Information security
This framework highlights the connection between strong information security and effective records management. Collaboration and compliance help NSW public offices protect their information assets against growing digital threats.
In today’s interconnected workplaces, information faces many risks and threats. Like other business assets, records and data need protection.
The Standard on records management and AS/ISO 15489.1:2017 require public offices to:
- identify and manage high-risk and high-value records, information, data and systems
- design management processes to protect information with long-term value
- prevent unauthorised access, misuse, alteration, loss, or destruction of records, information and data
- ensure records, information and data are authentic, reliable, and usable
- systematically and accountably destroy records when appropriate
- regularly monitor and review records and information management practices to meet information security standards.
Similarly, public offices must also comply with their own information security requirements, as outlined in:
- internal information or cyber security policies
- NSW Cyber Security Policy and Strategy
- NSW Government Information Classification, Labelling and Handling Guidelines
- AS ISO/IEC 27001: 2015, Information technology - Security techniques - Information security management systems - Requirements
- AS ISO/IEC 27002: 2015, Information technology - Security techniques - Code of practice for information security controls
State Records NSW encourages collaboration between records managers and information security specialists.
Together, they can determine requirements, design secure systems, manage metadata, storage and disposal, and monitor information security effectively.
What is information security?
Information security is the preservation of the confidentiality, integrity and availability of information.
Confidentiality involves ensuring that information is accessible only to those authorised to have access. Integrity involves safeguarding the accuracy, completeness and authenticity of information and processing methods. Availability involves ensuring that authorised users have access to information and associated assets when required.
Information is one of your organisation's most valuable assets: it needs to be protected. Security threats and breaches can affect your organisation’s ability to protect personal safety or privacy, to safeguard infrastructure or to comply with its legal and other obligations.
Breaches of security can have significant impacts on business, including damage to its reputation and competitive edge. The Mandatory Notification of Data Breach (MNDB) Scheme (MNDB Scheme) impacts the responsibilities of agencies under the Privacy and Personal Information Protection Act 1998 (PPIP Act). It requires agencies to notify the Privacy Commissioner and provide notifications to affected individuals in the event of an eligible data breach of their personal or health information by a NSW public sector agency or state-owned corporation subject to the PPIP Act.
What is the difference between information security and cyber security?
Information security applies to all forms of information (digital, paper-based or other) and includes the management of the software and/or communications technology systems and networks used for storing, processing, communicating and disposal of information.
In essence, managing information security involves protecting your information assets by implementing controls including policies, procedures, organisational structures, infrastructure and software and hardware functions. It also involves regularly reviewing these.
Cyber security covers the controls organisations must put in place to protect information stored in networks, systems and cloud storage against unauthorised access and attacks. It includes responding to evolving threats such as viruses/malware, hacktivism or phishing attempts. See Cyber Security Awareness Resources | Digital NSW for more information on cybersecurity for NSW public offices.
Determining information security requirements
When determining recordkeeping requirements, it’s important to also address access and security. This helps organisations to:
- identify and apply the right security controls
- reduce risks to an acceptable level.
By following the Standard on records management and the NSW Cyber Security Policy, organisations can ensure that:
- high-risk and high-value records, information, and data are identified and prioritised
- vital systems (the 'crown jewels') are managed and secured.
Your expertise will help the organisation’s information security teams in:
- developing a comprehensive information security policy
- designing and managing secure records and information systems
- implementing a range of security measures.
More information: Identifying and managing high-value and high-risk records, information and data
Recordkeeping standards
The Standard on records management establishes requirements relating to vital (that is, business critical), high risk and high value records and information (see minimum compliance requirements 2.2, 2.3 and 3.4).
Specifically, agencies must:
- identify vital records, information, data, and systems
- identify high risk and high value records, information, data, and systems
- identify level of protection needed based on sensitivity, confidentiality and value
- assign roles and responsibilities for the management of vital, high value and high-risk records and information
- put in place controls according to their classification and relevant laws and regulations.
The Standard on the physical storage of State records also establishes requirements relating to all records in physical formats, including security classified records or records which contain sensitive information (see minimum compliance requirements under Principle 6: Records are protected against theft, misuse, unauthorised access or modification).
Information collated regarding the above requirements can be used to meet some of the reporting requirements of the NSW Government Cyber Security Policy.
Local government councils are encouraged to follow the Office of Local Government’s Cyber Security Guidelines for NSW Local Government.
Agencies that hold or access Commonwealth security classified information (for example, protected, secret, top secret) need to put in place controls according to the Australian Government's Protective Security Policy Framework.
NSW Government Cyber Security Policy
The NSW Government Cyber Security Policy applies to all NSW Government departments and agencies. State-owned corporations, local councils and universities can adopt this policy. Local government councils are also encouraged to follow the Office of Local Government’s Cyber Security Guidelines for NSW Local Government.
The policy establishes mandatory requirements such as:
- identification of an agency’s most valuable or operationally vital systems or information
- implementation of regular cyber security education for employees, contractors and outsourced service providers
- implementation and maturity assessment against the Australian Cyber Security Centre (ACSC) ‘Essential 8’ strategies to mitigate cyber security incidents
- reporting cyber security incidents to the Government Chief Information Security Officer.
Australian Standard AS/NZS ISO/IEC 27002: 2015
This standard establishes guidelines and general principles for initiating, implementing, maintaining and improving information security management in an organisation. It contains best practice guidance concerning a number of areas of information security management.
Many organisations seek to or have achieved compliance with AS ISO/IEC 27002: 2015, Information technology - Security techniques - Code of practice for information security controls. Compliance to this standard is one of the mandatory requirements set by the NSW Government Cyber Security Policy.
Designing secure records and information systems
To protect records, information, and data, it’s important to include access and security needs in the design of your systems. This not only helps keep your data safe but also reduces information risks.
Key points to focus on when working with information security include:
- implementing the Essential Eight security measures
- ensuring cybersecurity requirements are included in procurement and system development
- maintaining records of system design, configuration, access control, and migration
- meeting retention and disposal requirements for records, information and data, and systems, before and during decommissioning
- reviewing audit trails and activity logs.
These security steps should also be part of your organisation's information security and business continuity plans.
Who is responsible for information security or cyber security?
Information security is not just an ‘IT problem'. Technical measures need to be designed to meet real business requirements and supported by appropriate training, business rules and assigned responsibilities.
Information security, by necessity, requires a number of stakeholders. The Australian Standard ??? recommends that a governance framework should be established to initiate and control the implementation of information security. See the mandatory requirements 'govern and identify' of the NSW Cyber Security Policy for more information.
This includes establishing management accountabilities, assigning roles, establishing necessary external liaisons and monitoring industry trends. A multi-disciplinary risk-based approach is encouraged.
Examples of accountabilities
Some of the positions with accountabilities for information security may include:
- Business managers who need to ensure security responsibilities are addressed at the recruitment stage and monitored during an individual’s employment, ensure staff are trained and updated in security policy and procedures and act on incidents affecting security
- Contract managers who need to deal with in-confidence material
- Corporate records managers who need to determine the application of security classifications/DLMs to records based on the business context of the record, establish security and access controls within records systems and monitor these systems
- Human resource management staff who need to manage personal information.
- ICT staff who need to establish security controls in systems and protect ICT equipment from threats.
- Risk management staff who need to identify and manage the organisation's risks
- Users of the information service who need to report observed or suspected weaknesses in security or threats to systems or services.
- Facilities staff who need to maintain the physical and environmental security of the building and particular secure areas.
Your organisation’s information security policy should outline the roles and responsibilities of different personnel.
Security measures for records, information and data
Classifying records, information and data
Information should be classified in relation to its:
- legal requirements
- value and criticality to the organisation
- sensitivity to unauthorised disclosure or modification.
More details on the classification of information can be found in AS ISO/IEC 27002:2015 Information technology – Security techniques – Code of practice for information security controls.
Your knowledge of this classification will assist information security teams in understanding the needs, priorities and expected degree of protection when handling the organisation’s records, information and data.
Sensitive or confidential information should be labelled and must:
- comply with the system outlined in the NSW Government Information Classification, Labelling and Handling Guidelines
- be supported by the development of business rules and handling procedures
- be accessible exclusively to people who meet clearance and suitability criteria.
Information security in third party agreements and cloud computing arrangements
Considering the rise of data breaches impacting NSW public offices and/or their service providers, it is critical that recordkeeping requirements and considerations, including those relating to access and security, are conveyed to the service provider.
You and the information security team can advise on matters outlined in:
- Accountable outsourcing
- Using cloud computing services: implications for information and records management
- Storage of State records with service providers outside of NSW
They should also work collaboratively on refining and implementing:
- the organisation’s Information Security Management System (ISMS)
- initiatives offered and recommended by Cyber Security NSW
- strategies offered and recommended by the Australian Cyber Security Centre.
Applying metadata
Adequate metadata is essential to effectively manage, secure and retrieve records, information and data. Without robust metadata, records and information are at risk.
Metadata itself is a record and should be:
- appropriately managed
- protected from loss, alteration or unauthorised deletion
- retained or destroyed in accordance with appraisal requirements
- perpetually linked to the records it relates to.
To strengthen the security and authenticity of metadata, you must liaise with the organisation’s information security teams to:
- control access to metadata using authorised permission controls
- identify and include minimum metadata requirements during planning, procurement and migration
- assess the currency of metadata amid changes to recordkeeping standards and to technology.
More information: Principles for implementing metadata for records and information
Storing and disposing of records, information and data
Storage
All public offices are required, under Section 11 of the State Records Act 1998, to ensure the safe custody and proper preservation of State records in their care. This obligation applies to all records, regardless of their format.
Working closely with the organisation’s information security teams is paramount to achieving this goal.
Together, you can ensure that:
When storing physical records, information and data |
|
When storing digital records, information and data |
|
Disposal
Secure disposal of records, information and data ensures that confidential information is not shared, made public or sold to third parties.
When consulting with the organisation’s information security teams, you must direct planning and implementation around:
- systematic and accountable destruction of records
- sentencing of records according to current and authorised retention and disposal authorities
- transferring of records required as State archives to the State Archives Collection
- provision of approval by a senior responsible officer (SRO) for the destruction and/or transfer of records.
More information:Records retention and disposal authorities
Achieving information and cyber security outcomes
Records and information management team can assist by:
- contributing their knowledge on the high-risk business areas of the organisation to the relevant team/staff (for example, IT, information security, risk, and governance)
- providing information on the organisation's vital or business critical, high risk and high value records and information to the relevant team/staff
- advising on issues relating to using cloud services for security classified records and information, or sensitive records that require additional controls
- establishing and managing disposal programs to ensure that records and information are destroyed according to relevant retention and disposal authorities.
Implement training
As a recordkeeping professional, you are required to work closely with staff to increase their awareness of risks and threats, and to help equip them with the tools necessary to responsibly conduct their work.
Ensuring that all staff, including contractors, are trained, updated and fully aware of their responsibilities will influence organisational culture and contribute to the implementation of good information security behaviours.
These behaviours can be applied or reinforced in collaboration with information security teams via:
- induction and education/training programs (including cyber security awareness training)
- business rules and procedures for the classification, handling and destruction of records, information and data
- official communications (including emails, newsletters or team meetings)
- awareness campaigns
- participation in whole-of-government/NSW Government initiatives and forums.
All training initiatives should be established in line with the organisation’s information security policy.
Business continuity management
From targeted cyber-attacks to raging floods and fires, business continuity management is imperative to:
- counteract interruptions to business activities
- protect critical business processes from the effects of information system failures and outages
- protect or salvage records, information and data from incidental disclosure
- protect or salvage records, information and data from loss or damage.
It is crucial that you work closely with the organisation’s information security teams to:
- keep disaster management plans and procedures current, accessible and familiar to all staff
- assign responsibilities to staff in the event or aftermath of a disaster
- conduct periodic disaster response training
- integrate cyber security requirements with the organisation’s business continuity arrangements.
More information: Disaster management overview
Monitor compliance
Continuous monitoring of records, recordkeeping and records and information management may assist the organisation’s information security teams in proactively identifying and responding to security threats and vulnerabilities.
Monitoring may include:
- regular review of the organisation’s recordkeeping systems and security controls
- evaluating information from security incidents
- undertaking a compliance audit using internal or external auditors
- staying informed on developments in technology and the organisation’s digital landscape
- investigating changes or breaches to relevant legislation or regulations
- checking against security requirements for metadata.
More information: Monitoring recordkeeping performance guidelines