On this page
- Due diligence assessments for espionage and foreign interference threats [PDF, 2.9 MB]
- Espionage and foreign interference threats for elected representatives [PDF, 2.7 MB]
- Managing inward visits – protective security guidance [PDF, 2.7 MB]
- Protective Security Threat and Risk Guidance [PDF, 3.2 MB]
- Travelling overseas on business – pocket guide [PDF, 320 KB]
- Travelling overseas on business – Protective security guidance for New Zealand travellers [PDF, 1.1 MB]
- Trusted Business – Protective security guidance for the New Zealand business sector [PDF, 2.9 MB]
- Trusted research – guidance for institutions and researchers [PDF, 4 MB]
GOV 1
Establish and maintain the right governance
GOV 2
Take a risk-based approach
GOV 3
Prepare for business continuity
GOV 4
Build security awareness
GOV 5
Manage risks when working with others
GOV 6
Manage security incidents
GOV 7
Be able to respond to increased threat levels
GOV 8
Assess your capability
PERSEC 1
Recruit the right person
PERSEC 2
Ensure their ongoing suitability
PERSEC 3
Manage their departure
PERSEC 4
Manage national security clearances
- Annual Security Appraisal Form (ASAF) – Clearance holder [DOCX, 202 KB]
- Annual Security Appraisal Form (ASAF) – Clearance holder [PDF, 689 KB]
- Annual Security Appraisal Form (ASAF) – Line managers [DOCX, 197 KB]
- Annual Security Appraisal Form (ASAF) – Line managers [PDF, 1.1 MB]
- Annual Security Appraisal Form (ASAF) risk assessment [DOCX, 183 KB]
- Annual Security Appraisal Form (ASAF) risk assessment [PDF, 599 KB]
- Assessing and acting on changes in circumstances (infographic) [PDF, 141 KB]
- Change of circumstance form [PDF, 275 KB]
- Contact reporting form [PDF, 202 KB]
- Guide to managing national security clearance holders [PDF, 683 KB]
INFOSEC 1
Understand what you need to protect
INFOSEC 2
Design your security measures
- Change toolkit - How to adopt the classification system [PDF, 564 KB]
- Classification examples for government agencies [PDF, 144 KB]
- Classification flowchart [PDF, 76 KB]
- Classification policy - template [DOCX, 51 KB]
- Classification system overview - table [PDF, 103 KB]
- Classification system policy 2022 [PDF, 86 KB]
- Classification tool [PDF, 110 KB]
- Classification training module - template [PPTX, 6.7 MB]
- Declassification guidance [PDF, 229 KB]
- Declassification policy - template [DOCX, 35 KB]
- Information sharing guidance [PDF, 231 KB]
Classification system training modules
-
Module 1: Introduction to classification
-
Module 2: How to classify information
-
Module 3: How to protect information
INFOSEC 3
Validate your security measures
INFOSEC 4
Keep your security up to date
- PHYSEC lifecycle graphic [PDF, 60 KB]
- Physical security measures checklist [DOCX, 37 KB]
- Safe and vault types [DOCX, 22 KB]
- Selecting safes or vaults for protecting valuable physical assets [PDF, 39 KB]
- Selecting security containers or rooms for storing official information [PDF, 99 KB]
- Storage requirements for electronic information in ICT facilities [PDF, 73 KB]