TitleDescription
GCSB Compliance Review: Final Report [PDF, 66 KB] GCSB Compliance Review – Final Report by Ian Fletcher, Director GCSB
GCSB Compliance Review: Progress Report 1 [PDF, 276 KB] This is the first report on the GCSB activities and change programme since the Compliance Review conducted by Rebecca Kitteridge was released on 9 April 2013.
GCSB Compliance Review: Progress Report 2 [PDF, 137 KB] This is the second report on the GCSB activities and change programme since the Compliance Review conducted by Rebecca Kitteridge was released on 9 April 2013.
GCSB Compliance Review: Progress Report 3 [PDF, 221 KB] This is the third report on the GCSB activities and change programme since the Compliance Review conducted by Rebecca Kitteridge was released on 9 April 2013.
GCSB Compliance Review: Progress Report 4 [PDF, 141 KB] This is the fourth report on the GCSB activities and change programme since the Compliance Review conducted by Rebecca Kitteridge was released on 9 April 2013.
GCSB Compliance Review: Progress Report 5 [PDF, 202 KB] This is the fifth report on the GCSB activities and change programme since the Compliance Review conducted by Rebecca Kitteridge was released on 9 April 2013.
GCSB Nationality Policy [PDF, 2.7 MB] This policy statement outlines the way in which GCSB ensures compliance with its obligations under sections 14 and 16 (1A) (B) of the GCSB Act 2003.
NCSC Voluntary Cyber Security Standards [PDF, 1002 KB] The NCSC in partnership with the New Zealand CSSIE group has developed the NCSC Voluntary Cyber Security Standards for Industrial Control Systems to recognise and address cyber security risks associated with the operation of ICS technologies.
New Zealand Information Security Manual (NZISM) The NZISM is the New Zealand Government’s manual on information assurance and information systems security.
New Zealand’s Cyber Security Strategy (external link) New Zealand's Cyber Security Strategy is the Government's response to the growing cyber threat. 
Policy Procedure 1007: Responding to Information Requests [PDF, 367 KB] This procedure outlines the process and considerations that must be met in responding to information requests under the provisions of the Official Information Act 1982 and the Privacy Act 1993.
Policy Statement PS-216CSB: Incidental Intelligence [PDF, 168 KB] The purpose of this policy is to set out how GCSB will identify, retain and communicate such material, described in the GCSB Act 2003 as “incidental intelligence”.
PS-131: Personal Information Policy for Information Collected for Operational Purposes [PDF, 6.7 MB] This policy addresses GCSB’s obligations to protect personal information as required under the GCSB Act 2003 (in particular, sections 25A and 25B) and the Privacy Act 1993 (in particular, sections 6, 27-29, 57 and 81).
Review of Compliance at GCSB [PDF, 923 KB] Review of Compliance conducted by Rebecca Kitteridge
Security in the Government Sector [PDF, 663 KB] This manual replaces “Security in Government Departments” issued in 1994, and incorporates the revised security classification system approved by Cabinet on 18 December 2000.
Strategies to Mitigate Targeted Cyber Intrusions (Australian Government) (external link) The Top 4 Strategies to Mitigate Targeted Cyber Intrusions are mandatory for Australian Government agencies as of April 2013
Wall chart: Guidelines for Protection of Official Information [PDF, 559 KB]