Last updated March 2024.
The table below sets out the minimum security standards (standards) that the Christchurch City Council (Council, we, our or us) requires from you.
We may change these standards by posting an updated version on our website. Changes will not apply retrospectively. We will generally try to give you at least 30 days notice of any material changes. You agree to check our website from time to time to ensure that you are complying with the most current version of these standards.
These standards form part of the agreement we have with you for the provision of goods and/or services (agreement) and will be read together with that agreement.
You warrant that you:
In the event of any inconsistency between these standards and any other general warranty or contractual commitment you have agreed with us, including as set out in the agreement, the more stringent or higher standard will apply (unless we have expressly agreed otherwise).
Any breach of these standards will constitute a breach of our agreement and you may be liable to us for damages and other available contractual remedies.
If the following applies to you, then you do not need to meet these standards:
Control (Process) | Minimum standard |
Governance and information security management system (ISMS) | You will have an Information Security Policy that:
|
Information security management system – scope | You understand the scope of the service you provide, including:
|
Information security management system – management information and reporting | You will document your ISMS compliance management and assessment process, showing your:
|
Information security management system – documentation | Your ISMS policy will be:
|
Information security management system – training (standard) |
|
Risk – threats | You will keep your outsider threat knowledge up-to-date, for example by attending forums and dispersing within your organisation current knowledge and best practices around threat protection. |
Asset management – policy |
|
Asset management – register | Your asset register will:
|
Investigation authorisation | You will have a documented policy for procedures that establishes management responsibilities for a quick, effective, and orderly response to incidents including:
|
Joiners movers leavers (JML) – policy |
|
Application – ownership |
|
Application – privilege access | In addition to standard user access controls, controls on privilege (including administrator) access will include the following controls:
|
Application – incident management | Any unauthorised information disclosure will:
|
Protection of authentication information | You will have a documented and adhered to password policy/processes including:
|
Secure system access authentication |
|
Logical identity configuration |
|
Unique identification – exceptions | All known exceptions, e.g. applications that do not support unique identification or administrator/master accounts will:
|
Ownership of accounts and groups | Logs and records will be maintained in order to:
|
Monitoring user access | Standards will enforce:
|
Removal of access – policy | You will have documented standards in place that explicitly define the timeframe for the revocation of user accounts to systems, e.g. application/database/operating system/building, involving our information and include:
|
Removal of access – controls | Access will be removed:
|
Removal of access – logs | You will maintain logs to evidence adherence to the procedure, including:
|
Remote and administrative access – policy | You have a policy or procedure ensuring that all remote access will:
|
Remote and administrative access – controls | Your technical controls will support your remote access policy or procedure, including:
|
Remote and administrative access – management access/consoles | Support/management access will be provided securely. This means, without limitation, that:
|
Logging and monitoring – policy |
|
Logging and monitoring – configuration | Events recorded/logged will include at least:
|
Logging and monitoring – storage and security | Logs will:
|
Logging and monitoring – review and reporting |
|
System time | You will have a documented approach to maintaining clock synchronisation across all systems, which must include:
|
Data classification – policy | You will have a policy with supported procedures for how you:
|
Data loss protection (DLP) – data at rest (confidential) | You will protect our confidential data at rest through at least the following:
|
Data loss protection – data at rest (highly confidential) |
|
Data loss protection – data at rest | All environments will be considered including non-production and backups. |
Data loss protection – hard copy |
|
Data leakage – local drives |
|
Data leakage – exfiltration | Where our confidential or highly confidential data is stored or processed in a production environment, you will maintain controls that minimise the risk that users with privileged or administrative access to that production environment exfiltrate that data into other environments, such as your wider corporate IT environment or any non-production environment. |
Data leakage – internet content filtering tools |
|
Data leakage – email content filtering tools |
|
Data loss protection – highly confidential enhanced controls |
|
Data leakage – USB and optical media ports |
|
Business area decommissioning and disposal monitoring | You will have a documented policy, and supported process, for the secure destruction of equipment, which includes:
|
Asset management – destruction | Where media is securely disposed of:
|
Technology provider approval of disposal procedures | Data will be securely erased or wiped, using industry-approved methods before any equipment is recycled or reused. |
Monitoring of media and equipment transportation | You will have a documented procedure that includes:
|
Data loss protection – hardware in transit | Data will be encrypted whilst in transit and in line with data classification. |
Data loss protection – hardware in transit | Hardware transfers will be logged, including:
|
Data leakage – mobile bring your own device (BYOD) |
|
Data loss protection – incident management | For regular data transfers (including to cloud-based systems), you will record:
|
Data transfer agreements |
|
Protection of cryptographic keys monitoring | You will have a documented policy, supported by the process, for cryptography/encryption that includes:
|
Network diagrams | Network diagrams will be:
|
Network connections – external connections | To prevent data security breaches, external connections to our network will:
|
Network connections – rulesets | Rulesets and configurations for firewalls and other security-enforcing network devices will be verified and approved (i.e. documented change request) and reviewed and updated regularly (at least 6 months). |
Wireless connectivity | Any wireless access to networks within the scope of the assessment will be secure by design and in operation, including:
|
Wireless separation | Wireless networking that is not intended to permit access to in-scope networks will have robust separation (physical or virtual) from the in-scope networks. |
Network security events and alerts | Security-related network events from all relevant sources (including Firewalls, IPS/IDS, WAFs, Remote Access Gateways, MDMs, etc.) will be captured and subject to logging, monitoring, and alerting. |
System configuration – builds | All infrastructure (including network devices, servers, and end-user devices) will be built, hardened, and maintained according to a documented standard, which is informed by vendor/industry good practice to include:
|
System configuration – monitoring | All infrastructure endpoints (including servers and end-user devices) will be monitored to ensure ongoing compliance to build and hardening standards, including:
|
Intrusion detection/prevention – tools | Intrusion detection or prevention tools will be in place at all appropriate locations on your network. This is to analyse all inbound network traffic to identify and stop (or alert on) any possible incidents, imminent threats or violations, including any arising from unauthorised network connections. |
Connection authentication | Your internal network will be protected against the connection of rogue/unauthorised devices. |
Distributed denial of service (DDoS) – contract | You will have a DDoS service contract/specification, including any supporting documentation, for the systems or environments you will use when providing services to us. This is particularly important where those systems or environments are internet accessible or provide communications critical in the service you provide to us. |
Distributed denial of service (DDoS) – solution | In addition to the requirement directly above, the DDoS solution you have will provide:
|
Distributed denial of service (DDoS) – incidents | DDoS alerts are security events and you will manage these accordingly, i.e. monitored, analysed, raised as an incident and subject to an appropriate response (including DDoS mitigation service invocation, where necessary). |
Vulnerabilities – automated scanning | You will have a documented policy, supported by a process, for proactively identifying and managing vulnerabilities in your systems and environments. This includes:
|
Service and application security testing monitoring | You will have a documented penetration test policy, with a supported process, requiring that:
|
Vulnerabilities – scope | Penetration tests are designed and scoped by competent persons who will have been provided with sufficient information about the system(s)/environment(s) to ensure that applicable types of vulnerabilities are tested for and that any technical limitations to the testing are understood. |
Vulnerabilities – recording and management |
|
Vulnerability and patch management monitoring | Patches will be implemented across the network in accordance with documented procedures, and include:
|
Patch management | Patching compliance will be monitored, reported, and reviewed including:
|
Change management | You will have an established change management process that ensures:
|
Malware monitoring | You will have a documented policy and procedure in place for malware protection that includes a requirement that:
|
Anti-malware | Technical solutions will be implemented, maintained, and monitored as per malware policy/procedures, and all malware detection events are be investigated as potential incidents. |
Software development life cycle (SDLC) – policy | You will have a documented software development life cycle, demonstrating methodology that includes:
|
Software development life cycle – implementation | You will have secure SDLC measures in place that:
|
Software development life cycle – training | Your developers will be trained on 'secure by design' approaches that include OWASP and secure software development lifecycle. |
Segregation of production and non-production environments |
|
Quality assurance – standards |
|
Quality assurance – review | All source code:
|
PCI DSS compliance |
If you:
Then you must be PCI-DSS compliant to at least level 2. You will show us, at any time upon our request, necessary evidence to verify your compliance with PCI-DSS, including your most recent attestation of compliance with the Payment Card Industry Security Standards Council. |
Cloud computing policy and approval | You will have a documented cloud computing policy that:
|
Cloud computing policy content | Your cloud computing policy will contain at least the following:
|
Cloud computing service and deployment framework | You will have an established cloud computing (including cloud security) service and deployment approach (framework) that addresses at least the following:
|
Cloud computing service and deployment framework | You will engage your use of cloud service in accordance with your established cloud computing (including cloud security) service and deployment approach (framework). |
Cloud user training and awareness | For providers of cloud services where we are a tenant, you will have a formal, role-based security awareness training program for cloud-related access and data management issues for all persons with access to tenant data. |
Physical security – policy | You will have a documented security policy, with supported processes, that:
|
Physical security – training | You will regularly (at least yearly) train all employees and contractors on security awareness and their respective responsibilities. |
Physical security – review | You will perform an annual review of your security standards and compliance on all your premises where our information is stored. |
Physical security – access | You will annually review who has physical access to your building. For sensitive or restricted areas of your building, you will review this at least quarterly. |
Physical security – controls (access control) |
|
Physical security – controls (access logs) | You will retain all access logs for at least 12 months. |
Physical security – controls (visitors) | You will have a visitor process in place where all visitors are booked in and out of the facility, allocated a visitor pass, and supervised at all times. |
Physical security – controls (CCTV) |
|
Physical security – controls (intrusion detection) |
|
Physical security – controls (electronic security) | You will have electronic perimeter access controls at every access/egress point to your building that run 24/7 and secure all exit doors. |
Physical security – controls (maintenance) | You will maintain all electronic security systems through a certified authority. |
Physical security – incidents | You will investigate all breaches of your security defences, follow your incident management procedures and report all relevant breaches to us without delay. |