Protective Security Requirements (PSR)

System lead: New Zealand Security Intelligence Service (NZSIS)

New Zealand Government Protective Security Requirements (PSR) outlines the Government’s expectations for managing personnel, information and physical security

Published guidance:

Department of the Prime Minister and Cabinet - Defining National Security

Contact for further advice: psr@protectivesecurity.govt.nz

Requirements and expectations

Crown Agents

Autonomous Crown Entities

Independent Crown Entities

Legal requirements:

No legal requirements for Crown agents to adopt the PSR, however it is encouraged as good practice

Entity-specific requirements may be contained in a Crown entity’s establishment legislation

Legal requirements:

No legal requirements for ACEs to adopt the PSR, however it is encouraged as good practice

Entity-specific requirements may be contained in a Crown entity’s establishment legislation

Legal requirements:

No legal requirements for ICEs to adopt the PSR, however it is encouraged as good practice

Entity-specific requirements may be contained in a Crown entity’s establishment legislation

National Cyber Security Centre (NCSC) - GCSB

System lead: Government Chief Information Security Officer (GCISO). The GCISO role is supported by the National Cyber Security Centre (NCSC)

The National Cyber Security Centre (NCSC) is part of the Government Communications Security Bureau. 

Published guidance:

Services

The NCSC provides cyber security services to all New Zealanders - from individuals to small and medium businesses and organisations, large enterprises, government, and nationally significant organisations  

The NCSC also develops services to strengthen New Zealand’s cyber defence capabilities, such as;

  • Malware Free Networks (MFN), is a threat detection and disruption service which provides near real-time threat intelligence reflecting current malicious activity targeting NZ organisations.
  • Advanced cyber threat detection and disruption (CORTEX) capabilities and services to organisations of national significance

Contact for further advice:

The NCSC responds 24/7 to cyber security incidents of potential national significance. You can report an incident using the contact information and form on the NCSC website:  

Requirements and expectations

Crown Agents

Autonomous Crown Entities

Independent Crown Entities

Legal requirements:

No legal requirements for Crown agents to implement NCSC standards; however, it is strongly encouraged as good practice

Entity-specific requirements may be contained in a Crown entity’s establishment legislation

Ministerial expectations:

Crown agents sit outside the scope of agencies of the GCISO’s mandated standards (i.e. the NZ Information Security Manual (NZISM) and assurance activities (i.e. reporting against the Protective Security Requirements (PSR) policy framework). 

Legal requirements:

No legal requirements for ACEs to implement NCSC standards; however, it is strongly encouraged as good practice

Entity-specific requirements may be contained in a Crown entity’s establishment legislation

Legal requirements:

No legal requirements for ICEs to implement NCSC standards; however, it is strongly encouraged as good practice

Entity-specific requirements may be contained in a Crown entity’s establishment legislation