<section title="23.2. Governance, Risk Assessment &amp; Assurance"><subsection title="Objective"><paragraph
    title="23.2.1."


><![CDATA[<p class="NormS23C2">Agency cloud initiatives follow the risk management, assurance, governance, and control requirements in this manual.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="23.2.2."


><![CDATA[<p class="NormS23C2">Good governance is required to ensure appropriate mechanisms and lines of accountability are in place to understand, assess, document, and manage cloud risks. This section describes the requirements for agencies to identify, respond to, and manage risks relevant to public cloud services.</p>]]></paragraph>
<paragraph
    title="23.2.3."


><![CDATA[<p class="NormS23C2">Reference to other chapters and sections in this document is essential.&nbsp; In particular:</p><ul>
<li><a title="Using cloud services" rel="noopener" href="http://nzism.gcsb.govt.nz/ism-document#Section-12164">Section 2.3 – Using cloud services</a></li>
<li><a title="Roles and Responsibilities" rel="noopener" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-12255">Chapter 3 – Information security governance – roles and responsibilities</a></li>
<li><a title="System certification and accreditation" rel="noopener" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-12459">Chapter 4 – System certification and accreditation</a></li>
<li><a title="Information security documentation" rel="noopener" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-12682">Chapter 5 – Information security documentation</a></li>
<li><a title="Independent assurance reports" rel="noopener" href="http://nzism.gcsb.govt.nz/ism-document#Section-12847">Section 5.8 – Independent assurance reports</a></li>
<li><a title="Information security monitoring" rel="noopener" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-13001">Chapter 6 – Information security monitoring</a></li>
<li><a title="Information security incidents" rel="noopener" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-13097">Chapter 7 – Information security incidents</a></li>
<li><a title="Personnel security" rel="noopener" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-13360">Chapter 9 – Personnel security</a></li>
<li><a title="Access control and passwords" rel="noopener" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-15348">Chapter 16 – Access control and passwords</a></li>
<li><a title="Cryptography" rel="noopener" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-15745">Chapter 17 – Cryptography</a></li>
</ul><p>&nbsp;</p>]]></paragraph>
</block>
<block title="Public cloud services"><paragraph
    title="23.2.4."


><![CDATA[<p class="NormS23C2">Cloud computing affects governance, since it either:</p><ul>
<li>introduces a third party into the process (as in the case of public cloud or hosted private cloud); or</li>
<li>potentially alters internal governance structures (as in the case of self-hosted private cloud).</li>
</ul>]]></paragraph>
<paragraph
    title="23.2.5."


><![CDATA[<p class="NormS23C2">The primary issue to remember when governing cloud computing is that an organisation can never outsource responsibility for governance, even when using external providers. This is always true, cloud or not, but is useful to keep in mind when navigating cloud computing’s concept of shared responsibility.</p>]]></paragraph>
<paragraph
    title="23.2.6."


><![CDATA[<p class="NormS23C2">As with any outsourcing arrangement, agencies bear ultimate responsibility for identifying and managing these risks even if they rely on their cloud service provider to implement mitigating controls.</p>]]></paragraph>
<paragraph
    title="23.2.7."


><![CDATA[<p class="NormS23C2">Cloud services that are hosted or managed from outside New Zealand pose jurisdictional, data sovereignty, and privacy risks. Even when the service is hosted in New Zealand and subject to New Zealand law, an overseas provider may also be subject to its home country’s privacy, data access, and lawful intercept legislation, which may conflict with New Zealand law.</p>]]></paragraph>
<paragraph
    title="23.2.8."


><![CDATA[<p class="NormS23C2">Cloud services that support multiple agencies or All-of-Government capabilities also pose governance and risk management challenges that must be addressed by establishing privacy, security, and compliance policies in order to protect the corporate assets and intellectual property of participating organisations’ data.</p>]]></paragraph>
</block>
<block title="Obligations and responsibilities"><paragraph
    title="23.2.9."


><![CDATA[<p class="NormS23C2">Agencies must be aware of their statutory and regulatory obligations to protect Official, Classified and personal information and data.  Any move to using cloud services cannot allow compromise of these statutory obligations.</p>]]></paragraph>
</block>
<block title="Cloud contracts"><paragraph
    title="23.2.10."


><![CDATA[<p class="NormS23C2">Cloud contracts should consider data stewardship, data sovereignty, jurisdiction, storage and access, including any backups.  It remains, however, the responsibility of individual agencies to ensure their legislative and regulatory responsibilities for data stewardship are met.</p>]]></paragraph>
<paragraph
    title="23.2.11."


><![CDATA[<p class="NormS23C2">As with any outsourcing arrangement, use of cloud services carries the risk of the provider going out of business or otherwise being unable to provide contracted services to the consuming agency. This is a commercial risk that technical security controls cannot address, but one agencies need to consider as part of their due diligence.</p>]]></paragraph>
<paragraph
    title="23.2.12."


><![CDATA[<p class="NormS23C2">It is essential that appropriate legal advice is taken before any cloud contracts are finalised.</p>]]></paragraph>
</block>
<block title="Regular assurance checks"><paragraph
    title="23.2.13."


><![CDATA[<p class="NormS23C2">Changes made to a cloud tenancy may have an adverse impact on the security posture of an agency’s cloud service configuration. Usually, in such circumstances (e.g., if the change was initiated by the agency on-site) this may trigger the commencement of the certification and accreditation process. In addition, changes would usually be subject to approval, review, and testing, as part of an agency’s IT change control process. However, this may not be the case in a cloud environment, as platform changes are made by the cloud service provider and may occur with minimal or no notice (see <a href="http://nzism.gcsb.govt.nz/ism-document#Section-12847">section 5.8 – Independent assurance reports</a>).</p>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="23.2.14."


><![CDATA[<p class="NormS23C2">Further references can be found at:</p><table class="table-main">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td><strong>Publisher</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>Cloud computing security for tenants</td>
<td>Australian Cyber Security Centre (ACSC)</td>
<td><a rel="noopener noreferrer" href="https://www.cyber.gov.au/acsc/view-all-content/publications/cloud-computing-security-tenants" target="_blank">Cloud Computing Security for Tenants | Cyber.gov.au</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>CCMv4.0 auditing guidelines</td>
<td>CSA</td>
<td><a rel="noopener noreferrer" href="https://cloudsecurityalliance.org/artifacts/ccm-v4-0-auditing-guidelines/" target="_blank">CCMv4.0 Auditing Guidelines | CSA (cloudsecurityalliance.org)</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>CSA Security Guidance for Critical Areas of Focus in Cloud Computing</td>
<td>&nbsp;CSA</td>
<td><a rel="noopener noreferrer" href="https://cloudsecurityalliance.org/research/guidance/" target="_blank">CSA Security Guidance for Cloud Computing | CSA (cloudsecurityalliance.org)</a><a href="https://cloudsecurityalliance.org/artifacts/ccm-v4-0-auditing-guidelines/"></a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>Cloud computing — information security and privacy considerations</td>
<td>Digital.govt.nz</td>
<td><a rel="noopener noreferrer" href="https://www.digital.govt.nz/dmsdocument/1~cloud-computing-information-security-and-privacy-considerations/html#appendix-b--additional-resources" target="_blank">Cloud computing information security and privacy considerations | NZ Digital government</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>About public cloud services</td>
<td><span>Digital.govt.nz</span></td>
<td><a rel="noopener noreferrer" href="https://www.digital.govt.nz/standards-and-guidance/technology-and-architecture/cloud-services/about/" target="_blank">About public cloud services | NZ Digital government</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>Secure cloud strategy</td>
<td>Australian Government</td>
<td><a rel="noopener noreferrer" href="https://www.dta.gov.au/our-projects/secure-cloud-strategy" target="_blank">Secure Cloud Strategy | Digital Transformation Agency (dta.gov.au)</a></td>
</tr>
<tr>
<td><strong>NIST SP 500-291 (2011)</strong></td>
<td>NIST cloud computing standards roadmap</td>
<td>NIST</td>
<td><a rel="noopener noreferrer" href="https://www.nist.gov/publications/nist-sp-500-291-nist-cloud-computing-standards-roadmap" target="_blank">NIST-SP 500-291, NIST Cloud Computing Standards Roadmap | NIST</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="PSR References"><paragraph
    title="23.2.15."


><![CDATA[<p class="NormS23C2">Relevant PSR requirements can be found at:</p><table class="table-grey">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td><strong>PSR mandatory requirements</strong></td>
<td>
<p class="NormS5C1">GOV2 - Take a risk-based approach</p>
<p class="NormS5C1">GOV5 - Manage risks when working with others</p>
<p class="NormS5C1">GOV6 - Manage security incidents</p>
<p class="NormS5C1">INFOSEC1 - Understand what you need to protect</p>
<p class="NormS5C1">INFOSEC2 - Design your information security</p>
<p class="NormS5C1">INFOSEC3 - Validate your security measures</p>
INFOSEC4 - Keep your security up to date</td>
<td><a href="https://www.protectivesecurity.govt.nz/governance/mandatory-requirements/">Mandatory requirements | Protective Security Requirements</a></td>
</tr>
<tr>
<td><strong>PSR protocol for information security</strong></td>
<td>Management protocol for information security</td>
<td><a href="https://www.protectivesecurity.govt.nz/information-security/management-protocol-2/">Management protocol for information security | Protective Security Requirements</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Understanding levels of assurance for public cloud"><paragraph
    title="23.2.16.R.01."

    tags="Cloud Computing,Governance,Risk Management,Public cloud security"


><![CDATA[<p class="S23C1-R-6">Although roles and responsibilities for public cloud services may be shared between an agency and the cloud service provider, ultimately an agency owns security risks and is responsible for all ICT services their agency consumes, including public cloud services.</p>]]></paragraph>
<paragraph
    title="23.2.16.R.02."

    tags="Cloud Computing,Governance,Risk Management,Public cloud security"


><![CDATA[<p class="S23C1-R-6">It is an agency’s responsibility to ensure that cloud service providers have adequate safeguards in place to address security risks specific to their public cloud instance.</p>]]></paragraph>
<paragraph
    title="23.2.16.R.03."

    tags="Cloud Computing,Governance,Risk Assessment,Public cloud security"


><![CDATA[<p class="S23C1-R-6">Adoption of public cloud services introduce risks to agency systems that need to be identified, assessed, and formally accepted in order to understand the appropriate use of public cloud services and select effective controls and countermeasures.</p>]]></paragraph>
<paragraph
    title="23.2.16.C.01."

    tags="Cloud Computing,Governance,Risk Assessment,Public cloud security"


    classification="All Classifications"
    compliance="Must"
    cid="7386"
><![CDATA[<p>Agencies MUST update their risk assessment process to account for public cloud specific risks, prior to implementation or adoption of public cloud services.</p>]]></paragraph>
<paragraph
    title="23.2.16.C.02."

    tags="Cloud Computing,Governance,Risk Assessment,Public cloud security"


    classification="All Classifications"
    compliance="Must"
    cid="7387"
><![CDATA[<p>Agencies MUST undertake a cloud specific risk assessment in line with the process outlined by the GCDO for each public cloud service, prior to implementation or adoption of public cloud services.</p>]]></paragraph>
<paragraph
    title="23.2.16.C.03."

    tags="Cloud Computing,Governance,Accreditation,Public cloud security"


    classification="Secret, Top Secret, Confidential"
    compliance="Must Not"
    cid="7388"
><![CDATA[<p>Agencies MUST NOT accredit public cloud services for use with data classified CONFIDENTIAL, SECRET, or TOP SECRET.</p>]]></paragraph>
<paragraph
    title="23.2.16.C.04."

    tags="Cloud Computing,Governance,Accreditation,Public cloud security"


    classification="All Classifications"
    compliance="Must Not"
    cid="7389"
><![CDATA[<p>Agencies MUST NOT accredit public cloud services to host, process, store, or transmit NZEO endorsed information.</p>]]></paragraph>
</block>
<block title="System availability"><paragraph
    title="23.2.17.R.01."

    tags="Cloud Computing,Governance,Public cloud security"


><![CDATA[<p>It is important that connectivity between an organisation and their cloud service providers meets requirements for latency and reliability. In support of this, an organisation and their cloud service providers should discuss any specific network requirements, performance characteristics, or planned responses to availability failures, especially when high-availability requirements exist.</p>]]></paragraph>
<paragraph
    title="23.2.17.R.02."

    tags="Cloud Computing,Governance,Public cloud security,Assurance"


><![CDATA[<p class="NormS17C2"><span>An organisation and their cloud service providers should discuss whether dedicated communication links or connections over the internet will be used and whether any secondary communications links will provide sufficient capacity to meet operational requirements should the primary communication link become unavailable. </span></p>]]></paragraph>
<paragraph
    title="23.2.17.R.03."

    tags="Cloud Computing,Governance,Public cloud security,Assurance"


><![CDATA[<p class="NormS17C2"><span>Feedback should be provided to cloud service providers when performance does not meet service level agreement targets. To assist with this, anomaly detection can be performed through network telemetry that is integrated into security monitoring tools.</span></p>]]></paragraph>
<paragraph
    title="23.2.17.C.01."

    tags="Cloud Computing,Governance,Risk Management,Public cloud security,Assurance"


    classification="All Classifications"
    compliance="Must"
    cid="7394"
><![CDATA[<p>Agencies MUST consider risks to the availability of systems and information in their design of cloud systems architectures, supporting controls, and governance processes prior to implementation or adoption of public cloud services.</p>]]></paragraph>
</block>
<block title="Regular assurance checks"><paragraph
    title="23.2.18.R.01."

    tags="Cloud Computing,Governance,Public cloud security,Assurance"


><![CDATA[<p>Cloud service providers should conduct independent assurance activities as part of their due diligence and to provide customers with evidence of quality service provision and compliance. It is important that such assurance activities are undertaken by an assessor with the appropriate expertise to validate the existence and performance of security controls.</p>]]></paragraph>
<paragraph
    title="23.2.18.C.01."

    tags="Cloud Computing,Governance,Public cloud security,Assurance"


    classification="All Classifications"
    compliance="Should"
    cid="7397"
><![CDATA[<p class="Normal-nonumbering"><span>Agencies SHOULD obtain regular assurance checks on cloud service providers, ensuring they have been undertaken by a suitably qualified assessor.</span></p>]]></paragraph>
</block>
<block title="Cloud service providers – patching and software maintenance"><paragraph
    title="23.2.19.R.01."

    tags="Cloud Computing,Governance,Risk Management,Public cloud security,Assurance"


><![CDATA[<p class="NormS17C2"><span>Data transmitted, stored, and processed off site presents a risk to an organisation. This includes reliance on a cloud service provider to not only identify software vulnerabilities, but to apply these in a timely manner, as well providing evidence to an agency of this.</span></p>]]></paragraph>
<paragraph
    title="23.2.19.C.01."

    tags="Cloud Computing,Governance,Risk Management,Public cloud security,Assurance"


    classification="All Classifications"
    compliance="Must"
    cid="7400"
><![CDATA[<p class="Normal-nonumbering"><span>Agencies MUST obtain assurance that cloud service providers undertake appropriate software and operating system patching and maintenance.</span></p>]]></paragraph>
</block>
<block title="Assurance around workload isolation on shared infrastructure"><paragraph
    title="23.2.20.R.01."

    tags="Cloud Computing,Governance,Public cloud security,Assurance"


><![CDATA[<p class="Normal-nonumbering">Responsibilities for workload isolation in public cloud are shared between the cloud provider and consumer.  Workload isolation in a public cloud security context ensures compute processes or memory in one virtual machine/container are not visible to another tenant, even when they are running processes on the same physical hardware.</p>]]></paragraph>
<paragraph
    title="23.2.20.R.02."

    tags="Cloud Computing,Governance,Public cloud security,Assurance"


><![CDATA[<p class="Normal-nonumbering"><span>To mitigate the risk of unauthorised access between resources in separate tenancies, it is important that adequately architected security controls are built into the design. Examples of adequate security controls include zero touch configuration and separation of administrative control interfaces. </span></p>]]></paragraph>
<paragraph
    title="23.2.20.C.01."

    tags="Cloud Computing,Governance,Public cloud security,Assurance"


    classification="All Classifications"
    compliance="Must"
    cid="7404"
><![CDATA[<p class="Normal-nonumbering"><span>Agencies MUST obtain assurance that technical protections exist to adequately isolate tenants.</span></p>]]></paragraph>
</block>
<block title="Use of baseline security templates"><paragraph
    title="23.2.21.R.01."

    tags="Cloud Computing,Governance,Public cloud security,Assurance"


><![CDATA[<p class="Normal-nonumbering"><span>GCSB endorsed NZISM baseline security templates are intended to assist agencies in understanding the security posture of their cloud environments. They provide a baseline level of security within a cloud environment to significantly reduce agency’s assurance activities and focus then on moving towards continuous security posture assessments. </span></p>]]></paragraph>
<paragraph
    title="23.2.21.C.01."

    tags="Cloud Computing,Governance,Public cloud security,Assurance"


    classification="All Classifications"
    compliance="Should"
    cid="7407"
><![CDATA[<p>Agencies SHOULD make use of the GCSB endorsed baseline security templates where applicable.  </p>]]></paragraph>
</block>
</subsection>
</section>
