A security incident is an event caused by an individual or group that has or could have resulted in loss or harm to an organisation’s assets, information or people, or an action that breaches the organisation’s security procedures.
This may include:
- an attack or attempted attack against a computer or network
- an attempt or approach from anybody seeking unauthorised access to organisational resources, or
- any other occurrence that results, or may result, in negative consequences for the security of the organisation, New Zealand government, its institutions, or programmes.
Incident management is the process of identifying, recording, analysing, reporting, investigating, acting upon, and learning from incidents. Security investigations establish the cause and extent of an incident that has, or could have, compromised your organisation or the New Zealand Government. The process of investigating and reporting security incidents also helps an organisation understand its vulnerabilities and reduce the risk of future incidents.
An organisation must ensure that it can identify, report, respond to, investigate and recover from security incidents.
GOV 6 includes the following requirements:
GOV 6.1 Establish an effective approach to managing security incidents
Ensure that your organisation has a robust and proactive approach to managing security incidents that the personnel understand and follow. Cyber incidents are only a matter of when, not if. A robust and effective approach will help ensure that the organisation is resilient and prepared.
- Follow a structured approach for security incident management
- Establish policies and procedures for managing security incidents
- Prepare and test your incident response readiness
GOV 6.2 Ensure that security incidents are detected and raised
Ensure that your personnel understand their responsibilities, can detect that an incident has happened, and raises it to the appropriate team for assessment and investigation as quickly as possible.
- Require personnel to raise security incidents and make it easy for them to do so
- Establish mechanisms to quickly detect and respond to security incidents
GOV 6.3 Record and assess security incidents
Recording and tracking security incidents gives valuable insights into an organisation’s security environment and performance. For instance, repeated minor security incidents could be a symptom of poor personnel awareness and a need for more security awareness training.
- Implement methods for recording and assessing the impact of security incidents
GOV 6.4 Report security incidents to relevant agencies
Ensure that your security incident team understand their responsibilities for reporting security incidents to other relevant agencies and build these into your security incident management processes.
- Report certain security incidents to other agencies
- Report security incidents involving holders of national security clearances
- Report cyber security incidents to the National Cyber Security Centre
- Report security incidents involving Cabinet material to the Cabinet Office
- Report criminal incidents to law enforcement bodies
- Include these details when you report major security incidents
GOV 6.5 Investigate, respond to, and manage security incidents
Security incidents can result in security investigations, disciplinary action, and/or criminal investigation. While investigations are underway, interim measures may be necessary to protect people, information, or assets at risk.
- Investigate security incidents
- Take interim measures while investigations are underway
- When appropriate, involve others in security investigations
GOV 6.6 Learn from security incidents
Corrective action must be taken in response to relevant security incidents but also organisations should consider use of other monitoring and analysis practices to learn and reduce the likelihood of future incidents (such as root cause analysis, and post security incident reviews).
- Monitor and measures incident management effectiveness
- Conduct post-incident reviews when appropriate
- Research incident management practice practices and security trends.
Refer to the PSR Policy Framework documents for details on the required and recommended measures to comply with the GOV 6 mandatory requirement.
Guidance and resources