It is important to use algorithms that adequately protect sensitive information and the NZISM prescribes approved algorithms and protocols. Each algorithm is carefully assessed for longevity, resistance to attack, ease of use and consumption of resource.
Agencies need to follow a security process when decommissioning and disposing of IT equipment and media that has been used for official, sensitive or security classified information. This process is outlined in the document Approved Secure Destruction Facilities - Guidance to Agencies.
The status of "approved facility" for the destruction of media and equipment may be granted by the Director-General GCSB under the NZISM. Approval depends upon the Director-General's satisfaction that the proposed facilities are capable of securely destroying IT equipment, devices and media to the standard required under the NZISM and related policies.
The process of obtaining approval is outlined in the document Approval of Secure Destruction Facilities - Information for Service Providers [PDF, 284.56 KB]
Top Four Mitigation Strategies to Protect Your IT System [PDF, 379.72 KB] Top Four In A Linux Environment [PDF, 290.09 KB] Restricting Administrative Privileges Explained [PDF, 269.00 KB] Application Whitelisting Explained [PDF, 207.28 KB] Assessing Security Vulnerabliities and Patches [PDF, 639.80 KB] Bring Your Own Device (BYOD) [PDF, 212.72 KB] Classified Document Handling [PDF, 280.89 KB] Malicious Email Strategies [PDF, 1.07 MB] Traffic Light Protocol [PDF, 353.94 KB]