Securitec specialises in providing experienced practitioners to discover and define the specific security requirements of your organisation. Our experts form an integral part of strategic business re-engineering, transitioning your organisation from an uncertain ‘as is’ situation to a resilient future state by identifying underserved vulnerabilities and mapping them against the New Zealand Information Security Manual (NZISM). We leverage industry-specific methodologies to bridge the gap between technical teams and stakeholders, ensuring that risk identification is a fundamental component of the project lifecycle.
1. Responsibility and Accountability Mapping
Securitec identifies the operational responsibilities for implementing and managing security controls, distinguishing between the duties of the provider and the internal requirements of the consuming agency. Our practitioners explicitly document these duties to ensure that while operational tasks are outsourced, the Agency Head remains ultimately accountable for the information security of the organisation and the formal acceptance of residual risks.
We analyse the Shared Responsibility Model to ensure that no security gaps exist at the trust boundaries between the provider’s infrastructure and your agency’s environment. By working with technology groups to profile the business need, we ensure that risk identification extends to every system owner and risk owner involved in the project.
2. Security Risk Audit and Consuming Agency Impact
Our practice provides the resources necessary to facilitate a comprehensive understanding of jurisdictional and sovereignty risks. We identify exactly where data will be stored geographically, highlighting critical risks if information is subject to foreign access laws that could conflict with New Zealand's legal framework.
Securitec performs deep-dive audits into workload isolation to ensure the virtualised environment guarantees adequate tenant separation on shared infrastructure. We assess whether compute processes in one container are visible to another tenant and mandate technical protections to isolate these environments.
Furthermore, we identify supply chain risks by establishing the provenance of all products and equipment. This includes recording the origin, history, and supply path of technology to ensure continuity of supply and the protection of sensitive information.
3. Risk Mitigation and Transfer Strategies
Securitec ensures your organisation maintains robust audit and assurance rights by suggesting contractual language that mandates the provision of independent reports. We look for third-party validations, such as SOC 2 Type 2 or ISAE 3402, to provide assurance over the operational effectiveness of a provider's internal control structures.
We identify and define the provider's obligation to notify the agency of security incidents within a specified, consultation-led window. Our strategies ensure that contracts enable the sharing of incident information with the National Cyber Security Centre (NCSC) and require providers to consult with the agency during a "Critical" or "Serious" event.
Additionally, we list areas where security-related financial penalties should be applied for failures in availability or integrity. We hold the final solution to account against the specific scope and requirements of the project to ensure business continuity.
4. Recommended Safeguards and Contractual Changes
Our team works to ensure that all clauses explicitly state that the consuming organisation retains ownership of all customer information, intellectual property, and related information assets. We safeguard the agency from the unintended ownership of security risks caused by poorly documented vendor arrangements.
Securitec recommends robust exit strategies and decommissioning plans to ensure that upon contract termination, all agency data is safely retrieved or independently verified as being purged and erased. Any data-delete process must be independently verifiable to prevent data remanence in a cloud environment.
Finally, we mandate that providers must apply the latest baseline security controls specified in the NZISM. Because the threat environment is dynamic, we ensure your configurations are updated to reflect current risks, reversing any dispensations if the security risk is no longer at an acceptable level.
Copyright © 2021 Securitec Consulting - All Rights Reserved.
We use cookies to analyse website traffic and optimize your website experience.