GOV009
These guidelines cover how to manage security incidents as part of the New Zealand government’s protective security requirements. They describe best practice for running security investigations.
GOV009
These guidelines cover how to manage security incidents as part of the New Zealand government’s protective security requirements. They describe best practice for running security investigations.
A security incident is:
Not all security incidents are significant enough to require investigation. Seek guidance from supporting agencies – the police, NZSIS, GCSB, New Zealand Defence Force, or other relevant agencies.
If foreign officials seek unauthorised access to official resources, Contact Reporting has separate advice.
Your organisation must assess the harm from any security incident. Determine the impact on the New Zealand government of actual, potential, or suspected loss, compromise or disclosure.
You must:
Your people and contractors must report:
Your organisation must have a policy for security incident reporting. It should cover the roles and responsibilities of people who handle security incidents and run security investigations.
Your chief executive or agency head should ensure there are:
Senior managers are responsible for the procedures for security incident reporting and recording — in their areas, and for the organisation overall. The Chief Security Officer (CSO), or their delegate, should help them.
In security investigations, a senior manager, who is independent of the incident, should approve the terms of reference and objectives. They should also get regular reports on the investigation’s progress.
Your managers should ensure security incidents are reported to the CSO, and work closely with them on any security concerns.
If an incident involves your ICT system, you may also need to report to the Chief Information Security Officer (CISO).
Managers have an important role to play. As they work closely with staff, they could be the first to detect a security incident or notice suspicious behaviour.
Your CSO, or their delegate, receives and actions information about security incidents.
They should record security incidents and the outcome of investigations, and report regularly to senior management on security performance.
Your CISO or ITSM receives and actions information about incidents involving ICT systems. These include denial of service attacks, targeted malicious email attacks, and loss of ICT assets or information.
They should report major ICT security incidents to the National Cyber Security Centre (NCSC).
They should tell your CSO about any ICT security incidents and the likely impacts. The CISO may have a role in investigating ICT security incidents.
Everyone that works for your organisation must know about and follow your processes for reporting security incidents.
Your organisation must provide security awareness training for employees, contractors, and contractors’ employees.
GOV010
Your organisation should have formal processes for responding to and reporting protective security incidents. You must make everyone aware of their responsibilities and the reporting processes.
They should be aware of the need to report anyone who seeks access to information they’re not authorised to access.
For reporting breaches of cyber security, find advice in the New Zealand Information Security Manual - Cyber Security Incidents.(external link)
Your people must report security weaknesses they see or suspect, and threats to processes, policies, systems, or services. They should report weaknesses as soon as possible.
Your people should never attempt to prove a suspected weakness. This is for their own protection. Testing a weakness might be seen as misusing the system.
Your organisation should have processes for monitoring and measuring the types, volumes, and costs of incidents and malfunctions. Use the information to:
Your organisation should have a formal process for staff who breach your security policies and processes. It may be part of your process for handling misconduct.
It ensures that anyone suspected of breaching security is treated fairly.
Cover the process as part of staff inductions and in your security awareness training.
Your organisation’s security policy and processes should:
Your organisation’s security awareness training must include how to report incidents, and state that staff must report incidents.
Develop methods for recording incidents that suit your organisation’s security environment and operations.
In your records of security incidents, include:
Recording security incidents gives valuable insights into an organisation’s security environment and performance. For instance, if you have many minor security incidents, it could show there is poor staff awareness and that you need more security awareness training.
CSOs should regularly report details of security incidents and any trends to your agency head.
Your organisation is unique, so you should develop your own processes for investigating minor security incidents.
Tell the NZSIS(external link) about security incidents involving holders of security clearances
You must tell the New Zealand Security Intelligence Service (NZSIS) about:
Any staff who hold a security clearance must report unusual or suspicious contacts with foreign officials, or requests from foreign officials for access to your assets or protectively-marked information. More information is in Contact Reporting.
Your policies and processes for dealing with major security incidents must be more formal.
If a suspected major security incident involves resources from another organisation, seek advice from that organisation before beginning an investigation. The organisation may have operational security requirements. It may be more appropriate for the originating or responsible organisation to perform the investigation. Apply the 'need-to-know' principle.
You must report to the right security agency any incidents of suspected:
Do an initial assessment, then contact the relevant agency or agencies as soon as possible. Only give information on a need-to-know basis until you are told otherwise. Contact your PSR engagement manager if unsure.
Report any suspected cyber security incidents to National Cyber Security Centre including:
Your organisation’s ICT security policies and plans should require early contact with NCSC to avoid accidentally compromising a cyber security investigation.
Report security incidents involving Cabinet material to the Cabinet Office
Report suspected security incidents involving Cabinet material to the Cabinet Office in the Department of the Prime Minister and Cabinet.
The Cabinet Manual(external link) covers the security and handling of Cabinet documents.
Where the incident may be a criminal offence, you may need to report to the appropriate law enforcement body. Ask the NZ Police for advice.
Where lives or public safety are at risk, contact the emergency services — dial 111.
Critical incidents that may affect public safety include the following types:
Personal attacks:
Hostage taking, actual or suspected:
Attacks to property or information:
Report major occupational health and safety incidents to WorkSafe
You must report health and safety incidents involving serious injury or death to WorkSafe New Zealand(external link).
Include these details when you report major security incidents
When reporting suspected major security incidents, cover these details:
If you’ve reported a major incident, ensure you also report any updates and changes to the situation.
You are responsible for circulating information about incidents within your own organisation.
GOV011
A security investigation establishes what caused the incident and how far it compromised or threatened the security of people, information, or assets.
The principles of procedural fairness apply to all investigations. People whose rights, interests or expectations are affected should be told the case against them, and given an opportunity to be heard by an unbiased decision-maker.
The actions that result from an investigation must be fair. More information is in Procedural fairness requirements.
Outcomes of an investigation may include:
In some circumstances it will be appropriate to take interim security measures while an investigation is underway. What is appropriate will be different in every case. You need to balance the need to protect your people, information, or assets with your employment obligations of natural justice.
Interim measures you may consider include:
Any response must be justifiable and proportional to the concern held, and appropriately directed to protect any people, information, or assets potentially at risk. It must be an interim step to protect your people, information, or assets while the security investigation is underway.
In most circumstances it will be appropriate to tell the employee what interim measures are being taken, particularly where the employee remains in the workplace. For example, limiting access to a building or a system should be clearly explained. The employee should be told that security measures are being taken, that they are interim while the security investigation is ongoing, and do not signal predetermination. The measures must be targeted to the concerns held and not arbitrarily applied.
However, there will be instances where notifying the employee about the interim measures is not appropriate. For example, when monitoring of computer use is considered necessary, notifying the employee might compromise the purpose of the monitoring.
Early engagement with HR is essential to ensure appropriate security measures are taken while also balancing employment obligations of natural justice.
If you initiate a security investigation, get advice from the police or NZSIS when a violation may involve national security or criminal behaviour.
If an incident requires more than one type of investigation, work with the other agency(ies) to determine priorities and an investigative approach.
A criminal investigation gathers evidence that may lead to bringing offenders before the courts.
You may need to hold a criminal investigation in cases such as fraud, theft, and unauthorised disclosure of official information.
Information gathered in a security investigation may not be satisfactory in a criminal investigation.
The purpose of a security investigation is to establish what has happened and how. It is not to establish whether a criminal offence has been committed, to aid prosecution, or to resolve employment or code of conduct disputes.
A security investigation focuses on establishing:
If a security investigation gives way to a criminal investigation, from then on you need to use procedures for a criminal investigation and for gathering evidence that is admissible in court.
Your organisation should set policy and procedures for investigating security incidents. Cover these requirements.
Responsibilities and actions:
Procedures:
Requirements for reporting:
Appoint an investigator who is appropriately trained and qualified. They should be impartial. They must not have a conflict of interest, real or apparent, in the investigation.
If the investigator you appoint does not have the power or authority to collect any evidence, or if a conflict of interest comes up, refer the investigation to a person or agency with the necessary delegations.
More information is in Procedural fairness requirements.
An investigator’s key tasks should include:
At the start, assess:
The terms of reference should be clear, comprehensive, and include any limits. They could include:
Also cover how the investigator will collect evidence, such as:
At the start of an investigation, appoint a senior staff member to approve the terms of reference and the investigation plan.
Your organisation’s investigation processes should include:
The investigator should assess:
Use the incident assessment to prepare an investigation plan that identifies:
If the terms of reference and the investigation plan need to change during the investigation, the investigator should consult the person who authorised the investigation.
An investigator identifies, collects and presents information proving or disproving the facts relating to the incident. Types of information are:
Investigators should keep a separate file for each investigation. Store it, and any physical evidence, securely.
The file should be a complete record of the investigation. Document every step, including dates and times, all discussions, phone calls, interviews, decisions, and conclusions. Include how physical evidence was handled.
If any protectively-marked information was gathered or created during the investigation, investigators must meet the standards for storage. More information is in How to protect information.
The investigator should report findings to the commissioning body or the decision-maker. They should identify the reasons for the findings according to the terms of reference, use supporting material, and make recommendations.
An investigation is closed when all reports are completed and evidence is documented and filed.
An independent person, ideally more experienced than the investigator, should review the closed investigation. They should impartially assess the investigation, and that could identify how to improve requirements for future investigations.