127 |
1.1.64.C.01. |
All Classifications |
Must |
System owners seeking a dispensation for non-compliance with any baseline controls in this manual MUST be granted a dispensation by their Accreditation Authority. Where High GradAssurance Cryptographic Systems (HACS) are implemented, the Accreditation Authority will be the Director-General GCS) are implemented, the Accreditation Authority will be the Director-General GCSB or a formal delegate. |
255 |
2.3.27.C.01. |
All Classifications |
Must |
Agencies intending to adopt cloud technologies or services MUST conduct a comprehensive risk assessment, in accordance with the guidance provided by the Government CIhief Digital Officer (GCDO) before implementation or adoption. |
283 |
3.1.8.C.02. |
All Classifications |
Should |
When the agency head devolvegates their authority, the delegate SHOULD be a senior executive who understands the CISOconsequences and potential impact to the business of the acceptance of residual risk. |
311 |
3.2.8.C.05. |
All Classifications |
Should |
Where multhiple roles ofare held by the CISO is outsourced,any potential conflicts of interest in availability, response times or working with vendors SHOULD be identified and carefully managed. |
322 |
3.2.11.C.01. |
All Classifications |
Should |
The CISO SHOULD be responsible for establishing mechanisms and programs to ensuringe compliance with the information security policies and standards within the agency. |
323 |
3.2.11.C.02. |
All Classifications |
Should |
The CISO SHOULD be responsible for ensuring agency compliance with the NZISM through facilitating a continuous program of certification and accreditation bof asedll on security risk managency systements. |
334 |
3.2.13.C.02. |
All Classifications |
Should |
The CISO SHOULD liaise with agency technology architecture teams to ensure alignment between security and agency architectures. |
634 |
4.4.12.C.03. |
All Classifications |
Must |
Agencies MUST notify the Government CIhief Digital Officer (GCDO) where All-of-Government systems are connected to agency systems operating with expired accreditations. |
675 |
4.5.18.C.03. |
All Classifications |
Must |
The Accreditation Authority MUST advise the GCIDO where the accreditation decision may affect any All-of-Government systems. |
781 |
5.2.3.C.02. |
All Classifications |
Should |
The Information Security Policy (SecPol) SHOULD include topics such as:
accreditation processes;
personnel responsibilities;
configuration control;
access control;
networking and connections with other systems;
physical security and media control;
emergency procedures and information security incident management;
vulnerability disclosure;
change management; and
information security awareness and training.
|
1048 |
6.1.9.C.01. |
All Classifications |
Should |
Agencies SHOULD review the components detailed in the table below. Agencies SHOULD also ensure that any adjustments and changes as a result of any vulnerability analysis are consistent with the vulnerability disclosure policy.
Component
Review
Information security documentation
The SecPol, Systems Architecture, SRMPs, SecPlans, SitePlan, SOPs, the VDP, the IRP, and any third party assurance reports.
Dispensations
Prior to the identified expiry date.
Operating environment
When an identified threat emerges or changes, an agency gains or loses a function or the operation of functions are moved to a new physical environment.
Procedures
After an information security incident or test exercise.
System security
Items that could affect the security of the system on a regular basis.
Threats
Changes in threat environment and risk profile.
NZISM
Changes to baseline or other controls, any new controls and guidance.
|
1237 |
7.2.25.C.01. |
All Classifications |
Must |
Agencies MUST urgently notify GCSB of any suspected loss or compromise of keying material associated with HGACE. |
2662 |
11.3.12.C.02. |
Confidential, Secret, Top Secret |
Must |
Agencies MUSHOULDT use push-to-talk mechandisetms to meet the requirement for off-hook audio protection. PTT activation MUST be clearly labelled. |
3537 |
12.6.4.C.01. |
All Classifications |
Must |
Agencies MUST sanitise or destroy, then declassify, IT equipment containing any media before disposal. |
3566 |
12.6.8.C.01. |
All Classifications |
Must |
Agencies MUST visually inspect video screens by turning up the brightness to the maximum level to determine if any classified information has been burnt into or persists on the screen, before redeployment or disposal. |
3572 |
12.6.9.C.01. |
All Classifications |
Must |
Agencies MUST attempt to sanitise video screens with minor burn-in or image persistence by displaying a solid white image on the screen for an extended period of time. If burn-in cannot be corrected the screen MUST be processed through an approved destruction facility. |
4302 |
13.5.24.C.01. |
All Classifications |
Must |
Agencies MUST employ approved equipment for the purpose of media and IT Eequipment destruction MUST be performed using approved destruction equipment, facilities and methods. |
4304 |
13.5.24.C.02. |
All Classifications |
Must |
Where agencyies do not own thedir approvedwn destruction equipment is not available, agencies MUST use an approved destruction facility for media and IT Eequipment destruction. |
4343 |
13.5.25.C.01. |
All Classifications |
Must |
Agencies MUST, at minimum, store and handle the resulting waste for all methods, as forin accordance with the classification given in the table below.
Initial media or IT Equipment classification
Screen aperture size particles can pass through
Less than or equal to 3mm
Treat as
Less than or equal to 6mm
Treat as
TOP SECRET
UNCLASSIFIED
RESTRICTED
SECRET
UNCLASSIFIED
RESTRICTED
CONFIDENTIAL
UNCLASSIFIED
RESTRICTED
RESTRICTED
UNCLASSIFIED
UNCLASSIFIED
Particle size: measured in any direction, should not exceed stated measurement. |
4359 |
13.5.27.C.03. |
All Classifications |
Should |
The Destruction Register SHOULD record:
Date oestruction facility used;
Destruction method used;
Date of destruction;
Operator and witnesses;
Media or and IT Eequipment classification; and
Media or and IT Eequipment type, characteristics and serial number.
|
4367 |
13.5.29.C.01. |
Top Secret |
Must Not |
Agencies MUST NOT outsource the supervision and oversight of the destruction of TOP SECRET or NZEO media and IT Eequipment or other accountable material to a non-government entity or organisation. |
6019 |
15.2.22.C.01. |
All Classifications |
Should |
Before implementing DMARC agencies SHOULD:
Create a DMARC policy;
List all domains , in particused for the sendinglar those used for the sending and/or receiving of email;
Review the configuration of SPF and DKIM for all active domains and all published domains; and
Establish one or more monitored inboxes to receive DMARC reports.
|
6020 |
15.2.22.C.02. |
All Classifications |
Should |
Agencies SHOULD enable DMARC for all email originating from or received by their domain(s), including:
sending domain owners SHOULD publish a DMARC record with a related DNS entry advising mail receivers of the characteristics of messages purporting to originate from the sender’s domain;
received DMARC messages SHOULD be managed in accordance with the agency’s published DMARC policy; and
agencies SHOULD produce failure reports and aggregate reports according to the agency’s DMARC policies.
|
1827 |
16.1.31.C.01. |
All Classifications |
Must |
Agencies MUST:
develop, implement and maintain a set of policies and procedures covering all system users’:
identification;
authentication;
authorisation;
privileged access identification and management; and
make their system users aware of the agency’s policies and procedures.
|
2070 |
17.1.51.C.01. |
All Classifications |
Must |
Agencies using cryptographic functionality within a product for the protection of classifiedto protect the confidentiality, authentication, non-repudiation or integrity of information, MUST ensure that the product has completed a cryptographic evaluation recognised by the GCSB. |
2080 |
17.1.53.C.02. |
Confidential, Secret, Top Secret |
Must |
If an agency wishes to reduce the storage or physical transfer requirements for IT equipment or media that contains classified information, they MUST encrypt the classified information using High GradAssurance Cryptographic Equipment (HGACE). It is important to note that the classification of the information itself remains unchanged. |
2081 |
17.1.53.C.03. |
Confidential, Secret, Top Secret |
Must |
If an agency wishes to use encryption to reduce the storage, handling or physical transfer requirements for IT equipment or media that contains classified information, they MUST use:
full disk encryption; or
partial disk encryption where the access control will allow writing onlyONLY to the encrypted partition holding the classified information.
|
2082 |
17.1.53.C.04. |
All Classifications |
Should |
If an agency wishes to use encryption to reduce the storage or physical transfer requirements for IT equipment or media that contains classified information, they SHOULD use:
full disk encryption; or
partial disk encryption where the access control will only allow writing ONLY to the encrypted partition holding the classified information.
|
2089 |
17.1.55.C.01. |
Confidential, Secret, Top Secret |
Must |
Agencies MUST use HGACE if they wish to communicate or pass information over UNCLASSIFIED, insecure or unprotected networks. |
2090 |
17.1.55.C.02. |
Restricted/Sensitive |
Must |
Information or systems classified RESTRICTED or SENSITIVE MUST be encrypted with an aApproved encryption alCryptogorithm and praphic Algorithm and Protocol if information is transmitted or systems are communicating over any insecure or unprotected network such as the Internets, such as the Internet, public infrastructurenetworks or non-agency controlled networks. |
2091 |
17.1.55.C.03. |
All Classifications |
Must |
Agencies MUST encrypt aggregated agency data using an approved algorithm and protocol when data is transmitted over insecure or unprotected networks such as the Internet, pubetween data centres over insecure or unprotectlic infrastructure or non-agency controlled networks such as the Internet, public inwhen the compromise ofrastructure or non-agency controlled networks the aggregated data would present a significant impact to the agency. |
2092 |
17.1.55.C.04. |
All Classifications |
Should |
Agencies SHOULD useencrypt agency data using an approved encryption productalgorithm and protocol if they wish to communicate over insecure or unprotected networks such as the Internet, public networks or non-agency controlled networks. |
2105 |
17.1.58.C.03. |
All Classifications |
Must |
Agencies using HACE MUST consult with the GCSB for the key management requirements for HGCE. |
2128 |
17.2.17.C.01. |
All Classifications |
Must |
Agencies using an unevaluated product that implements an Approved Cryptographic Algorithm MUST ensure that only Approved Cryptographic Algorithms can be used when using an unevaluated product that implements a combination of approved and non-approved Cryptographic Algorithms. |
2134 |
17.2.19.C.01. |
All Classifications |
Must |
Agencies using DH, for the approved use of agreeing on encryption session keys, MUST use a modulus of at least 4309672 bits. |
2137 |
17.2.20.C.01. |
All Classifications |
Must |
Legacy dDevices which are NOT capable of implementing required key lengths MUST be reconfigured with the longest feasible key length as a matter of urgency. |
2138 |
17.2.20.C.02. |
All Classifications |
Must |
Legacy dDevices which are NOT capable of implementing required key lengths MUST be scheduled for replacement as a matter of urgency. |
2151 |
17.2.24.C.01. |
All Classifications |
Must |
Agencies using RSA, for the approved use of digital signatures and passing encryption session keys or similar keys, MUST use a modulus of at least 3072048 bits. |
2155 |
17.2.26.C.01. |
All Classifications |
Must |
Agencies MUST use the SHA-2 family befor new systems. Use usingof SHA-1 is permitted ONLY for legacy systems. |
5905 |
17.2.26.C.02. |
All Classifications |
Must |
Agencies MUSHOULDT use a minimum of SHA-384 when using hashing algorithms to provide integrity protection for information classified as RESTRICTED/SENSITIVE or above. |
2158 |
17.2.28.C.01. |
All Classifications |
Should Not |
Agencies using approved symmetric encryption algorithms (e.g. AES or 3DES) SHOULD NOT use Electronic Code Book Mode (ECB) mode. |
2598 |
17.4.16.C.01. |
All Classifications |
Should |
Agencies SHOULD use the current version of TLS (version 1.23). |
3043 |
17.9.31.C.01. |
All Classifications |
Must |
Agencies MUST comply with NZCSI when using HGCP or HGACE. |
3053 |
17.9.32.C.03. |
All Classifications |
Should Not |
Agencies SHOULD NOT transport commercial grade cryptographic equipment or products in a keyed state. |
3290 |
18.2.6.C.01. |
All Classifications |
Must |
Agencies deploying a wireless network for public access MUST segparegate it from any other agency networks; including BYOD networks. |
3621 |
18.2.34.C.01. |
All Classifications |
Should |
Wireless networks SHOULD be sufficiently segregated through the use of channel separation. |
4015 |
19.4.4.C.01. |
All Classifications |
Must |
Agencies MUST use devices as shown in the following table for controlling the data flow of one-way gateways between networks of different classifications.
High networrk
Low network
You require
RESTRICTED
UNCLASSIFIED
EAL2 or PP diode
RESTRICTED
EAL2 or PP diode
CONFIDENTIAL
UNCLASSIFIED
high assurance diode
RESTRICTED
high assurance diode
CONFIDENTIAL
high assurance diode
SECRET
UNCLASSIFIED
high assurance diode
RESTRICTED
high assurance diode
CONFIDENTIAL
high assurance diode
SECRET
high assurance diode
TOP SECRET
UNCLASSIFIED
high assurance diode
RESTRICTED
high assurance diode
CONFIDENTIAL
high assurance diode
SECRET
high assurance diode
TOP SECRET
high assurance diode
|
4660 |
21.4.11.C.06. |
All Classifications |
Must |
Wireless accesses points used for access to agency networks MUST be implemented and secured in accordance with the directions in this manual (See Section 18.2 – Wireless Local Area Networks). |
4675 |
21.4.11.C.20. |
All Classifications |
Should |
BYOD devices and systems SHOULD use Multi-factor (at least two-factor) authentication to connect to agency systems and prior to being permitted access to agency data. |
4812 |
22.1.21.C.05. |
All Classifications |
Must |
Agencies MUST consult with the GCIDO to ensure the strategic and other cloud risks are comprehensively assessed. |
4814 |
22.1.21.C.07. |
All Classifications |
Must |
Agencies using cloud services MUST ensure they have conducted a documented risk assessment, accepted any residual risks, and followed the endorsement procedure required by the GCIDO. |
4822 |
22.1.22.C.03. |
All Classifications |
Must |
Agencies using cloud services hosted offshore and connected to All-of-Government systems MUST ensure they have conducted a risk assessment, accepted any residual risks, and followed the endorsement procedure required by the GCIDO. |