All articles
Compliance

Mapping NZISM Controls to Modern SaaS: A Pragmatic Guide

How to apply New Zealand Information Security Manual controls when most of your stack is Microsoft 365, Google Workspace, AWS, and a long tail of SaaS — without drowning in paperwork.

Haumaru Cloud Practice 18 February 2026 10 min read

The New Zealand Information Security Manual (NZISM) was written for a world of physical data centres and government-owned infrastructure. Most New Zealand organisations now run on a mesh of SaaS applications they do not own and cloud services they only partially configure. The good news is that the NZISM is more adaptable than its 600-plus pages suggest. The trick is to translate its control language into the actual settings you can toggle in Microsoft 365, Google Workspace, AWS, Azure and a growing list of niche SaaS tools.

Start with classification, not controls

Every NZISM conversation should start with information classification. Most of the manual's prescriptive controls only apply at RESTRICTED and above. If your organisation legitimately handles only IN-CONFIDENCE or unclassified-but-sensitive information — which is true of most private-sector firms voluntarily adopting NZISM — you have substantially more flexibility on cloud usage, region selection, and cryptographic algorithms. Document your classification scheme first; it will halve the size of your compliance burden.

Identity is the new perimeter

The single highest-leverage NZISM-aligned control in a SaaS environment is identity. That means: a single identity provider (Entra ID or Google), phishing-resistant MFA enforced via Conditional Access or Context-Aware Access, no standing administrative access (use Privileged Identity Management or equivalent just-in-time elevation), and aggressive lifecycle automation so leavers lose access within hours, not weeks. Map these to NZISM sections on access control, authentication, and privileged user management; auditors recognise the pattern instantly.

Data residency: the question everyone asks first

NZISM does not mandate New Zealand data residency for most classifications. It does require that data sovereignty risks be assessed and that information at RESTRICTED and above receive specific treatment. In practice, Australian regions (Sydney, Melbourne) are widely accepted for NZ workloads where a New Zealand region does not exist. Microsoft's New Zealand North region and AWS's planned Auckland region are changing this calculus quickly — for many agencies, choosing an in-country region is now the path of least resistance, even when not strictly required.

Logging, monitoring, and the 'we have the logs but no one looks' trap

NZISM expects logs to be collected, retained, and reviewed. SaaS makes the first two easy and the third hard. Microsoft 365 Audit, Google Workspace Audit, AWS CloudTrail, Azure Activity Logs and a dozen SaaS audit feeds will happily pour into a SIEM. Whether anything happens when an alert fires is a different question. If you do not have a 24/7 capability — internal SOC, MSSP or MDR provider — you do not have monitoring; you have an expensive log archive. This is exactly the gap Haumaru's MDR service is designed to fill for New Zealand organisations.

Encryption: choose modern algorithms, document the key story

NZISM's cryptographic guidance updates regularly to track international standards. The current sensible defaults are AES-256 for data at rest, TLS 1.3 for data in transit, and for new systems, planning for post-quantum migration. The harder question for SaaS is key custody. Customer-managed keys (CMK) in AWS KMS or Azure Key Vault give you control without operational pain. Hold-your-own-key (HYOK) and external key management are powerful but operationally expensive — only justify them when classification genuinely demands it.

Third-party risk: the part that ages worst

Annual vendor questionnaires are a poor signal. Better practice: require vendors to provide SOC 2 Type II reports or ISO 27001 certificates with a current scope statement, subscribe to their trust portals (most major SaaS now have one), and review their security advisories as part of your vulnerability management cadence. NZISM-aligned organisations should also map which vendors process information at each classification level, and reassess whenever the vendor changes ownership or sub-processors.

Practical roadmap

If you are starting from scratch, sequence the work: classification scheme (two weeks), identity hardening with phishing-resistant MFA (one to two months), SaaS configuration baselines aligned to CIS benchmarks (one to two months), centralised logging into a monitored SIEM/MDR (two to three months), then formal NZISM gap assessment and treatment plan (ongoing). Done in this order, each step makes the next cheaper. Done in the wrong order, you build a paperwork mountain that doesn't reduce risk.

How we can help

Haumaru's cloud and governance practice runs NZISM gap assessments specifically tuned to New Zealand SaaS-heavy organisations, and we operate the monitoring layer ongoing. Contact us at contact@haumaru.ltd to scope a review.

Need help applying this in your environment?

Talk to a Haumaru security architect — no obligation, no sales pitch.

Book a posture review

Keep reading