New Zealand's Cyber Security Strategy

This document from 2019 is representative of New Zealand's current strategy to maintain its cyber security. It is a useful case study from the Info-Pacific that is applicable to cybersecurity efforts everywhere. Full tex and graphicst: https://dpmc.govt.nz/sites/default/files/2019-07/Cyber%20Security%20Strategy.pdf


Challenges to maintaining cyber security "Cyber-enabled threats to our security continue to grow in number, scope and scale. Cyber criminals and malicious state-backed actors are targeting New Zealand now. Access is being sought to our personal information, bank accounts, intellectual property and nationally important data on a 24/7 basis. From home-users to businesses, to government to critical national infrastructure, everyone using the internet faces a constant and evolving threat. Potential harms include financial losses, reputational damage, loss of intellectual property and disruption to critical services. Constant vigilance and active protection of our sensitive data and networks is no longer optional. We also need to be ready to detect, respond to, and recover from any intrusions.

Technology is evolving quickly... The nature and consequences of cyber incidents can vary widely, and, as new technologies are developed and adopted, new threats will emerge. Responding to these threats in the context of rapid technological change will require us to adapt quickly. The exponential increase in the use of IoT (Internet of Things) devices is an example of how the rush to deploy new products and services has led to the re-emergence of security issues that had been largely addressed in mature technology sectors. In October 2016, millions of IoT devices were taken over to form the Mirai botnet, which was used to launch a massive denial of service attack that disrupted the internet for almost the entire eastern United States. Cyber security is a complex problem – it’s about people, policies, technology, trust and reliability. It is not always possible to predict what will happen and at what pace.


The emergence of AI is an example of a technological shift where the impact for cyber security is largely unknown. The potential national security issues posed by the adoption of 5G technology present new and different risks from that of previous generations of mobile infrastructure. Cyber attacks can also have unintended consequences: the NotPetya malware* initially only targeted Ukrainian entities but ended up spreading to cause damage and disruption across the globe.

...And threat actors are on the increase and becoming more sophisticated... The number of malicious actors seeking to do harm on the internet also continues to rise. Threat actors of all kinds are increasingly bold, brazen and disruptive. As more people use and do business on the internet, the pay-offs from cyber and cyber-enabled crimes will also increase, attracting greater numbers of cybercriminals. Almost every cyber attack is a criminal act, regardless of who is behind it. Cyber criminals and other threat actors are becoming more sophisticated. More and more, threat actors from individuals to nation states have access to the same tools and techniques. In 2017, the WannaCry outbreak caused major international disruption, including shutting down computers in the United Kingdom’s National Health Service. WannaCry was attributed to North Korean actors by a number of New Zealand’s international partners, highlighting how nation states can use cybercriminal tools, and vice versa.


Cyber risks are growing in an increasingly contested international order. In the context of growing great power competition and increasing challenges to the international rules-based order, state-sponsored actors are using cyber tools for geopolitical advantage. The number of state-sponsored cyber operations is rising and more governments are openly developing offensive cyber capabilities. Cyber tools have been used by state-sponsored actors to steal sensitive commercial information, to disrupt critical systems and to interfere with democratic processes.


...


This strategy sets out five priority areas for action to deliver the vision. To deepen collaboration and to take effective collective action in each of these areas, we will work in a way that:

  • builds and maintains trust

  • is people-centric, respectful, and inclusive

  • balances risk with being agile and adaptive

  • uses our collective strengths to deliver better results and outcomes

  • is open and accountable.

These principles are a practical way of giving effect to the values that underpin the strategy and to get more effective results. These principles acknowledge that cyber security is not a ‘problem’ the government can fix, it is everybody’s responsibility and means we need to work together in different ways to get better results. These principles were designed using feedback from the engagement as the strategy developed."


Join the discussion on the points brought up in this strategy here: https://www.biedsociety.com/forum/indo-pacific-and-east-asia/asia-pacific-affairs

Recent Posts

See All