INF051
Consider these specific scenarios and how to manage the associated risks:
- Transacting online with the public
- Outsourcing, offshoring, and supply chains
- Mobile and remote working
- Cloud computing
- Communication security
INF051
Consider these specific scenarios and how to manage the associated risks:
INF038
Online services offer the public a convenient, efficient way to access government and other services. However, as the demand for online services grows, so too does the scale and sophistication of cybercrime and malicious activities.
The New Zealand Government recognises cyber threats and identifies cyber security as a top-tier priority for national security.
Organisations should adopt mitigation strategies to reduce the public’s exposure to cyber security risks online. If your online services are compromised, your services may expose your clients to harm. Malicious software posted on your online services could result in:
Consider the impacts of unintended information disclosure. For example, unintentionally disclosing location information about the people you are transacting with.
Organisations that provide online services should maintain skilled, in-house IT security staff who work closely with the organisation’s chief security officer (CSO). The Chief Information Security Officer (CISO) should lead this function.
The New Zealand Information Security Manual(external link) (NZISM) provides details of the mandatory and recommended controls for protecting official information. You can also contact the National Cyber Security Centre(external link) (NCSC) for guidance.
Ensure that users are aware of the risks surrounding the use of public-facing systems and how to mitigate them.
Provide training and documentation on how to use systems and services safely and appropriately for each of the usage scenarios described in this section. Develop policies for usage and ensure that all system users follow them.
Take care with insecure browsers. Restrict access to browser versions that are known to have security weaknesses, are out of date or unsupported, or warn users about them.
If your public users need to set up an online account to transact with your organisation, use the following measures to protect their security.
Consider providing advice or links to cyber security and cyber safety information
Also see NZISM: Email security(external link)
Also see:
Also see:
INF039
Supply chains are becoming more complex. When you conduct your risk assessment, consider each part of your organisation’s supply chain.
If you’re considering outsourcing functions, services, or capabilities to third parties, make sure you understand the value and classification of the information that the supplier and their sub-contractors will have access to.
Check that your suppliers can articulate who and what they are connected to, and what dependencies they have.
Your organisation should consider using common capability solutions if they exist, rather than sourcing individual solutions themselves, because the security and capability has already been scoped.
Products and services(external link) — digital.govt.nz
Your organisation’s heads will remain accountable for ensuring that information is appropriately protected, even if you outsource responsibility for security controls.
It is your responsibility to perform due diligence, validation, and acceptance for supply chain services, even when you use common capability solutions.
If you’re considering outsourcing functions, services, or capabilities to third parties — inside or outside of New Zealand — make sure you understand the value, classification, and relevant risks of the information that the supplier and their sub-contractors will have access to.
Follow guidelines
New Zealand Government organisations must follow the outsourcing and offshoring guidelines and policies defined below.
You need to take the steps below when using cloud services to store or process New Zealand Government information. They apply to:
Your organisation must do these things:
You must not use public or hybrid cloud services to host, process, or store material marked New Zealand Eyes Only (NZEO).
You can outsource services for storing and processing information that is publicly available and not protectively marked to providers outside New Zealand.
Before entering into any arrangements, you must formally assess the security risks and identify controls to manage them.
You must follow the requirements for handling, storing, transmitting, transporting, and disposing of information in the Management protocol for information security.
You can outsource services for storing and processing information protectively marked at, or below, RESTRICTED to providers outside New Zealand. Before entering into any outsourced or offshore ICT arrangements, your organisation must:
Before you certify and accredit the service, as part of the validate stage of the security lifecycle, verify that the security controls for managing security and privacy risks have been implemented and are effective.
Your chief executive, or their formal delegate, must:
You must not outsource services for storing and processing information protectively marked at CONFIDENTIAL, SECRET or TOP SECRET outside New Zealand.
You can outsource services to a provider physically located in New Zealand for storing and processing information protectively marked at CONFIDENTIAL, SECRET or TOP SECRET. However, you must get approval from the GCSB first.
Supporting documents and information
INF040
Mobile and remote working is now the norm, yet many people are unaware of the threats that they face.
Taking work home, working in the field, working from hotels or conference venues, visiting client offices, and working while on public transport are just a few ways that people work remotely, using portable computers and mobile devices.
Mobile working increases the risks of compromise. It can result in the loss of sensitive, high-value, corporate or personal information, affecting your information’s confidentiality, integrity and availability. The types of risks are:
These risks may be increased when privileged users have remote access to your systems. For example, systems are at greater risk when a system administrator has access to remotely manage systems from home or a mobile device.
Also consider how to secure and manage use of personal devices in bring-your-own-device (BYOD) scenarios. Today, more people are using their personal devices for corporate purposes or their corporate devices for personal purposes, increasing the risks of compromise. User education is crucial to managing your organisation’s risks.
Before approving your people for mobile or remote working, you should conduct a mobile work risk assessment.
Reduce risks when using mobile devices using these procedures.
Supporting documents and information
The New Zealand Information Security Manual (NZISM) provides details of the mandatory and recommended controls for the protection of official information. You can also contact the National Cyber Security Centre(external link) (NCSC) for guidance.
INF041
Cloud computing offers organisations cost effective, agile information storage. Cloud computing is generally more secure and provides greater choice than in-house solutions.
Cloud computing is key to the Government ICT Strategy and Action Plan to 2017 for improving service delivery, and will deliver substantial savings across government. Cabinet’s Cloud First policy requires agencies to adopt cloud services in preference to traditional IT systems.
Cloud computing poses some security risks for organisations. The Government Chief Digital Officer (GCDO) provides useful guidance for agencies when implementing cloud computing. digital.govt.nz has a cloud risk assessment process outlining the requirements for New Zealand government agencies.
Supporting documents and information
INF042
Communication security (COMSEC) safeguards reduce the threat of unauthorised people gaining access to your communications.
COMSEC includes cryptography, transmission security, emission security, traffic-flow security, and physical security of COMSEC equipment.
Your organisation should use mitigation strategies to reduce the threat of unauthorised access to communications. Encrypt all communications during transmission. You may need high-grade cryptographic equipment.
The standards relevant to these requirements are:
The Communications Security Standards are classified documents. For more information, contact GCSB.
(04) 819-8200
If you have technical questions on cryptographic products, contact Cryptographic Services.