New Zealand NZISM 3.6 — New Zealand Information Security Manual

SmartSuite provides the system for managing controls, evidence, mappings, assessments, and reporting. Framework text may require a separate license unless explicitly provided.
Overview
New Zealand Information Security Manual (NZISM) 3.6 is a national cybersecurity framework that helps organizations safeguard government information and manage security risks across digital systems. The framework establishes comprehensive guidelines for implementing effective security controls and aligning information security practices with New Zealand government requirements.
Published by the New Zealand Government Communications Security Bureau (GCSB), NZISM is primarily used by government agencies, contractors, and organizations working with sensitive public sector data. It covers key areas including cybersecurity controls, risk management, data protection, incident response, and compliance with national security policies.
Organizations implement NZISM by integrating its controls into their risk assessments, internal security policies, and operational procedures. It supports regulatory compliance, enhances information assurance, and aligns with international frameworks such as ISO 27001 and NIST, enabling organizations to build robust security and risk management programs.
Why it Matters
NZISM provides a structured approach to safeguarding information and managing security risks across New Zealand government digital systems.
Key benefits include:
- Strengthen information security governance
Support consistent accountability and oversight for information security practices within governmental and contractor environments.
- Enhance national compliance alignment
Ensure information security polices comply with New Zealand government standards and relevant national regulatory requirements.
- Improve risk management effectiveness
Enable organizations to systematically identify, assess, and mitigate cybersecurity risks associated with sensitive government data.
- Support incident detection and response
Strengthen preparedness for security incidents through clearly defined processes for identifying and responding to security events.
- Protect sensitive government information
Safeguard public sector data confidentiality, integrity, and availability from evolving cyber threats and unauthorized access.
How it Works
The New Zealand Information Security Manual (NZISM) structures its guidance through detailed control catalogs organized into security domains such as governance, personnel security, physical security, and information and communications technology (ICT) security. Each domain comprises specific security controls, regulatory requirements, and risk management processes tailored for New Zealand government agencies and entities handling official information. NZISM also references maturity models and lifecycle processes to help agencies assess and enhance their information security posture over time.
Organizations incorporate NZISM requirements by implementing prescribed security controls, routinely conducting risk assessments, and mapping these controls to their existing security governance frameworks. They regularly monitor compliance, address gaps through remediation activities, and assess their cyber resilience in business operations. NZISM supports regulatory compliance by guiding organizations in developing security policies, managing vulnerabilities, responding to incidents, and continuously improving their security practices.
Through SmartSuite, organizations can operationalize NZISM by leveraging integrated control libraries aligned to NZISM domains, maintaining comprehensive risk registers, and managing policy governance. The platform enables evidence collection, compliance tracking, and oversight through audit readiness modules and remediation workflows. Reporting dashboards facilitate ongoing monitoring of security and compliance status, supporting transparent governance and efficient regulatory management.
Key Elements
- Security Control Families
Groups mandatory information security controls into thematic areas such as access management, cryptography, and network security.
- Governance and Accountability Structure
Establishes organizational responsibilities, reporting lines, and oversight mechanisms for managing information security.
- Risk Assessment and Treatment Processes
Describes systematic evaluation of information security risks and determination of risk treatment options.
- Incident Response Framework
Outlines coordination, reporting, and handling processes for cybersecurity incidents affecting government information systems.
- Compliance and Monitoring Requirements
Specifies expectations for ongoing compliance checks, independent reviews, and security control effectiveness measurement.
- Information Classification and Handling
Defines procedures for categorizing, marking, and protecting sensitive government data throughout its lifecycle.
Framework Scope
New Zealand Information Security Manual (NZISM) 3.6 is commonly used by government agencies, contractors, and entities handling sensitive public sector information. The framework governs digital information systems, communications networks, and data environments, typically implemented for regulatory compliance, risk management initiatives, and supporting assurance programs across public sector operations.
Framework Objectives
NZISM 3.6 defines comprehensive objectives to safeguard government information and support robust cybersecurity and governance practices.
Strengthen cybersecurity risk management across government and critical information systems
Enhance governance and oversight of security controls and data protection measures
Support regulatory compliance with New Zealand government security requirements
Promote improved operational resilience to mitigate and respond to cyber threats
Ensure consistent data protection for sensitive and classified government information
Demonstrate audit readiness and effective security posture through documented controls
Framework in Context
NZISM 3.6 provides New Zealand government cybersecurity guidance and maps to international standards such as ASD ISM, NIST SP 800-53, and ISO/IEC 27001. Organizations use NZISM for meeting public-sector regulatory requirements, supplier assurance, and strengthening security governance and operational controls, often aligning with these frameworks for audits.
Common Framework Mappings
Organizations map NZISM to internationally recognized security and privacy frameworks to harmonize controls, simplify audits, facilitate regulatory compliance, and enable cross-jurisdictional assurance and supplier risk management.
Mapped frameworks include:
Australian Information Security Manual (ASD ISM)
CIS Critical Security Controls
ISO/IEC 27001
ISO/IEC 27002
ISO/IEC 27017
ISO/IEC 27701
NIST Cybersecurity Framework
NIST Special Publication 800-53
- ClassificationCategoryCybersecurityDomainCybersecurityFramework FamilyOther
- Regulatory ContextTypeFrameworkLegal InstrumentStandardSectorGovernment SectorIndustryGovernment & Public Sector
- Region / PublisherRegionAustralia & New ZealandRegion DetailNew ZealandPublisherNational Cyber Security Centre (NCSC)
- VersioningVersionNZISM Version 3.6Effective Date2023Issue Date2023
- AdoptionAdoption ModelRegulatory ComplianceImplementation ComplexityHigh
- Official ReferenceOpen Link in New TabSource
License included / downloadable: Yes
The NZISM is publicly available through the New Zealand National Cyber Security Centre.
How SmartSuite Supports NZISM 3.6
Manage New Zealand Information Security Manual (NZISM 3.6) requirements by organizing government security controls, tracking system compliance, and maintaining evidence supporting protection of sensitive information systems.
Government Security Control Framework
Structure NZISM controls with ownership, scope, and implementation tracking across systems.
System Classification and Security Baselines
Classify systems and apply appropriate baseline security controls based on sensitivity.
Authentication and Access Governance
Manage authentication, authorization, and user access aligned to NZISM requirements.
Network Security and System Hardening
Track secure configurations, network protections, and system hardening practices.
System Activity Monitoring and Incident Response
Monitor system activity and manage incident response workflows and escalation processes.
NZISM Compliance and Government Reporting
Provide dashboards showing control coverage, system compliance status, and NZISM readiness.
Related frameworks

The Australia Information Security Manual provides mandated cybersecurity controls and guidance to protect Australian government systems and data.

CIS Controls v8.1 provides prioritized, practical security actions to help organizations mitigate common cyber threats and strengthen defenses.

ISO/IEC 27001:2022 is an international ISMS standard that helps organizations manage information security risks and protect data.

ISO/IEC 27002:2022 provides best-practice information security controls to help organizations select, implement, and manage protections for information assets.

ISO/IEC 27017 provides cloud-specific security controls to help organizations protect data and manage cloud-related risks.

ISO/IEC 27701 extends ISO/IEC 27001 to help organizations manage privacy and protect personally identifiable information.
Frequently Asked Questions For New Zealand NZISM 3.6 (New Zealand Information Security Manual)
NZISM is used to provide comprehensive information security requirements and guidance for New Zealand government agencies and related organizations. It sets standards for managing security risks, implementing cybersecurity controls, and safeguarding sensitive government data across digital systems.
NZISM compliance is mandatory for New Zealand government agencies and organizations handling sensitive government information. Compliance is enforced through government policy and oversight by the Government Communications Security Bureau (GCSB).
NZISM applies to all New Zealand government departments, agencies, and any contractors or third parties managing official or classified government information. Its scope includes the protection of information, systems, infrastructure, and supporting services that process or store government data.
NZISM specifies security controls such as access management, network security, data protection, incident response, secure configuration, and monitoring. Organizations are required to assess and implement controls appropriate to the classification and sensitivity of their information assets.
Organizations should integrate NZISM requirements into their risk management processes, security policies, and operational procedures. This typically involves conducting risk assessments, performing security control gap analyses, and regularly reviewing operational practices for alignment with NZISM controls.
NZISM aligns with international standards such as ISO 27001 and NIST, providing a national context tailored for New Zealand government needs. It often references or complements controls from these frameworks, allowing organizations to leverage existing best practices when achieving NZISM compliance.
Ongoing compliance with NZISM requires continuous risk assessments, regular reviews of security controls, incident reporting, and maintaining records of compliance activities. Agencies are subject to periodic internal and external audits to validate adherence to NZISM standards.
SmartSuite can help organizations operationalize NZISM by centralizing management of cybersecurity policies, tracking risk assessments, and documenting control implementation. It enables efficient collection of compliance evidence, facilitates audit readiness through automated reporting, and helps security teams monitor and maintain NZISM requirements across the organization.
Manage controls, risks, evidence, and audits in one platform designed for modern governance, risk, and compliance.

