Sign up to receive an email when news and alerts are published to this website.
Subscribe-
September 2024 New Zealand Information Security Manual v3.8 Release
- Posted September 05, 2024
- NZISM Updates
The New Zealand Information Security Manual (NZISM) has released an update (v3.8), which includes updates to Chapters 11 and 15.
-
February 2024 New Zealand Information Security Manual v3.7 Release
- Posted February 28, 2024
- NZISM Updates
A new version of the New Zealand Information Security Manual (NZISM) has been released.
Read more -
September 2022 New Zealand Information Security Manual v3.6 Release
- Posted September 02, 2022
- NZISM Updates
Updates finalised for the v3.6 release of the NZISM include four policy changes and a small number of minor and editorial changes.
Read more -
January 2022 New Zealand Information Security Manual v3.5 Release
- Posted February 09, 2022
- NZISM Updates
The New Zealand Information Security Manual (NZISM) (external link) has released an update (v3.5), which includes updates to Chapter 2 – Information Security Services within Government, Chapter 3 – Roles & Responsibilities, Chapter 5 – Security Documentation, Chapter 13 – Media and IT Equipment Management, Decommissioning and Disposal and Chapter 17 – Cryptography: Chapter 2 – Information Security Services within Government Updated guidance for agencies using cloud services, including support for agencies producing cloud adoption strategies and recommendations on the adoption of cloud native security services and zero trust approaches.
Read more -
September 2020 New Zealand Information Security Manual v3.4 Release
- Posted September 30, 2020
- NZISM Updates
The New Zealand Information Security Manual (NZISM) (external link) has released an update (v3.4), which includes: Chapter 16 - Access Control and Passwords.
Read more -
February 2020 New Zealand Information Security Manual
- Posted February 13, 2020
- NZISM Updates
The New Zealand Information Security Manual (NZISM) (external link) has released an update which includes revisions of the chapter on information security incidents.
Read more