-
Section 01
Ngā Hononga Ohumahi, Hononga Mahi hoki Workforce and Employment Relations
-
Section 02
Mahi ā-Poari Governance
-
Section 03
Hononga a Ngāi Māori me te Karauna Māori Crown Relationship
-
Section 04
Te Whakamarumarutanga Security
-
Section 05
Te Taiao Environment
-
Section 06
Te Kanorautanga me te Whakaurutanga Diversity and Inclusion
-
Section 07
Te Ngākau Pono, ngā Matatika me ngā Taumata Integrity Ethics and Standards
-
Section 08
Ngā Ture me ngā Pūnaha Pakihi Business Rules and Systems
-
Section 09
Ngā Whakaritenga Kāwanatanga Government Settings
-
Section 10
Te Takohanga me te Pūrongorongo Accountability and reporting
Protective Security Requirements (PSR)
System lead: New Zealand Security Intelligence Service (NZSIS)
New Zealand Government Protective Security Requirements (PSR) outlines the Government’s expectations for managing personnel, information and physical security
Published guidance:
- Raising security awareness of potential threats to your organisation
- Consider your security governance
- Consider how your personnel may pose security risks
- Understand how to manage your information security
- Physical security to protect your people, information and assets
Department of the Prime Minister and Cabinet - Defining National Security
Contact for further advice: psr@protectivesecurity.govt.nz
Requirements and expectations
Crown Agents |
Autonomous Crown Entities |
Independent Crown Entities |
Legal requirements: No legal requirements for Crown agents to adopt the PSR, however it is encouraged as good practice Entity-specific requirements may be contained in a Crown entity’s establishment legislation |
Legal requirements: No legal requirements for ACEs to adopt the PSR, however it is encouraged as good practice Entity-specific requirements may be contained in a Crown entity’s establishment legislation |
Legal requirements: No legal requirements for ICEs to adopt the PSR, however it is encouraged as good practice Entity-specific requirements may be contained in a Crown entity’s establishment legislation |
National Cyber Security Centre (NCSC) - GCSB
System lead: Government Chief Information Security Officer (GCISO). The GCISO role is supported by the National Cyber Security Centre (NCSC)
The National Cyber Security Centre (NCSC) is part of the Government Communications Security Bureau.
- Its activities are mandated by the Intelligence and Security Act 2017
- NCSC and GCSB functions form part of the 2019 NZ Cyber Security Strategy
Published guidance:
- NZISM - ISM Document (gcsb.govt.nz) - is intended for use by Crown entities and provides both a risk management framework, and a set of essential or baseline controls and additional good and recommended practice
- Supply Chain Cyber Security: In Safe Hands
- Incident Management: Be Resilient, Be Prepared
- Charting Your Course: Cyber Security Governance
- Use of approved secure destruction facilities
Services
The NCSC provides cyber security services to all New Zealanders - from individuals to small and medium businesses and organisations, large enterprises, government, and nationally significant organisations.
The NCSC also develops services to strengthen New Zealand’s cyber defence capabilities, such as;
- Malware Free Networks (MFN), is a threat detection and disruption service which provides near real-time threat intelligence reflecting current malicious activity targeting NZ organisations.
- Advanced cyber threat detection and disruption (CORTEX) capabilities and services to organisations of national significance
Contact for further advice:
The NCSC responds 24/7 to cyber security incidents of potential national significance. You can report an incident using the contact information and form on the NCSC website:
Requirements and expectations
Crown Agents |
Autonomous Crown Entities |
Independent Crown Entities |
Legal requirements: No legal requirements for Crown agents to implement NCSC standards; however, it is strongly encouraged as good practice Entity-specific requirements may be contained in a Crown entity’s establishment legislation Ministerial expectations: Crown agents sit outside the scope of agencies of the GCISO’s mandated standards (i.e. the NZ Information Security Manual (NZISM) and assurance activities (i.e. reporting against the Protective Security Requirements (PSR) policy framework). |
Legal requirements: No legal requirements for ACEs to implement NCSC standards; however, it is strongly encouraged as good practice Entity-specific requirements may be contained in a Crown entity’s establishment legislation |
Legal requirements: No legal requirements for ICEs to implement NCSC standards; however, it is strongly encouraged as good practice Entity-specific requirements may be contained in a Crown entity’s establishment legislation |