<section title="20.1. Cloud Computing"><subsection title="Objective"><paragraph
    title="20.1.1."


><![CDATA[<p>Cloud systems risks are identified and managed and that Official Information and agency information systems are protected in accordance with Cabinet Directives, the <a title="PSR" rel="noopener noreferrer" href="https://protectivesecurity.govt.nz/" target="_blank">PSR</a>, <a title="Classification System" rel="noopener noreferrer" href="https://protectivesecurity.govt.nz/classification-system/" target="_blank">the New Zealand Government Security Classification System</a>, the NZISM and with other government security&nbsp;requirements and guidance.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Terminology"><paragraph
    title="20.1.2."


><![CDATA[<p>Terminology and definitions of cloud models and services used in this section are consistent with NIST Special Publication 800-145, The NIST Definition of Cloud Computing, dated September 2011 (see table of References below).</p>]]></paragraph>
<paragraph
    title="20.1.3."


><![CDATA[<p>A fundamental construct in the management of risk in cloud environment is that of Trust Zones and Trust Boundaries. &nbsp;A Trust Zone is a zoning construct based on levels of trust, classification, information asset value and essential information security. &nbsp;A Trust Boundary is the interface between two or more Trust Zones. &nbsp;Trust Zones use the principles of separation and segregation to manage sensitive information assets and ensure security policies are consistently applied to all assets in a particular trust Zone. &nbsp;Refer also to <a href="http://nzism.gcsb.govt.nz/ism-document#Section-17306">Section 22.2 – Virtualisation</a>.</p>]]></paragraph>
</block>
<block title="Separation and Segregation"><paragraph
    title="20.1.4."


><![CDATA[<p>Separation and Segregation is determined by system function and the sensitivity of the data the system stores, processes and transmits. &nbsp;One common example is placing systems that require a connection to the Internet into a demilitarized zone (DMZ) that is separated and segregated (isolated) from more sensitive systems.</p>]]></paragraph>
<paragraph
    title="20.1.5."


><![CDATA[<p>Separation and Segregation limits the ability of an intruder to exploit a vulnerability with the intent of elevating privileges to gain access to more sensitive systems on the internal network. &nbsp;VLANs may be used to further separate systems by controlling access and providing segregation thus giving additional protection.</p>]]></paragraph>
</block>
<block title="Mandates and Requirements"><paragraph
    title="20.1.6."


><![CDATA[<p>In August 2013, the Government introduced their approach to cloud computing, establishing a ‘cloud first’ policy and an All-of-Government direction to cloud services development and deployment. This is enabled by the Cabinet Minute [CAB Min (13) 37/6B].</p>]]></paragraph>
<paragraph
    title="20.1.7."


><![CDATA[<p>Under the ‘cloud first’ policy state service agencies are expected to adopt approved cloud services either when faced with new procurements, or an upcoming contract extension decision.</p>]]></paragraph>
<paragraph
    title="20.1.8."


><![CDATA[<p>In October 2013 the Government approved the GCIO risk and assurance framework for cloud computing, which agencies must follow when they are considering using cloud services [CAB Min (13) 37/6B]. &nbsp;It also directs that no data classified above RESTRICTED should be held in a <em>public</em> cloud, whether it is hosted onshore or offshore.</p>]]></paragraph>
<paragraph
    title="20.1.9."


><![CDATA[<p>It is important to note that although agencies can outsource <strong>responsibility</strong> to a service provider for implementing, managing and maintaining security controls, they cannot outsource their <strong>accountability</strong> for ensuring their data is appropriately protected.</p>]]></paragraph>
</block>
<block title="Background"><paragraph
    title="20.1.10."


><![CDATA[<p>The adoption of cloud technologies and services, the hosting of critical data in the cloud and the risk environment requires that agencies exercise caution. &nbsp;Many cloud users are driven by the need for performance, scalability, resource sharing and cost saving so a comprehensive risk assessment is essential in identifying and managing jurisdictional, sovereignty, governance, technical and security risks.</p>]]></paragraph>
<paragraph
    title="20.1.11."


><![CDATA[<p>Typically agencies and other organisations start with a small, private cloud, allowing technical and security architectures, management processes and security controls to be developed and tested and gain some familiarity with cloud technologies and processes. &nbsp;These organisations then progress by using non-critical data, for example email, and other similar applications, in a hybrid, private or public cloud environment.</p>]]></paragraph>
<paragraph
    title="20.1.12."


><![CDATA[<p>There are a number of technical risks associated with cloud computing, in addition to the existing risks inherent in organisational systems. &nbsp;Attention must also be paid to the strategic, governance and management risks of cloud computing. &nbsp;Security architecture and security controls also require careful risk assessment and consideration.</p>]]></paragraph>
<paragraph
    title="20.1.13."


><![CDATA[<p>Cloud service providers will invariably seek to limit services, liability, compensation or penalties through carefully worded service contracts, which may present particular risks.</p>]]></paragraph>
<paragraph
    title="20.1.14."


><![CDATA[<p>Much has been made of the operational cost savings related to cloud technologies, particularly a lower cost of operating. &nbsp;Less obvious are the risks and related cost of managing risk to an acceptable level. &nbsp;It is important to note that short term overall cost increases may, in some cases, be attributed to the adoption of cloud technologies and architectures.</p>]]></paragraph>
<paragraph
    title="20.1.15."


><![CDATA[<p>Some valuable work in mapping the cloud risk landscape has been undertaken by such organisations as the Cloud Security Alliance, the US National Institute of Standards and Technology (NIST), the UK’s Cloud Industry Forum and the European Network and Information Security Agency (ENISA). &nbsp;It is important to note that the extent of the risk landscape continues to evolve and expand.</p>]]></paragraph>
</block>
<block title="Scope"><paragraph
    title="20.1.16."


><![CDATA[<p>This section provides information and some guidance on the risks associated with cloud computing, its implementation and ongoing use. &nbsp;Some controls are specified but agencies will necessarily undertake their own comprehensive risk assessment and select controls to manage those risks.</p>]]></paragraph>
</block>
</subsection>
<subsection title="References - Guidance"><paragraph
    title="20.1.17."


><![CDATA[<p>While NOT an exhaustive list, further information on Cloud can be found at:</p>
<table class="table-main">
<tbody>
<tr>
<td><strong>Reference&nbsp;</strong></td>
<td><strong>Title</strong></td>
<td><strong>Publisher</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td><strong>CAB Min (12) 29/8A</strong>&nbsp;</td>
<td>
<p><strong>Cabinet Minute of Decision – CAB Min (12) 29/8A – ‘Cloud First’ Policy</strong></p>
</td>
<td style="text-align: center;">
<p><span>Cabinet Office</span></p>
</td>
<td>&nbsp;</td>
</tr>
<tr>
<td><strong>CAB Min (13) 37/6B</strong>&nbsp;</td>
<td>
<p><strong>Cabinet Minute of Decision – CAB Min (13) 37/6B – Cloud Computing Risk and Assurance Framework</strong></p>
</td>
<td style="text-align: center;">
<p>Cabinet Office</p>
</td>
<td>
<p>&nbsp;<a rel="noopener noreferrer" href="https://www.digital.govt.nz/standards-and-guidance/technology-and-architecture/cloud-services/about/cabinet-minutes/" target="_blank">Cabinet minutes for public cloud services | NZ Digital government</a></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>All-of-Government Cloud Services</strong></p>
</td>
<td style="text-align: center;">
<p>Government Chief Information Officer</p>
</td>
<td>
<p><a rel="noopener noreferrer" href="https://www.digital.govt.nz/standards-and-guidance/technology-and-architecture/cloud-services/" target="_blank">https://www.digital.govt.nz/standards-and-guidance/technology-and-architecture/cloud-services/</a></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Risk Assessment Process: Information Security</strong></p>
</td>
<td style="text-align: center;">
<p>Government Chief Information Officer</p>
</td>
<td>
<p><a title="Risk Assessment Process: Information Security" rel="noopener noreferrer" href="https://www.digital.govt.nz/dmsdocument/3~Risk-Assessment-Process-Information-Security.pdf" target="_blank">https://www.digital.govt.nz/dmsdocument/3~Risk-Assessment-Process-Information-Security.pdf [PDF, 282 KB]</a></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Government Use of Offshore Information and Communication Technologies (ICT) Service Providers – Advice on Risk Management April 2009</strong></p>
</td>
<td style="text-align: center;">
<p>State Services Commission</p>
</td>
<td>
<p><a rel="noopener noreferrer" href="http://ict.govt.nz/assets/ICT-System-Assurance/offshore-ICT-service-providers-april-2009.pdf" target="_blank">http://ict.govt.nz/assets/ICT-System-Assurance/offshore-ICT-service-providers-april-2009.pdf</a></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Cloud Computing a Guide to Making the Right Choices – February 2013</strong></p>
</td>
<td style="text-align: center;">
<p>Office of the Privacy Commissioner (OPC)</p>
</td>
<td>
<p><a rel="noopener noreferrer" href="https://www.privacy.org.nz/publications/statements-media-releases/making-the-right-choices-in-cloud-computing-new-privacy-commissioner-guidance/" target="_blank">Office of the Privacy Commissioner | Making the right choices in cloud computing - new Privacy Commissioner guidance</a></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Cloud Computing Security Considerations</strong></p>
</td>
<td style="text-align: center;">
<p>ASD</p>
</td>
<td>
<p><a title="Cloud Computing Security Configurations" rel="noopener noreferrer" href="https://www.cyber.gov.au/acsc/view-all-content/publications/cloud-computing-security-considerations" target="_blank">https://www.cyber.gov.au/acsc/view-all-content/publications/cloud-computing-security-considerations</a></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Cloud Computing Policy and Guidance 2014</strong></p>
</td>
<td style="text-align: center;">
<p>Australian Government Information Management Office (AGIMO)</p>
</td>
<td>
<p><a rel="noopener noreferrer" href="http://www.finance.gov.au/agict//policy-guides-procurement/cloud" target="_blank">http://www.finance.gov.au/agict//policy-guides-procurement/cloud</a></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Cloud Control Matrix</strong></p>
</td>
<td style="text-align: center;">
<p>CSA</p>
</td>
<td>
<p><a title="Cloud Control Matrix" rel="noopener noreferrer" href="https://cloudsecurityalliance.org/research/cloud-controls-matrix/" target="_blank">https://cloudsecurityalliance.org/research/cloud-controls-matrix/</a></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Security Guidance for Critical Areas of Focus in Cloud Computing</strong></p>
</td>
<td style="text-align: center;">
<p>CSA</p>
</td>
<td>
<p><a rel="noopener noreferrer" href="https://cloudsecurityalliance.org/research/guidance/" target="_blank">https://cloudsecurityalliance.org/research/guidance/</a></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Top Threats to Cloud Computing</strong></p>
</td>
<td style="text-align: center;">
<p>CSA</p>
</td>
<td>
<p><a rel="noopener noreferrer" href="https://cloudsecurityalliance.org/research/working-groups/top-threats/" target="_blank">https://cloudsecurityalliance.org/research/working-groups/top-threats/</a></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Governance, Risk Management and Compliance Stack</strong></p>
</td>
<td style="text-align: center;">
<p>CSA</p>
</td>
<td>
<p><a rel="noopener noreferrer" href="http://www.cloudsecurityalliance.org/grcstack.html" target="_blank">http://www.cloudsecurityalliance.org/grcstack.html</a></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Security &amp; Resilience in Governmental Clouds - Making an informed decision</strong></p>
</td>
<td style="text-align: center;">
<p>ENISA</p>
</td>
<td>
<p><a rel="noopener noreferrer" href="https://www.enisa.europa.eu/publications/security-and-resilience-in-governmental-clouds" target="_blank">https://www.enisa.europa.eu/publications/security-and-resilience-in-governmental-clouds</a></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Cloud Computing Information Assurance Framework</strong></p>
</td>
<td style="text-align: center;">
<p>ENISA</p>
</td>
<td>
<p><a rel="noopener noreferrer" href="https://www.enisa.europa.eu/publications/cloud-computing-information-assurance-framework" target="_blank">https://www.enisa.europa.eu/publications/cloud-computing-information-assurance-framework</a></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Cloud Computing Security Risk Assessment</strong></p>
</td>
<td style="text-align: center;">
<p>ENISA</p>
</td>
<td>
<p><a rel="noopener noreferrer" href="https://www.enisa.europa.eu/publications/cloud-computing-risk-assessment" target="_blank">https://www.enisa.europa.eu/publications/cloud-computing-risk-assessment</a></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Critical Cloud Computing – A CIIP perspective on cloud computing services</strong></p>
</td>
<td style="text-align: center;">
<p>ENISA</p>
</td>
<td><a rel="noopener noreferrer" href="https://www.enisa.europa.eu/publications/critical-cloud-computing" target="_blank">Critical Cloud Computing-A CIIP perspective on cloud computing services — ENISA (europa.eu)</a></td>
</tr>
<tr>
<td><strong><strong>NIST Special Publication</strong>&nbsp;800-144, December 2011</strong></td>
<td>
<p><strong>Guidelines on Security and Privacy in Public Cloud Computing</strong></p>
</td>
<td style="text-align: center;">
<p>NIST</p>
</td>
<td>
<p><a rel="noopener noreferrer" href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-144.pdf" target="_blank">https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-144.pdf [PDF, 1.08 MB]</a></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Enterprise Risk Management for Cloud Computing</strong></p>
</td>
<td style="text-align: center;">
<p>COSO</p>
</td>
<td>
<p><a rel="noopener noreferrer" href="https://www.coso.org/Shared%20Documents/Cloud-Computing-Thought-Paper.pdf" target="_blank">Cloud-Computing-Thought-Paper.pdf (coso.org)</a></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Cloud Security</strong></p>
</td>
<td style="text-align: center;">
<p>Cloud Industry Forum</p>
</td>
<td>
<p><a href="https://cloudindustryforum.org/knowledge-hub/">Knowledge Hub - Cloud Industry Forum</a><a rel="noopener noreferrer" href="http://www.cloudindustryforum.org/content/cloud-security" target="_blank"></a></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>OASIS – various reference and guidance documents</strong></p>
</td>
<td style="text-align: center;">
<p>&nbsp;OASIS</p>
</td>
<td>
<p><a rel="noopener noreferrer" href="https://www.oasis-open.org/committees/tc_cat.php?cat=cloud" target="_blank">https://www.oasis-open.org/committees/tc_cat.php?cat=cloud</a></p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="References - Standards"><paragraph
    title="20.1.18."


><![CDATA[<p class="NormS10C1b">Further&nbsp;standards can be found at:</p>
<table class="table-main">
<tbody>
<tr>
<td>
<p><strong>Reference&nbsp;</strong></p>
</td>
<td>
<p><strong>Title</strong></p>
</td>
<td>
<p><strong>Publisher</strong></p>
</td>
<td>
<p><strong>Source</strong></p>
</td>
</tr>
<tr>
<td><strong><strong>NIST Special Publication 800-145, September 2011</strong></strong></td>
<td>
<p><strong>The NIST Definition of Cloud Computing</strong></p>
</td>
<td style="text-align: center;">
<p>NIST</p>
</td>
<td>
<p><a rel="noopener noreferrer" href="http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-145.pdf" target="_blank">http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-145.pdf [PDF, 84 KB]</a></p>
</td>
</tr>
<tr>
<td><strong><strong>NIST Special Publication 800-146, May 2012</strong></strong></td>
<td>
<p><strong>Cloud Computing Synopsis and Recommendations&nbsp;</strong></p>
</td>
<td style="text-align: center;">
<p>NIST</p>
</td>
<td>
<p><a rel="noopener noreferrer" href="http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-146.pdf" target="_blank">http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-146.pdf [PDF, 1.44 MB]</a></p>
</td>
</tr>
<tr>
<td><strong><strong>NIST Special Publication 500-291, version 2, July 2013</strong></strong></td>
<td>
<p><strong>Cloud Computing Standards Roadmap&nbsp;</strong></p>
</td>
<td style="text-align: center;">
<p>NIST</p>
</td>
<td>
<p><a rel="noopener noreferrer" href="http://www.nist.gov/itl/cloud/upload/NIST_SP-500-291_Version-2_2013_June18_FINAL.pdf" target="_blank">http://www.nist.gov/itl/cloud/upload/NIST_SP-500-291_Version-2_2013_June18_FINAL.pdf [PDF, 2.19 MB]</a></p>
</td>
</tr>
<tr>
<td><strong><strong>NIST Special Publication 500-292, September 2011</strong></strong></td>
<td>
<p><strong>Cloud Computing Reference Architecture&nbsp;</strong></p>
</td>
<td style="text-align: center;">
<p>NIST</p>
</td>
<td>
<p><a rel="noopener noreferrer" href="http://www.nist.gov/customcf/get_pdf.cfm?pub_id=909505" target="_blank">http://www.nist.gov/customcf/get_pdf.cfm?pub_id=909505 [PDF, 1.42 MB]</a></p>
</td>
</tr>
<tr>
<td><strong>ISO/IEC 17788:2014&nbsp;</strong></td>
<td>
<p><strong>Information technology -- Cloud computing -- Overview and vocabulary</strong></p>
</td>
<td>
<p style="text-align: center;">ISO</p>
</td>
<td>
<p><a title="Information technology — Cloud computing — Overview and vocabulary" rel="noopener noreferrer" href="https://www.iso.org/standard/60544.html" target="_blank">https://www.iso.org/standard/60544.html</a></p>
</td>
</tr>
<tr>
<td><strong>ISO/IEC 17789:2014&nbsp;</strong></td>
<td>
<p><strong>Information technology -- Cloud computing -- Reference architecture</strong></p>
</td>
<td style="text-align: center;">
<p><span>ISO</span></p>
</td>
<td>
<p><a title="Information technology — Cloud computing — Reference architecture" rel="noopener noreferrer" href="https://www.iso.org/standard/60545.html" target="_blank">https://www.iso.org/standard/60545.html</a></p>
</td>
</tr>
<tr>
<td><strong>ISO/IEC 17826:2012&nbsp;&nbsp;</strong></td>
<td>
<p><strong>Information technology -- Cloud Data Management Interface (CDMI)</strong></p>
</td>
<td style="text-align: center;">
<p><span>ISO</span></p>
</td>
<td>
<p><a title="Information technology — Cloud Data Management Interface (CDMI)" rel="noopener noreferrer" href="https://www.iso.org/standard/60617.html" target="_blank">https://www.iso.org/standard/60617.html</a></p>
</td>
</tr>
<tr>
<td><strong>ISO/IEC CD 19086-1:2016&nbsp;</strong></td>
<td>
<p><strong>Information technology -- Cloud computing -- Service level agreement (SLA) framework and Technology -- Part 1: Overview and concepts</strong></p>
</td>
<td style="text-align: center;">
<p><span>ISO</span></p>
</td>
<td>
<p><a title="Information technology — Cloud computing — Service level agreement (SLA) framework — Part 1: Overview and concepts" rel="noopener noreferrer" href="https://www.iso.org/standard/67545.html" target="_blank">https://www.iso.org/standard/67545.html</a></p>
</td>
</tr>
<tr>
<td><strong>ISO/IEC NP 19086-2:2018&nbsp;&nbsp;</strong></td>
<td>
<p><strong>Information technology -- Cloud computing -- Service level agreement (SLA) framework and Technology -- Part 2: Metrics</strong></p>
</td>
<td style="text-align: center;">
<p><span>ISO</span></p>
</td>
<td>
<p><a title="Cloud computing — Service level agreement (SLA) framework — Part 2: Metric model" rel="noopener noreferrer" href="https://www.iso.org/standard/67546.html" target="_blank">https://www.iso.org/standard/67546.html</a></p>
</td>
</tr>
<tr>
<td><strong>ISO/IEC NP 19086-3:2017&nbsp;&nbsp;</strong></td>
<td>
<p><strong>Information technology -- Cloud computing -- Service level agreement (SLA) framework and Technology -- Part 3: Core requirements</strong></p>
</td>
<td style="text-align: center;">
<p><span>ISO</span></p>
</td>
<td>
<p><a title="Information technology — Cloud computing — Service level agreement (SLA) framework — Part 3: Core conformance requirements" rel="noopener noreferrer" href="https://www.iso.org/standard/67547.html" target="_blank">https://www.iso.org/standard/67547.html</a></p>
</td>
</tr>
<tr>
<td><strong>ISO/IEC AWI 19941:2017&nbsp;&nbsp;</strong></td>
<td>
<p><strong>Information Technology -- Cloud Computing -- Interoperability and Portability</strong></p>
</td>
<td style="text-align: center;">
<p><span>ISO</span></p>
</td>
<td>
<p><a title="Information technology — Cloud computing — Interoperability and portability" rel="noopener noreferrer" href="https://www.iso.org/standard/66639.html" target="_blank">https://www.iso.org/standard/66639.html</a></p>
</td>
</tr>
<tr>
<td><strong>ISO/IEC AWI 19944-1:2020&nbsp;&nbsp;</strong></td>
<td>
<p><strong>Information Technology - Cloud Computing - Data and their Flow across Devices and Cloud Services</strong></p>
</td>
<td style="text-align: center;">
<p><span>ISO</span></p>
</td>
<td>
<p><a title="Cloud computing and distributed platforms ─ Data flow, data categories and data use — Part 1: Fundamentals" rel="noopener noreferrer" href="https://www.iso.org/standard/79573.html" target="_blank">https://www.iso.org/standard/79573.html</a></p>
</td>
</tr>
<tr>
<td><strong>ISO/IEC DIS 27017:2015&nbsp;&nbsp;</strong></td>
<td>
<p><strong>(In Draft) Information technology -- Security techniques -- Code of practice for information security controls based on ISO/IEC 27002 for cloud services</strong></p>
</td>
<td style="text-align: center;">
<p><span>ISO</span></p>
</td>
<td>
<p><a title="Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services" rel="noopener noreferrer" href="https://www.iso.org/standard/43757.html" target="_blank">https://www.iso.org/standard/43757.html</a></p>
</td>
</tr>
<tr>
<td><strong>ISO/IEC 27018:2019&nbsp;&nbsp;</strong></td>
<td>
<p><strong>Information technology -- Security techniques -- Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors</strong></p>
</td>
<td style="text-align: center;">
<p><span>ISO</span></p>
</td>
<td>
<p><a title="Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors" rel="noopener noreferrer" href="https://www.iso.org/standard/76559.html" target="_blank">https://www.iso.org/standard/76559.html</a></p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="PSR references"><paragraph
    title="20.1.19."


><![CDATA[<p class="NormS10C1b">Relevant PSR requirements can be found at:</p>
<table class="table-grey" style="width: 109.896%;">
<tbody>
<tr>
<td style="width: 17.3996%;"><strong>Reference</strong></td>
<td style="width: 18.5068%;"><strong>Title</strong></td>
<td style="width: 64.062%;"><strong>Source</strong></td>
</tr>
<tr>
<td style="width: 17.3996%;">
<p><strong>PSR Mandatory Requirements</strong></p>
</td>
<td style="width: 18.5068%;">
<p>GOV2, GOV5, GOV6, INFOSEC1, INFOSEC2, INFOSEC3 and INFOSEC4</p>
</td>
<td style="width: 64.062%;">
<p class="MsoNormal"><span style="color: black;"><a title="PSR" rel="noopener noreferrer" href="https://aus01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.protectivesecurity.govt.nz%2F&amp;data=05%7C02%7Crs01%40ncsc.govt.nz%7C68454f33f37d4b21719008dcd90a12d5%7C27dc6ab39c394134a7b2beddcf3638e6%7C1%7C0%7C638623884505132156%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&amp;sdata=0qDy6FvCP9%2BPMQPL4mKyALzWbrE5oUlulvAcRCUB7%2BI%3D&amp;reserved=0" target="_blank"></a><a title="PSR Home" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/" target="_blank">Home | Protective Security Requirements</a><a title="PSR" rel="noopener noreferrer" href="https://aus01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.protectivesecurity.govt.nz%2F&amp;data=05%7C02%7Crs01%40ncsc.govt.nz%7C68454f33f37d4b21719008dcd90a12d5%7C27dc6ab39c394134a7b2beddcf3638e6%7C1%7C0%7C638623884505132156%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&amp;sdata=0qDy6FvCP9%2BPMQPL4mKyALzWbrE5oUlulvAcRCUB7%2BI%3D&amp;reserved=0" target="_blank"></a></span></p>
<p class="MsoNormal"><span style="color: black;"><a title="Security Governance" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/security-governance" target="_blank">Security governance (GOV) | Protective Security Requirements</a><a rel="noopener noreferrer" href="https://aus01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.protectivesecurity.govt.nz%2Fpolicy%2Fsecurity-governance&amp;data=05%7C02%7Crs01%40ncsc.govt.nz%7C68454f33f37d4b21719008dcd90a12d5%7C27dc6ab39c394134a7b2beddcf3638e6%7C1%7C0%7C638623884505147226%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&amp;sdata=utorH6zQaiA4w2vjJc1yshvijV8B%2Fj5OEb6hH8ccAO0%3D&amp;reserved=0" target="_blank"></a></span></p>
<a href="https://aus01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.protectivesecurity.govt.nz%2Fpolicy%2Finformation-security&amp;data=05%7C02%7Crs01%40ncsc.govt.nz%7C68454f33f37d4b21719008dcd90a12d5%7C27dc6ab39c394134a7b2beddcf3638e6%7C1%7C0%7C638623884505162103%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&amp;sdata=uuc5QM2WYYdHbgcrSQgiS%2BHX6QzZjKLhH4bkdR%2FU0zU%3D&amp;reserved=0"></a><a title="Information Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/information-security" target="_blank">Information security (INFOSEC) | Protective Security Requirements</a><br>
<p>&nbsp;</p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Applicability"><paragraph
    title="20.1.20.R.01."

    tags="Cloud Computing,Governance,Public cloud security"


><![CDATA[<p>Security controls may not be available, cost effective or appropriate for all information classification levels. &nbsp;Much will depend on the cloud computing deployment model adopted. &nbsp;It is important that agencies understand when it is appropriate to use cloud services and how to select appropriate cloud services and service models, based on the classification of the information, any special handling endorsements and associated confidentiality, availability and integrity risks.</p>]]></paragraph>
<paragraph
    title="20.1.20.R.02."

    tags="Cloud Computing,Governance"


><![CDATA[<p>Systems and information classified CONFIDENTIAL and above require higher levels of protection. This applies in all types of cloud models including private, community, hybrid, and public cloud models and deployments.</p>]]></paragraph>
<paragraph
    title="20.1.20.C.01."

    tags="Cloud Computing,Governance"


    classification="Top Secret, Secret, Confidential"
    compliance="Must"
    cid="4800"
><![CDATA[<p>The use of cloud services and infrastructures for systems and data classified CONFIDENTIAL, SECRET or TOP SECRET MUST be approved by the GCSB.</p>]]></paragraph>
<paragraph
    title="20.1.20.C.02."

    tags="Cloud Computing,Governance,Public cloud security"


    classification="Top Secret, Confidential, Secret"
    compliance="Must"
    cid="4801"
><![CDATA[<p>Agencies intending to adopt cloud technologies or services MUST ensure cloud service providers apply the controls specified in this manual to any systems hosting, processing or storing agency data and systems.</p>]]></paragraph>
<paragraph
    title="20.1.20.C.03."

    tags="Cloud Computing,Governance,Public cloud security"


    classification="Confidential, Secret, Top Secret"
    compliance="Must Not"
    cid="4802"
><![CDATA[<p>Agencies MUST NOT use public, hybrid (incorporating a public element), or other external cloud services for systems and data classified CONFIDENTIAL, SECRET or TOP SECRET.</p>]]></paragraph>
<paragraph
    title="20.1.20.C.04."

    tags="Cloud Computing,Governance,Public cloud security"


    classification="All Classifications"
    compliance="Must Not"
    cid="4803"
><![CDATA[<p>Agencies MUST NOT use public or hybrid (incorporating a public element) cloud services to host, process, store or transmit NZEO endorsed information.</p>]]></paragraph>
<paragraph
    title="20.1.20.C.05."

    tags="Cloud Computing,Governance,Public cloud security,Assurance"


    classification="All Classifications"
    compliance="Should"
    cid="4804"
><![CDATA[<p>Agencies intending to adopt cloud technologies or services SHOULD obtain formal assurance cloud service providers will apply the controls specified in this manual to any cloud service hosting, processing or storing agency data and systems.</p>]]></paragraph>
</block>
<block title="Risk Assessment"><paragraph
    title="20.1.21.R.01."

    tags="Cloud Computing,Governance,Risk Management,Risk Assessment,Public cloud security"


><![CDATA[<p>The adoption of cloud technologies will introduce a wide range of technology and information system risks <em>in addition</em> to the risks that already exist for agency systems. &nbsp;It is vital that these additional risks are identified and assessed in order to select appropriate controls and countermeasures. &nbsp;Trust boundaries must be defined to assist in determining effective controls and where these controls can best be applied.</p>]]></paragraph>
<paragraph
    title="20.1.21.R.02."

    tags="Cloud Computing,Governance,Risk Assessment,Public cloud security"


><![CDATA[<p>The <strong>responsibility</strong> for the implementation, management and maintenance of controls will depend on the service model and deployment model (refer to NIST SP800-145) used in the delivery of cloud services.</p>]]></paragraph>
<paragraph
    title="20.1.21.C.01."

    tags="Cloud Computing,Governance,Risk Assessment,Public cloud security"


    classification="All Classifications"
    compliance="Must"
    cid="4808"
><![CDATA[<p>Agencies intending to adopt cloud technologies or services MUST conduct a risk assessment <em>before</em> implementation or adoption.</p>]]></paragraph>
<paragraph
    title="20.1.21.C.02."

    tags="Cloud Computing,Governance,Risk Assessment,Public cloud security"


    classification="All Classifications"
    compliance="Must"
    cid="4809"
><![CDATA[<p>Agencies intending to adopt cloud technologies or services MUST determine trust boundaries <em>before</em> implementation.</p>]]></paragraph>
<paragraph
    title="20.1.21.C.03."

    tags="Cloud Computing,Governance,Risk Assessment,Public cloud security"


    classification="All Classifications"
    compliance="Must"
    cid="4810"
><![CDATA[<p>Agencies intending to adopt cloud technologies or services MUST determine where the responsibility (agency or cloud service provider) for implementing, managing and maintaining controls lies in accordance with agreed trust boundaries.</p>]]></paragraph>
<paragraph
    title="20.1.21.C.04."

    tags="Cloud Computing,Governance,Accreditation,Risk Assessment,Public cloud security"


    classification="All Classifications"
    compliance="Must"
    cid="4811"
><![CDATA[<p>Agencies MUST ensure cloud risks for any cloud service adopted are understood and formally accepted by the Agency Head or Chief Executive (or their formal delegate) and the agency’s Accreditation Authority.</p>]]></paragraph>
<paragraph
    title="20.1.21.C.05."

    tags="Cloud Computing,Governance,Risk Assessment,Public cloud security"


    classification="All Classifications"
    compliance="Must"
    cid="4812"
><![CDATA[<p>Agencies MUST consult with the GCDO to ensure the strategic and other cloud risks are comprehensively assessed.</p>]]></paragraph>
<paragraph
    title="20.1.21.C.06."

    tags="Cloud Computing,Governance,Residual Risk,Risk Assessment,Public cloud security"


    classification="All Classifications"
    compliance="Must"
    cid="4813"
><![CDATA[<p>Agencies procuring or using cloud services to be used by multiple agencies MUST ensure all interested parties formally agree the risks, controls and any residual risks of such cloud services.</p>]]></paragraph>
<paragraph
    title="20.1.21.C.07."

    tags="Cloud Computing,Governance,Risk Assessment,Public cloud security"


    classification="All Classifications"
    compliance="Must"
    cid="4814"
><![CDATA[<p>Agencies using cloud services MUST ensure they have conducted a documented risk assessment, accepted any residual risks, and followed the endorsement procedure required by the GCDO.</p>]]></paragraph>
</block>
<block title="Offshore Services"><paragraph
    title="20.1.22.R.01."

    tags="Cloud Computing,Data Management,Governance,Risk Management,Public cloud security"


><![CDATA[<p>Cloud services hosted offshore introduce several additional risks, in particular, jurisdictional, sovereignty and privacy risks. &nbsp;Foreign owned cloud service providers operating in New Zealand, are subject to New Zealand legislation and regulation. &nbsp;They may, however, also be subject to a foreign government’s privacy, lawful access and data intercept legislation.</p>]]></paragraph>
<paragraph
    title="20.1.22.R.02."

    tags="Cloud Computing,Data Management,Governance,Risk Management,Public cloud security"


><![CDATA[<p>The majority of these jurisdictional, sovereignty and privacy risks cannot be adequately managed with controls available today. &nbsp;They must therefore be carefully considered and accepted by the Agency Head or Chief Executive before the adoption of such cloud services.</p>]]></paragraph>
<paragraph
    title="20.1.22.R.03."

    tags="Cloud Computing,Data Management,Governance,Risk Management,Public cloud security"


><![CDATA[<p>Some cloud services hosted within New Zealand may be supported by foreign based technical staff.&nbsp; This characteristic introduces a further risk element to the use of foreign-owned cloud service providers.</p>]]></paragraph>
<paragraph
    title="20.1.22.R.04."

    tags="Cloud Computing,Data Management,Governance,Risk Management,Public cloud security"


><![CDATA[<p>Further complexity can be introduced when All-of-Government or multi-agency systems are deployed or integrated with cloud services. &nbsp;Any security breach can affect several agencies and compromise large or aggregated data sets.</p>]]></paragraph>
<paragraph
    title="20.1.22.C.01."

    tags="Cloud Computing,Data Management,Governance,Risk Management,Public cloud security"


    classification="All Classifications"
    compliance="Must"
    cid="4820"
><![CDATA[<p>Agencies using cloud services hosted offshore MUST ensure jurisdictional, sovereignty and privacy risks are fully considered and formally accepted by the Agency Head or Chief Executive and the agency’s Accreditation Authority.</p>]]></paragraph>
<paragraph
    title="20.1.22.C.02."

    tags="Cloud Computing,Data Management,Governance,Risk Management,Public cloud security"


    classification="All Classifications"
    compliance="Must"
    cid="4821"
><![CDATA[<p>Agencies using cloud services hosted offshore MUST ensure that the agency retains ownership of its information in any contract with the cloud service provider.</p>]]></paragraph>
<paragraph
    title="20.1.22.C.03."

    tags="Cloud Computing,Data Management,Governance,Residual Risk,Risk Management,Risk Assessment,Public cloud security"


    classification="All Classifications"
    compliance="Must"
    cid="4822"
><![CDATA[<p>Agencies using cloud services hosted offshore and connected to All-of-Government systems MUST ensure they have conducted a risk assessment, accepted any residual risks, and followed the endorsement procedure required by the GCDO.</p>]]></paragraph>
<paragraph
    title="20.1.22.C.04."

    tags="Cloud Computing,Data Management,Governance,Risk Management,Public cloud security"


    classification="Confidential, Top Secret, Secret"
    compliance="Must Not"
    cid="4823"
><![CDATA[<p>Agencies MUST NOT use cloud services hosted offshore for information or systems classified CONFIDENTIAL, SECRET or TOP SECRET.</p>]]></paragraph>
<paragraph
    title="20.1.22.C.05."

    tags="Cloud Computing,Data Management,Governance,Risk Management,Public cloud security"


    classification="All Classifications"
    compliance="Must Not"
    cid="4824"
><![CDATA[<p>Agencies MUST NOT use cloud services hosted offshore for information with an NZEO endorsement.</p>]]></paragraph>
<paragraph
    title="20.1.22.C.06."

    tags="Cloud Computing,Data Management,Governance,Risk Management,Risk Assessment,Public cloud security,Assurance"


    classification="All Classifications"
    compliance="Should Not"
    cid="4825"
><![CDATA[<p>Agencies SHOULD NOT use cloud services hosted offshore <em>unless</em>:</p>
<ul>
<li>privacy, information sensitivity and information value has been fully assessed by the agency;</li>
<li>a comprehensive risk assessment is undertaken by the agency;</li>
<li>controls to manage identified risks have been specified by the agency; and</li>
<li>the cloud service provider is able to provide adequate assurance that these controls have been properly implemented <em>before</em> the agency uses the cloud service.</li>
</ul>]]></paragraph>
</block>
<block title="System Availability"><paragraph
    title="20.1.23.R.01."

    tags="Cloud Computing,Data Management,Governance,Risk Management,Risk Assessment,Public cloud security"


><![CDATA[<p>The availability of agency systems, business functionality and any customer or client online services, is subject to additional risks in an outsourced cloud environment. &nbsp;A risk assessment will include consideration of business requirements on availability in a cloud environment.</p>]]></paragraph>
<paragraph
    title="20.1.23.R.02."

    tags="Cloud Computing,Governance,Risk Management,Public cloud security"


><![CDATA[<p>Risks to business functionality may include service outages, such as communications, data centre power, backup and other failures or interruptions. &nbsp;Entity failures such the merger, acquisition or liquidation of the cloud service provider may also present a significant business risk to availability.</p>]]></paragraph>
<paragraph
    title="20.1.23.C.01."

    tags="Cloud Computing,Governance,Risk Management,Public cloud security"


    classification="All Classifications"
    compliance="Must"
    cid="4829"
><![CDATA[<p>Agencies intending to adopt cloud technologies or services MUST consider the risks to the availability of systems and information in their design of cloud systems architectures and supporting controls and governance processes.</p>]]></paragraph>
<paragraph
    title="20.1.23.C.02."

    tags="Cloud Computing,Governance,Risk Management,Public cloud security"


    classification="All Classifications"
    compliance="Must"
    cid="4830"
><![CDATA[<p>Any contracts for the provision of cloud services MUST include service level, availability, recoverability and restoration provisions.</p>]]></paragraph>
<paragraph
    title="20.1.23.C.03."

    tags="Cloud Computing,Governance,Risk Management,Public cloud security"


    classification="All Classifications"
    compliance="Must"
    cid="4831"
><![CDATA[<p>Agencies MUST ensure contracts with cloud service providers include provisions to manage risks associated with the merger, acquisition, liquidation or bankruptcy of the service provider and any subsequent termination of cloud services.</p>]]></paragraph>
</block>
<block title="Unauthorised Access"><paragraph
    title="20.1.24.R.01."

    tags="Cloud Computing,Governance,Access Control,Risk Assessment,Public cloud security"


><![CDATA[<p>Cloud service providers may not provide adequate physical security and physical and logical access controls to meet agencies requirements. &nbsp;An assessment of cloud service risks will include physical and systems security. &nbsp;Refer also to <a href="http://nzism.gcsb.govt.nz/ism-document#Chapter-16567">Chapter 19 – Gateway Security</a>, <a href="http://nzism.gcsb.govt.nz/ism-document#Section-17306">Section 22.2 – Virtualisation</a> and <a href="http://nzism.gcsb.govt.nz/ism-document#Section-17362">Section 22.3 – Virtual Local Area Networks</a>.</p>]]></paragraph>
<paragraph
    title="20.1.24.R.02."

    tags="Cloud Computing,Encryption,Governance,Access Control,Public cloud security"


><![CDATA[<p>Some cloud services hosted within New Zealand may be supported by technical staff, presenting additional risk. &nbsp;In some cases the technical staff are based offshore. &nbsp;The use of encryption can provide additional assurance against unauthorised access – refer to <a href="http://nzism.gcsb.govt.nz/ism-document#Chapter-15745">Chapter 17 – Cryptography</a>.</p>]]></paragraph>
<paragraph
    title="20.1.24.R.03."

    tags="Cloud Computing,Data Management,Governance,Access Control,Public cloud security"


><![CDATA[<p>Data Loss Prevention (DLP) technologies and techniques are implemented to safeguard sensitive or critical information from leaving the organisation. &nbsp;They operate by identifying unauthorised access and data exfiltration and take remedial action by monitoring, detecting and blocking unauthorised attempts to exfiltrate data. &nbsp;For DLP to be effective, all data states (processing, transmission and storage) are monitored.</p>]]></paragraph>
<paragraph
    title="20.1.24.C.01."

    tags="Cloud Computing,Governance,Access Control,Public cloud security"


    classification="All Classifications"
    compliance="Should"
    cid="4836"
><![CDATA[<p>Agencies intending to adopt cloud technologies or services SHOULD ensure cloud service providers apply the physical, virtual and access controls specified in this manual for agency systems and data protection.</p>]]></paragraph>
<paragraph
    title="20.1.24.C.02."

    tags="Cloud Computing,Governance,Access Control,Public cloud security"


    classification="All Classifications"
    compliance="Should"
    cid="4837"
><![CDATA[<p>Agencies intending to adopt cloud technologies or services SHOULD apply separation and access controls to protect data and systems where support is provided by offshore technical staff.</p>]]></paragraph>
<paragraph
    title="20.1.24.C.03."

    tags="Cloud Computing,Data Management,Governance,Access Control,Data Transfers,Public cloud security"


    classification="All Classifications"
    compliance="Should"
    cid="4838"
><![CDATA[<p>Agencies intending to adopt cloud technologies or services SHOULD apply controls to detect and prevent unauthorised data transfers and multiple or large scale data transfers to offshore locations and entities.</p>]]></paragraph>
<paragraph
    title="20.1.24.C.04."

    tags="Cloud Computing,Data Management,Encryption,Access Control,Public cloud security"


    classification="All Classifications"
    compliance="Should"
    cid="4839"
><![CDATA[<p>Agencies intending to adopt cloud technologies or services SHOULD consider the use of encryption for data in transit and at rest.</p>]]></paragraph>
</block>
<block title="Incident Handling and Management"><paragraph
    title="20.1.25.R.01."

    tags="Cloud Computing,Governance,Incident Management,Public cloud security,Information Security Incidents"


><![CDATA[<p>Cloud service providers may not provide the same level of incident identification and management as provided by agencies. &nbsp;In some cases, these services will attract additional costs. &nbsp;Careful management of contracts is required to ensure agency requirements for incident detection and management are fully met when adopting cloud services.</p>]]></paragraph>
<paragraph
    title="20.1.25.C.01."

    tags="Cloud Computing,Governance,Incident Management,Public cloud security,Information Security Incidents"


    classification="All Classifications"
    compliance="Must"
    cid="4842"
><![CDATA[<p>Agencies MUST include incident handling and management services in contracts with cloud service providers.</p>]]></paragraph>
<paragraph
    title="20.1.25.C.02."

    tags="Cloud Computing,Governance,Incident Management,Public cloud security,Information Security Incidents"


    classification="All Classifications"
    compliance="Must"
    cid="4843"
><![CDATA[<p>Agencies MUST develop and implement incident identification and management processes in accordance with this manual (See<a href="http://nzism.gcsb.govt.nz/ism-document#Chapter-13001"> Chapter 6 – Information Security Monitoring</a>, <a href="http://nzism.gcsb.govt.nz/ism-document#Chapter-13097">Chapter 7 – Information Security Incidents</a>, <a href="http://nzism.gcsb.govt.nz/ism-document#Chapter-13360">Chapter 9 – Personnel Security</a> and <a href="http://nzism.gcsb.govt.nz/ism-document#Chapter-15348">Chapter 16 – Access Control</a>).</p>]]></paragraph>
</block>
<block title="Backup, Recovery Archiving and Data Remanence"><paragraph
    title="20.1.26.R.01."

    tags="Cloud Computing,Governance,Business Continuity,Public cloud security"


><![CDATA[<p>Cloud service providers will invariably provide some business continuity and disaster recovery plans, including system and data backup, for their own operational purposes. &nbsp;These plans may not include customer data or systems. &nbsp;Where cloud service providers do not adequately meet agency business requirements, an agency defined backup and recovery plan may be necessary.</p>]]></paragraph>
<paragraph
    title="20.1.26.R.02."

    tags="Cloud Computing,Data Management,Technical,Public cloud security"


><![CDATA[<p>Residual information remaining on a device or storage media after clearing or sanitising the device or media is described as data remanence. &nbsp;This characteristic is sometimes also described as data persistence, although this description may include the wider implication of multiple copies.</p>]]></paragraph>
<paragraph
    title="20.1.26.R.03."

    tags="Cloud Computing,Data Management,Governance,Risk Assessment,Public cloud security"


><![CDATA[<p>Full consideration of risks associated with data remanence and data persistence is required to ensure agency requirements for backup, recovery, archiving and data management is included in any cloud service contract.</p>]]></paragraph>
<paragraph
    title="20.1.26.R.04."

    tags="Cloud Computing,Data Management,Governance,Public cloud security"


><![CDATA[<p>In addition to backups, cloud service providers may also archive data. &nbsp;Multi-national or foreign based cloud service providers may have established data centres in several countries. &nbsp;Backup and archiving is invariably automated and there may be no feasible method of determining where and in what jurisdiction the data have been archived. &nbsp;This can create an issue of data remanence and persistence where cloud service contracts are terminated but not all agency data can be effectively purged or deleted from the provider’s systems.</p>]]></paragraph>
<paragraph
    title="20.1.26.C.01."

    tags="Cloud Computing,Data Management,Governance,Business Continuity,Public cloud security"


    classification="All Classifications"
    compliance="Must"
    cid="4849"
><![CDATA[<p>Agencies MUST develop and implement a backup, recovery and archiving plan and supporting procedures (See <a href="http://nzism.gcsb.govt.nz/ism-document#Section-13074">Section 6.4 – Business Continuity and Disaster Recovery</a>).</p>]]></paragraph>
<paragraph
    title="20.1.26.C.02."

    tags="Cloud Computing,Data Management,Governance,Public cloud security"


    classification="All Classifications"
    compliance="Must"
    cid="4850"
><![CDATA[<p>Agencies MUST include a data purge or secure delete process in any cloud service contracts.</p>]]></paragraph>
<paragraph
    title="20.1.26.C.03."

    tags="Cloud Computing,Data Management,Governance,Public cloud security,Assurance"


    classification="All Classifications"
    compliance="Must"
    cid="4851"
><![CDATA[<p>Any data purge or secure delete process in any cloud service contracts MUST be independently verifiable.</p>]]></paragraph>
</block>
<block title="User Awareness and Training"><paragraph
    title="20.1.27.R.01."

    tags="Cloud Computing,Governance,Public cloud security"


><![CDATA[<p>The introduction of cloud services will introduce change to the appearance and functionality of systems, how users access agency systems and types of user support. It is essential that users are aware of information security and privacy concepts and risks associated with the services they use.</p>
<p>Support provided by the cloud service provider may attract additional charges.</p>]]></paragraph>
<paragraph
    title="20.1.27.C.01."

    tags="Cloud Computing,Governance,Public cloud security"


    classification="All Classifications"
    compliance="Must"
    cid="4854"
><![CDATA[<p>Agencies MUST develop and implement user awareness and training programmes to support and enable safe use of cloud services (See <a href="http://nzism.gcsb.govt.nz/ism-document#Section-13361">Section 9.1 – Information Security Awareness and Training</a>).</p>]]></paragraph>
</block>
</subsection>
</section>
