This is a report of changes between nzism-data/NZISM-ISM Document-V.-3.8-September-2024.xml and nzism-data/NZISM-ISM Document-V.-3.9-April-2025.xml.
CID | Title | Classifications | Compliances | Text |
---|---|---|---|---|
7536 | 7.2.20.C.03. | All Classifications | Should | Agencies SHOULD formally share post-incident review reports by emailing them to incidents@ncsc.govt.nz. |
7537 | 11.8.13.C.01. | Top Secret, Secret, Confidential | Should | Use of MFDs for printing, scanning, and copying purposes SHOULD be centrally logged. |
7541 | 16.1.25.C.01. | All Classifications | Should | Agencies SHOULD design and implement Zero Trust principles and architecture to strengthen identification management. |
7542 | 16.1.27.C.02. | All Classifications | Must Not | Agencies MUST NOT use shared credentials to access administrator or privileged access accounts. NB: Break Glass accounts are exempt from this control. For further guidance on Break Glass accounts see Emergency accounts (Break Glass accounts section). |
7543 | 16.1.30.C.01. | All Classifications | Should | Agencies SHOULD assess and determine the risk of centralised access management systems, including SSO, to safely manage integration into systems and when using FIM. |
7544 | 16.1.31.C.01. | All Classifications | Must | Agencies MUST ensure adequate password policies are implemented and enforced across all systems. |
7545 | 16.1.31.C.02. | All Classifications | Must | Agencies MUST implement a password policy enforcing at least annual password changes on systems that have not implemented MFA or passwordless authentication. |
7546 | 16.1.31.C.03. | All Classifications | Must | Agencies MUST implement a password policy enforcing:
NB: no explicit complexity requirements are enforced (e.g. numbers or special characters), however passwords must be unique, or random and may include special characters and numbers to achieve this. |
7547 | 16.1.31.C.04. | All Classifications | Must | To ensure security of systems are not weakened through authentication mechanisms, at a minimum, agencies MUST:
|
7548 | 16.1.31.C.06. | All Classifications | Should | Agencies SHOULD consider the use of location-based factors in the authentication process, (e.g., Users must be at an expected location (city, country, IP address) and provide the correct credentials for the authentication to succeed). |
7549 | 16.1.31.C.07. | All Classifications | Should | When creating password policies, agencies SHOULD consider implementing annual password changes. |
7562 | 16.1.34.C.02. | All Classifications | Must | Passwords and other authentication secrets MUST be stored securely including being:
|
7551 | 16.1.36.C.02. | All Classifications | Must | Where passwords are not set by the account holder, agencies MUST use temporary passwords when resetting system user accounts. |
7552 | 16.1.36.C.03. | All Classifications | Should Not | Agencies SHOULD NOT use single factor authentication when changing users’ Multi-Factor Authentication details. |
7558 | 16.1.37.C.01. | All Classifications | Must | Password managers provide no additional security to the sign-in password. Agencies using password managers MUST ensure sign-in passwords adhere to the password security policies used by the organisation. |
7559 | 16.1.37.C.02. | All Classifications | Should | Agencies using password managers SHOULD consider the use of MFA to access the password manager. |
7556 | 16.1.38.C.01. | All Classifications | Should | When moving to passwordless authentication, agencies SHOULD carry out a risk assessment and evaluate passwordless authentication models to choose authentication mechanisms and factors that best fit the organisation’s security and authentication requirements. |
7554 | 16.1.39.C.01. | All Classifications | Must | Agencies MUST ensure authentication methods that are susceptible to replay attacks are disabled. |
7550 | 16.4.37.C.03. | All Classifications | Should | Agencies SHOULD consider the use of time bound revocation to privileged accounts. |
7553 | 16.4.39.C.02. | All Classifications | Must | Agencies MUST investigate any indication of compromise or misuse of systems credentials or accounts. |
7555 | 16.5.12.C.02. | All Classifications | Should | Agencies SHOULD use Zero Trust principles alongside the use of VPN connections to enhance the security posture of the organisation. This should include removing the ability for a standard user to disable the VPN connection. |
7557 | 16.6.13.C.05. | All Classifications | Should | Agencies should prioritise their log retention requirements based on the risks surrounding their most sensitive systems. |
7560 | 16.6.15.C.01. | All Classifications | Should | Agencies SHOULD have a monitoring solution implemented that enables detection of incidents as they occur so that appropriate responses can be taken in adequate timeframes. |
7561 | 16.6.15.C.02. | All Classifications | Should | Agencies SHOULD have systems available for processing system event logs to identify and correlate events which indicate behavioural anomalies or potential security compromise in the systems, in a near real-time manner. |
7563 | 16.7.42.C.01. | All Classifications | Should | Where an agency has external facing systems, cloud-based services, or is authenticating to third-party services services, they MUST:
|
7564 | 16.7.42.C.03. | All Classifications | Must | Agencies MUST implement MFA on all user accounts with remote access to organisational resources. |
7565 | 16.7.42.C.04. | All Classifications | Should | Agencies SHOULD implement MFA on all user accounts with access to organisational resources. |
7566 | 16.7.42.C.05. | All Classifications | Should | Where agencies have implemented MFA, they SHOULD implement phishing-resistant MFA on administration accounts. |
7567 | 16.7.42.C.06. | All Classifications | Should | Agencies SHOULD use phishing-resistant MFA when authenticating users to systems. |
7538 | 18.2.9.C.01. | Secret, Confidential, Top Secret | Must | EAP-TLS or PEAP-EAP-TLS MUST be used on wireless networks to perform mutual authentication. |
7539 | 18.2.19.C.01. | All Classifications | Must Not | Agencies MUST NOT use Wi-Fi Protected Access (WPA) for wireless deployments. |
7540 | 18.2.19.C.03. | All Classifications | Should | Agencies SHOULD use Wi-Fi Protected Access 3 (WPA3) for wireless deployments with preference given to WPA3-Enterprise 192-bit mode. |
CID | Title | Classifications | Compliances | Text |
---|---|---|---|---|
1223 | 7.2.21.C.01. | All Classifications | Should | Agencies SHOULD formally report information security incidents using the NCSC on-line reporting form. |
3052 | 11.6.72.C.01. | All Classifications | Must Not | Any RFID tags of class 3, 4, or 5 MUST NOT be permitted in secure spaces. |
3054 | 11.6.72.C.02. | All Classifications | Must Not | RFID readers MUST NOT be permitted in secure spaces. |
3055 | 11.6.72.C.03. | All Classifications | Should Not | Class 2 RFID tags SHOULD NOT be permitted in secure spaces. |
1857 | 16.1.40.C.01. | Secret, Top Secret, Confidential | Must | Agencies MUST implement a password policy enforcing:
|
1858 | 16.1.40.C.02. | All Classifications | Should | Agencies SHOULD implement a password policy enforcing either:
|
1868 | 16.1.41.C.01. | Confidential, Top Secret, Secret | Must | Agencies MUST:
|
1870 | 16.1.41.C.03. | All Classifications | Should | Agencies SHOULD:
|
1871 | 16.1.41.C.04. | All Classifications | Should Not | Agencies SHOULD NOT:
|
1893 | 16.1.46.C.02. | All Classifications | Should | Agencies SHOULD:
|
1904 | 16.1.49.C.01. | All Classifications | Should | Agencies SHOULD configure systems to display the date and time of the system user’s previous login during the login process. |
1909 | 16.1.50.C.01. | All Classifications | Should Not | Agencies SHOULD NOT permit the display of last logged on username, credentials or other identifying details. |
1910 | 16.1.50.C.02. | All Classifications | Should Not | Agencies SHOULD NOT permit the caching of credentials unless specifically required. |
1946 | 16.3.5.C.02. | All Classifications | Should | Agencies SHOULD:
|
CID | Title | Classifications | Compliances | Text |
---|---|---|---|---|
1154 | 7.1.7.C.02. | All Classifications | Should | Agencies SHOULD develop, implement and maintain tools and procedures covering the detection of potential information security incidents, incorporating:user awareness and training;counter-measures against malicious code, known attack methods and types;intrusion detection strategies;dynamic network defence (i.e. protective DNS and/or NGFW)data egress monitoring & control;access control anomalies;audit analysis;system integrity checking; andvulnerability assessments. |
1216 | 7.2.20.C.01. | All Classifications | Must | The Agency ITSM, MUST report information security incidents categorised as:Critical;Serious; orincidents related to multi-agency or government systems;to the NCSC (see also as soon as possibelole.A Report Form is provided on the NCSC w) as soon as possieble.site under Reporting an Incident atReport an incident and request support | National Cyber Security Centre |
1220 | 7.2.20.C.02. | All Classifications | Should | Agencies SHOULD report information security incidents categorised asLowto the NCSC.AReport Form is provided on the NCSC website under Reporting an Incident atReport an incident and request support | National Cyber Security Centre |
1271 | 7.3.7.C.01. | All Classifications | Must | Agencies MUST implement procedures and processes to detect data spills or data breach. |
1274 | 7.3.7.C.03. | All Classifications | Must | Agency SOPs MUST include procedure for:all personnel with access to systems;notification to the ITSM of any data spillage or breaches; andnotification to the ITSM of access to any data which they are not authorised to access. |
1275 | 7.3.7.C.04. | All Classifications | Must | Agencies MUST document procedures for dealing with data spills or data breaches in their IRP. |
1276 | 7.3.7.C.05. | All Classifications | Must | Agencies MUST treat any data spill or data breach as an information security incident and follow the IRP to deal with it. |
1277 | 7.3.7.C.06. | All Classifications | Must | When a data spill or data breach occurs agencies MUST report the details of the data spill to the Privacy Commissioner and information owner in accordance with thePrivacy Act 2020. |
1285 | 7.3.8.C.03. | All Classifications | Should | When a data spill involving classified information or contamination or data breach involving classified or sensitive information or contaminationof classified systems occurs and systems cannot be segregated, or isolated agencies SHOULD immediately contact theNCSCfor further advice. |
1290 | 7.3.9.C.01. | All Classifications | Should | Agencies SHOULD follow the steps described below when malicious code is detected:isolate the infected system;decide whether to request assistance fromNCSC;if such assistance is requested and agreed to, delay any further action until advised byNCSC;scan allcheck connected systems and media including backups for malicious code;isolate all infected systems and media to previously connected systems and any media used within a set period leadient reinfection;chang up to the information security incidente all passwords and key material stored or potentially accessed from compromised systems, for malicious codeincluding any websites with password controlled access;isolate all infected systems and media to preadvent reinfectionise system users of any relevant aspects of the compromise, including a recommendation to change all passwords on compromised systems;change all passwords and revokey material stored or potentially accessed from compromised systems, including any websites with password controlled access all session tokens associated with user and/or device;aduse up-to-date anti-malware software to removise system users of any relee the malware from the systems or media;monitor network traffic for malicious activant aspects of the compromise, including a recommendation to change all passwords on compromised systemsity;use up-to-date anti-malware software to remove the malware from the systems or media;monitor network traffic for malicious activity;record and report the information security incident and perform any other activities specified in the IRP; andin the worst case scenario,certain scenarios rebuild and reinitialise the systeming and reinitialising the system and/or user profile may be required. |
1294 | 7.3.10.C.01. | All Classifications | Must | Agencies considering allowing an attacker to continue some actions under controlled conditions for the purpose of seeking further information or evidence MUSHOULD Tseek legal advice. |
1403 | 8.4.10.C.01. | All Classifications | Must | Agencies MUST ensure that when secure areas are non-operational or when work areas are unoccupied IT equipment with media is secured in accordance with the minimum physical security requirements for storing classified information as specified in thePSR Management protocol for physical securitywith supporting document –Physical Security fortorage requirements for electronic information in ICT, with supporting document –Storage requirements for electronic information in ICT facilities. |
1829 | 16.1.26.C.01. | All Classifications | Must | Agencies MUST ensure that all system users are:uniquely identifiable; andauthorisedand authenticated on each occasion that access is granted to a system. |
1837 | 16.1.28.C.01. | All Classifications | Must | If agencies choose to allow shared, non user-specific accounts they MUST ensure that an independent means of determining the identification of the system user is implemented and logged. |
1841 | 16.1.29.C.02. | All Classifications | Should | Agencies SHOULD ensure that they combine the use of multiple-factor meauthenticatiodsn (MFA) when identifying and authenticating system users. |
1869 | 16.1.31.C.05. | All Classifications | Must Not | Agencies MUST NOT:allow predictable reset passwords;store passwords in the clear on the system; andreuse passwords when resetting multiple accounts;store passwords in the clear on the system;allow passwords to be reused within eight password changes; andallow system users to use sequential passwords. |
1847 | 16.1.33.C.01. | All Classifications | Must | Agencies MUST ensure that system authentication data is protected when in transit on orgagencyisation networks or All-of-Government systems. |
6553 | 16.1.34.C.01. | All Classifications | Must | Password and other authentication dasecretas MUSHOULDT be hashed before storage using an approved cryptographic protocol and algorithm.See Chapter 17 – Cryptography. |
1875 | 16.1.36.C.01. | All Classifications | Must | Agencies MUST ensure system users provide sufficient evidence to proverif they their iare the owner of the account when requesting a passwordentit reset for their sy when requesting a password reset for their system accountstem account or making changes to their multi-factor authenticators. |
1878 | 16.1.39.C.02. | All Classifications | Must | Agencies MUSHOULDT disable LAN Manager for password authentication on workstations and servers. |
1881 | 16.1.40.C.01. | All Classifications | Should | Agencies SHOULD develop and implement a policy to automatically logout and shutdown workstations after an appropriate time of inactivity. This includes invalidating any session tokens. |
1885 | 16.1.41.C.01. | Confidential, Top Secret, Secret | Must | Agencies MUST:configure systems with a session or screecreen and session lock;configure the lock to activate:after a maximum of 10 minutes of system user inactivity; orif manually activated by the system user;configure the lock to completely conceal all information on the screen;ensure that the screen is not turned off or enters a power saving state before the screen or session lock is activated;have the system user reauthenticate to unlock the system; anddeny systemuser reauthenticate to unlock the system; and deny users the ability to disable the locking mechanism. |
1886 | 16.1.41.C.02. | All Classifications | Should | Agencies SHOULD:configure systems with a session or screen lock;configure the lock to activate:after a maximum of 150 minutes of system user inactivity; orif manually activated by the system user;configure the lock to completely conceal all information on the screen;ensure that the screen is not turned off or enters a power saving state before the screen or session lock is activated;have the system user reauthenticate to unlock the system; anddeny system users the ability to disable the locking mechanism. |
1892 | 16.1.42.C.01. | All Classifications | Must | Agencies MUST:Record all successful and failed logon attempts;lock system user accounts after three failed logon attempts;use a temporary lock out feature to unlock system (max [] times);have a system administrator reset locked accounts if [] times is superseded;remove or suspend system user accounts as soon as possible when personnel no longer need access due to changing roles or leaving the agencyorganisation; andremove or suspend inactive accounts after a specified number of days.NB: Agencies can determine the risk of using a temporary lock out feature on their specific systems.[] indicates the chosen 'value of times' an agency has decided to use for the temporary lock out feature. |
1930 | 16.2.4.C.01. | All Classifications | Must | Agencies MUSHOULD Tfollow the process adefinedprocess for developing an access control list, such asdescribedin the table below for developing an access control list.StageDescription1Establish groups of all system resources based on similar securityobjectives.2Determinethe information owner for each group of resources.3Obtain agreement from system owners.4Establish groups encompassing all system users based on similar functions or security objectives.5Determine the group owner or manager for each group of system users.6Determine the degree of access to the resource for each system user group, incorporating the principal of least-privilege access.7Decide on the level of access for security administration, based on the internal security policy.8Identify any classification, protective markings and releasability indicators, and releasability indicators (such as NZEO or compartmented information). |
1945 | 16.3.5.C.01. | All Classifications | Must | Agencies MUST:ensure strong change management practices are implemented;ensure that the use of privileged accounts is controlled and accountable;ensure that system administrators are assigned, and consistently use, an individual account for the performance of their administration tasks;keep privileged accounts to a minimum; andallow the use of privileged accounts for administrative work only. |
1953 | 16.3.7.C.01. | All Classifications | Should | Agenciesinvolved in frequent transfers of data from another system to their system with a lesser classificationSHOULD clear at ensure atleast one privileged user to has a security clearance levelcommensuratethe classification of the higher system. |
6837 | 16.4.36.C.03. | All Classifications | Must | AgenciesMUST manage Pprivileged Aaccounts in accordance with the Aagency’s PAM Ppolicy. |
6843 | 16.4.37.C.02. | All Classifications | Must | AgenciesMUSHOULDT use two-factor or Multi-Factor Authentication to allow access to Pprivileged Aaccounts. |
2001 | 16.6.7.C.01. | All Classifications | Should | A system management log SHOULD record the following minimum information:allsystem start-up andshutdown;all systemchanges;userchanges;service, application, component or system failures;maintenance componentor systemfailures;maintenanceactivities;backup and archivalactivities;system recovery activities; andspecial or out of hours activities. |
2009 | 16.6.9.C.01. | Top Secret, Secret, Confidential | Must | AgenciesMUSTlog, at minimum, the following events for all software components:logons;failed logon attempts;logoffs;date and time;all privileged operations;failed attempts to elevate privileges;security related system alerts and failurany login activity orattempts;date andtime;all privilegedoperations;failed attempts to elevateprivileges;security related system alerts andfailures;software upgrades and/or softwarepatching;system recoveryactivities;system user and group additions, deletions deletionsand modification to permissions; andunauthorised or failed access attempts to systems and files identified as critical to the agencyorganisation. |
2013 | 16.6.10.C.02. | All Classifications | Should | AgenciesSHOULDlog, at minimum, the following events for all software components:user login;all prAny login activileged operations;failed attempts to elety orattempts;all private priilegedoperations;failed attempts to elevileges;security related system alerts and failuresateprivileges;security related system alerts andfailures;all softwareupdates and/or patching;system user and group additions, deletions deletionsand modification to permissions; andunauthorised or failed or failedaccess attempts to systems and files identified as critical to the agencyorganisation. |
2022 | 16.6.12.C.01. | All Classifications | Must | Event logsMUSTbe protected from:modification and ;unauthorised access;andwhole or partial loss within the defined retention period. |
2031 | 16.6.13.C.04. | All Classifications | Should | AgenciesSHOULDretainDNS,proxyand event logs for atminimum least of18 2months. |
6953 | 16.7.42.C.02. | All Classifications | Should | Where an agency has implemented MFA they MUSHOULDT:Rrequire MFA for administrative or other high privileged users; andIimplement a secure, multi-factor process to allow users to reset their normal usageentities to reset their standard user credentials. |
6952 | 16.7.42.C.07. | All Classifications | Should | The design of an agency’s MFA SHOULD include consideration of:Risk Iidentification;Level of security and access control appropriate for each aspect of an agencyorganisation’s information systems (data, devices, equipment, storage, cloud, etc.)A formal authorisation process for user system access and entitlements;Logging, monitoring and reporting of activity;Review of logs for orphaned accounts and inappropriate user access including unsuccessful authentication;Identification of error and anomalies which may indicate inappropriate or malicious activity;Incident response;Remediation of errors;Suspension and/or revocation of access rights where policy violations occur;Capacity planning. |
6956 | 16.7.43.C.01. | All Classifications | Should | The design of an agency’organisations MFA system SHOULD be integrated with the agency’s Information Security Policy and, the agency’s Privileged Access Management (PAM) Policy, and any additional agency password policies. |
6960 | 16.7.44.C.01. | All Classifications | Must | When agencies’ implement MFA they MUST ensure users have an understanding of the risks, and include appropriate usage and safeguards for MFA in the agencyorganisation’s user training and awareness programmes. |
3319 | 18.2.9.C.02. | All Classifications | Must | WPA2-Enterprise with EAP-TLS, WPA2-Enterprise with PEAP-EAP-TLS, WPA2-Enterprise with EAP-TTLS or WPA2-Enterprise with PEAP MUST be used on wireless networks to perform mutual authentication. |
3386 | 18.2.19.C.02. | All Classifications | Should Not | Agencies SHOULD NOT use Wi-Fi Protected Access 2 (WPA2) for wireless deployments. |