity, ensure security, protect privacy and meet any archive and other regulatory and legislative requirements. The basis of a decommissioning plan is a risk assessment.</p>]]></paragraph>
<paragraph
    title="13.1.10.C.01."

    tags="Governance,Information Security Documentation,Media Management,System Decomissioning"


    classification="All Classifications"
    compliance="Should"
    cid="3832"
><![CDATA[<p>Agencies SHOULD undertake a risk assessment with consideration given to proportionality in respect of:</p><ul>
<li>scale and impact of the processes;</li>
<li>data;</li>
<li>users;</li>
<li>licences;</li>
<li>usage agreements; and</li>
<li>service to be migrated or decommissioned.</li>
</ul>]]></paragraph>
<paragraph
    title="13.1.10.C.02."

    tags="Governance,Information Security Documentation,Media Management,System Decomissioning"


    classification="All Classifications"
    compliance="Should"
    cid="3833"
><![CDATA[<p>The risk assessment SHOULD include the following elements:</p><ul>
<li>Evaluation of the applications inventory and identification of any redundancies;</li>
<li>Identification of data owners and key stakeholders;</li>
<li>Identification of types of information (Active or Inactive) processed and stored;</li>
<li>Identification of software and other (including non-transferable) licences;</li>
<li>Identification of access rights to be transferred or cancelled;</li>
<li>Identification of any emanation control equipment or security enhancements;</li>
<li>Consideration of short and long term reporting requirements;</li>
<li>Assessment of equipment and hardware for redeployment or disposal;</li>
<li>Identification of any cloud-based data and services; and</li>
<li>User re-training.</li>
</ul>]]></paragraph>
<paragraph
    title="13.1.10.C.03."

    tags="Governance,Information Security Documentation,Media Management,System Decomissioning"


    classification="All Classifications"
    compliance="Should"
    cid="3834"
><![CDATA[<p>Agencies SHOULD consider the need for a Privacy Impact Assessment.</p>]]></paragraph>
<paragraph
    title="13.1.10.C.04."

    tags="Governance,Information Security Documentation,Media Management,System Decomissioning"


    classification="All Classifications"
    compliance="Should"
    cid="3835"
><![CDATA[<p>Agencies SHOULD identify relevant service and legal agreements and arrange for their termination.</p>]]></paragraph>
</block>
<block title="Decommissioning plan"><paragraph
    title="13.1.11.R.01."

    tags="Governance,Information Security Documentation,Media Management,System Decomissioning"


><![CDATA[<p>The decommissioning of a system can be a complex process. A decommissioning plan is an important tool in properly managing the safe decommissioning of a system and in providing reasonable assurance that due process and agency policy has been followed.</p>]]></paragraph>
<paragraph
    title="13.1.11.C.01."

    tags="Governance,Information Security Documentation,Media Management,System Decomissioning"


    classification="All Classifications"
    compliance="Should"
    cid="3838"
><![CDATA[<p>The decommissioning plan will be based on the migration plan and SHOULD incorporate the following elements:</p><ul>
<li>An impact analysis;</li>
<li>Issue of notification to service providers, users and customers;</li>
<li>Issue of notification of decommissioning to all relevant interfaces and interconnections;</li>
<li>Timeframe, plan and schedule;</li>
<li>Data integrity and validation checks before archiving;</li>
<li>Transfer or redeployment of equipment and other assets;</li>
<li>Transfer or cancellation of licences;</li>
<li>Removal of redundant equipment and software;</li>
<li>Removal of redundant cables and termination equipment;</li>
<li>Removal of any emanation control equipment or security enhancements;</li>
<li>Return or safe disposal of any emanation control equipment or security enhancements;</li>
<li>Updates to systems configurations (switches, firewalls etc.);</li>
<li>Equipment and media sanitisation including any cloud-based data &amp; services(discussed later in this chapter);</li>
<li>Equipment and media disposal (discussed later in this chapter);</li>
<li>Any legal considerations for supply or service contract terminations;</li>
<li>Asset register updates; and</li>
<li>Retraining for, or redeployment of, support staff.</li>
</ul>]]></paragraph>
</block>
<block title="Archiving"><paragraph
    title="13.1.12.R.01."

    tags="Governance,Media Management,System Decomissioning"


><![CDATA[<p>Availability and integrity requirements in respect of information may persist for legal and other statutory or compliance reasons and require transfer to other ownership or custodianship for archive purposes. This will also require assurance that the data can continue to be accessed when required (availability) and assurance that it remains unchanged (integrity).</p>]]></paragraph>
<paragraph
    title="13.1.12.R.02."

    tags="Governance,Media Management,System Decomissioning"


><![CDATA[<p>Confidentiality requirements must also be considered. If an information system has been processing sensitive information or contains sensitive security components, which attract special handling requirements, it will require robust purging and overwrites or destruction. There are a number of methods and proprietary products available for such purposes.</p>]]></paragraph>
<paragraph
    title="13.1.12.C.01."

    tags="Governance,Media Management,System Decomissioning"


    classification="All Classifications"
    compliance="Should"
    cid="3842"
><![CDATA[<p>Agencies SHOULD identify data retention policies, regulation and legislation.</p>]]></paragraph>
<paragraph
    title="13.1.12.C.02."

    tags="Governance,Media Management,System Decomissioning"


    classification="All Classifications"
    compliance="Should"
    cid="3844"
><![CDATA[<p>Agencies SHOULD ensure adequate system documentation is archived.</p>]]></paragraph>
<paragraph
    title="13.1.12.C.03."

    tags="Governance,Media Management,System Decomissioning"


    classification="All Classifications"
    compliance="Should"
    cid="3845"
><![CDATA[<p>Agencies SHOULD archive essential software, system logic, system documentation and other system data to allow information to be recovered from archive.</p>]]></paragraph>
</block>
<block title="Audit and Final signoff"><paragraph
    title="13.1.13.R.01."

    tags="Governance,Media Management,System Decomissioning"


><![CDATA[<p>Update the organisation’s tracking and management systems to identify the specific information system components that are being removed from the inventory. To comply with governance, asset management and audit requirements, the Agency’s Accreditation Authority will certify that appropriate processes have been followed. This demonstrates good governance and avoids privacy breaches.</p>]]></paragraph>
<paragraph
    title="13.1.13.C.01."

    tags="Governance,Media Management,System Decomissioning"


    classification="All Classifications"
    compliance="Should"
    cid="3850"
><![CDATA[<p>The Agency’s Accreditation Authority SHOULD confirm IA compliance on decommissioning and disposal.</p>]]></paragraph>
<paragraph
    title="13.1.13.C.02."

    tags="Governance,Media Management,System Decomissioning"


    classification="All Classifications"
    compliance="Should"
    cid="3852"
><![CDATA[<p>The Agency’s Accreditation Authority SHOULD confirm secure equipment and media disposal.</p>]]></paragraph>
<paragraph
    title="13.1.13.C.03."

    tags="Governance,Media Management,System Decomissioning"


    classification="All Classifications"
    compliance="Should"
    cid="3853"
><![CDATA[<p>The Agency’s Accreditation Authority SHOULD confirm asset register updates.</p>]]></paragraph>
<paragraph
    title="13.1.13.C.04."

    tags="Governance,Media Management,System Decomissioning"


    classification="All Classifications"
    compliance="Should"
    cid="3855"
><![CDATA[<p>Once all security relevant activities associated with decommissioning and disposal have been completed and verified, a Security Decommissioning Compliance Certificate SHOULD be issued by the Agency’s Accreditation Authority.</p>]]></paragraph>
</block>
<block title="Final Review"><paragraph
    title="13.1.14.R.01."

    tags="Governance,Media Management,System Decomissioning"


><![CDATA[<p>As a final step, a review of the decommissioning should be undertaken to ensure no important elements, data, equipment, contractual or legislative, obligations have been overlooked.</p>]]></paragraph>
<paragraph
    title="13.1.14.C.01."

    tags="Governance,Media Management,System Decomissioning"


    classification="All Classifications"
    compliance="Should"
    cid="3862"
><![CDATA[<p>Agencies SHOULD undertake a post-decommissioning review.</p>]]></paragraph>
</block>
</subsection>
</section>
