Physical security
Questions 71 and 72 — see if physical security controls are in place to protect your information.
Questions 71 and 72 — physical security
Table 1 lists who is responsible for answering each question.
Context and help for questions 71 and 72
Record your answers to these questions in either:
- the Excel version — risk assessment tool for public cloud services
- your organisation’s document for recording risk assessments.
Questions to answer
- Can the service provider’s physical security controls be directly reviewed or assessed by the government organisation?
- If yes — it needs to be practical to do so, such as the data centre being located in New Zealand
- If no — will the service provider allow the government organisation to review a recent third-party audit report that includes an assessment of their physical security controls?
- Do the service provider’s physical security controls meet the minimum requirements as defined in the NZ government’s security guidelines to protect the information stored in the public cloud service?
Entity | Questions to answer |
---|---|
Government organisation | 72 |
Service provider | 71, 71a |
Where to find the service provider’s answers
You can get the answers to the service provider’s questions from a combination of:
- direct communication with the provider
- the provider’s policies and audit reports on their website
- previous assessments by other government organisations.
If you do not have the service provider’s answers
If you need higher assurance for the information, consider a different public cloud service if:
- the provider does not give you their answers or other information you need for your risk assessment
- you cannot get acceptable third-party assurance
- there are no ways to lessen the risk of this incomplete information.
Independent assurance reports — NZISM
Context and help for questions 71 and 72
The following guidance gives you context and help for answering questions about physical security.
What physical security protects against
Physical security controls are needed to make sure that information is protected from unauthorised access by any malicious service provider:
- personnel
- third parties.
Information security and physical controls
Information security depends on how well physical controls work to protect the service provider’s:
- offices
- datacentres
- physical assets.
NZ requirements for physical security
Physical security controls must be in place to adequately protect the information of the NZ government and New Zealanders.
Depending on your information’s classification, see which security controls you need in place.
When to use third-party audit reports
It’s not always possible or practical to directly assess the physical controls of a service provider. To see if the provider is adequately protecting its customers’ data, you should review recent third-party audit reports that include assessments of their physical security controls.
You should not use a public cloud service if:
- third-party audit reports from credible sources are not available
- the provider does not let you review the reports.
Utility links and page information
Last updated