:
Skip Navigation
Guide | Executive Summary

Achieve NZISM Compliance with Sonatype Solutions

Introduction

In today’s digital landscape, government agencies face increasing pressure to secure their data and systems while adhering to stringent standards. The New Zealand Information Security Manual (NZISM) provides a comprehensive framework to guide organisations in managing cybersecurity risks. It offers best practices for software security, data transfers, and secure software development, ensuring systems remain resilient to modern cyber threats.

This document outlines how Sonatype’s solutions — Sonatype Nexus Repository, Sonatype Lifecycle, Sonatype Repository Firewall, and Sonatype SBOM Manager — align with NZISM’s guidelines. Through automated governance, component management, and continuous monitoring, Sonatype helps organisations achieve compliance, enhance security, and build a robust software supply chain.

NZISM Regulatory Requirements

NZISM Section

NZISM Control Requirement

Control Description

Sonatype Capabilities

Standard Operating Environments (SOE)

14.1.3 - Characterisation

Baseline system configurations must be recorded to verify system integrity.

Nexus Repository stores software artifacts securely, ensuring consistent baselines and integrity.

Standard Operating Environments (SOE)

14.1.8.C.01

 

Agencies must develop hardened SOEs by disabling unused services and setting access controls.

Repository Firewall blocks unapproved components and enforces security policies for hardened environments.

Standard Operating Environments (SOE)

14.1.9.C.01

 

Continuous software patching is required to prevent degradation of SOE security.

Sonatype Lifecycle provides continuous monitoring and alerts to ensure up-to-date patching and vulnerability remediation.

Secure Software Development

14.4.4.C.01

 

Development, testing, and production environments must be separated with limited access.

Sonatype Nexus Repository creates isolated repositories for each environment to ensure proper segregation.

Secure Software Development

14.4.6.C.01

 

Code must be reviewed or tested for vulnerabilities before deployment.

Sonatype Lifecycle integrates with CI/ CD pipelines to provide continuous vulnerability scanning during development.

Data Transfers

20.1.6.C.01

 

Agencies must establish policies for secure data transfers and hold users accountable.

Sonatype Lifecycle and Sonatype Repository Firewall enforce secure transfer policies, tracking software components involved.

Data Transfers

20.1.10.C.01

 

Data must be scanned for malicious content before being imported.

Sonatype Repository Firewall ensures that all imported artifacts are scanned and verified for security risks.

Data Transfer Authorisation

20.1.8.C.01

 

Transfers to less secure systems must be approved by a trusted source.

Sonatype Lifecycle tracks workflows to ensure that only approved data transfers occur.

Data Transfer Authorisation

20.1.9.C.01

 

Trusted sources must assess and approve all data transfers.

Sonatype Nexus Repository maintains records of all data transfers and approvals for auditing purposes.

Monitoring Data Transfers

20.1.15.C.01

 

Protective marking checks must be used for data exports.

Sonatype SBOM Manager applies protective marks to track software components during transfers.

Monitoring Data Transfers

20.1.15.C.02

 

Agencies must conduct monthly audits of
data transfer logs.

Sonatype Lifecycle automates audit processes, providing detailed reports on transfer activities.

NZISM Section

Standard Operating Environments (SOE)

Standard Operating Environments (SOE)

Standard Operating Environments (SOE)

Secure Software Development

Secure Software Development

Data Transfers

Data Transfers

Data Transfer Authorisation

Data Transfer Authorisation

Monitoring Data Transfers

Monitoring Data Transfers

NZISM Control Requirement

14.1.3 - Characterisation

14.1.8.C.01

 

14.1.9.C.01

 

14.4.4.C.01

 

14.4.6.C.01

 

20.1.6.C.01

 

20.1.10.C.01

 

20.1.8.C.01

 

20.1.9.C.01

 

20.1.15.C.01

 

20.1.15.C.02

 

Control Description

Baseline system configurations must be recorded to verify system integrity.

Agencies must develop hardened SOEs by disabling unused services and setting access controls.

Continuous software patching is required to prevent degradation of SOE security.

Development, testing, and production environments must be separated with limited access.

Code must be reviewed or tested for vulnerabilities before deployment.

Agencies must establish policies for secure data transfers and hold users accountable.

Data must be scanned for malicious content before being imported.

Transfers to less secure systems must be approved by a trusted source.

Trusted sources must assess and approve all data transfers.

Protective marking checks must be used for data exports.

Agencies must conduct monthly audits of
data transfer logs.

Sonatype Capabilities

Nexus Repository stores software artifacts securely, ensuring consistent baselines and integrity.

Repository Firewall blocks unapproved components and enforces security policies for hardened environments.

Sonatype Lifecycle provides continuous monitoring and alerts to ensure up-to-date patching and vulnerability remediation.

Sonatype Nexus Repository creates isolated repositories for each environment to ensure proper segregation.

Sonatype Lifecycle integrates with CI/ CD pipelines to provide continuous vulnerability scanning during development.

Sonatype Lifecycle and Sonatype Repository Firewall enforce secure transfer policies, tracking software components involved.

Sonatype Repository Firewall ensures that all imported artifacts are scanned and verified for security risks.

Sonatype Lifecycle tracks workflows to ensure that only approved data transfers occur.

Sonatype Nexus Repository maintains records of all data transfers and approvals for auditing purposes.

Sonatype SBOM Manager applies protective marks to track software components during transfers.

Sonatype Lifecycle automates audit processes, providing detailed reports on transfer activities.

  • Standard Operating Environments (SOE) | 14.1.3 - Characterization

    Baseline system configurations must be recorded to verify system integrity

    Sonatype Capabilities: Nexus Repository stores software artifacts securely, ensuring consistent baselines and integrity.

  • Standard Operating Environments (SOE) | 14.1.8.C.01

    Agencies must develop hardened SOEs by disabling unused services and setting access controls.

    Sonatype Capabilities: Repository Firewall blocks unapproved components and enforces security policies for hardened environments.

  • Standard Operating Environments (SOE) | 14.1.9.C.01

    Continuous software patching is required to prevent degradation of SOE security.

    Sonatype Capabilities: Sonatype Lifecycle provides continuous monitoring and alerts to ensure up-to-date patching and vulnerability remediation.

  • Secure Software Development | 14.4.4.C.01

    Development, testing, and production environments must be separated with limited access.

    Sonatype Capabilities: Sonatype Nexus Repository creates isolated repositories for each environment to ensure proper segregation.

  • Secure Software Development | 14.4.6.C.01

    Code must be reviewed or tested for vulnerabilities before deployment.

    Sonatype Capabilities: Sonatype Lifecycle integrates with CI/ CD pipelines to provide continuous vulnerability scanning during development.

  • Data Transfers | 20.1.6.C.01

    Agencies must establish policies for secure data transfers and hold users accountable.

    Sonatype Capabilities: Sonatype Lifecycle and Sonatype Repository Firewall enforce secure transfer policies, tracking software components involved.

  • Data Transfers | 20.1.10.C.01

    Data must be scanned for malicious content before being imported.

    Sonatype Capabilities: Sonatype Repository Firewall ensures that all imported artifacts are scanned and verified for security risks.

  • Data Transfer Authorisation | 20.1.8.C.01

    Transfers to less secure systems must be approved by a trusted source.

    Sonatype Capabilities: Sonatype Lifecycle tracks workflows to ensure that only approved data transfers occur.

  • Data Transfer Authorisation | 20.1.9.C.01

    Trusted sources must assess and approve all data transfers.

    Sonatype Capabilities: Sonatype Nexus Repository maintains records of all data transfers and approvals for auditing purposes.

  • Monitoring Data Transfers | 20.1.15.C.01

    Protective marking checks must be used for data exports.

    Sonatype Capabilities: Sonatype SBOM Manager applies protective marks to track software components during transfers.

  • Monitoring Data Transfers | 20.1.15.C.02

    Agencies must conduct monthly audits of data transfer logs.

    Sonatype Capabilities: Sonatype Lifecycle automates audit processes, providing detailed reports on transfer activities.

Conclusion

The NZISM outlines essential measures for securing data and software environments. Compliance with these guidelines ensures that government agencies can protect their systems against evolving threats. Sonatype’s platform provides the tools needed to meet these requirements, from component management and continuous monitoring to secure data transfers and application controls.

With Sonatype Nexus Repository, Sonatype Lifecycle, Sonatype Repository Firewall, and Sonatype SBOM Manager, Sonatype delivers a complete solution to automate governance, manage artifacts, and enforce security policies. By aligning with NZISM controls, Sonatype helps organisations build a secure software supply chain and maintain compliance with New Zealand’s cybersecurity framework.

Our team is here to help you achieve compliance, strengthen your cybersecurity posture, and safeguard your systems. For further assistance with Sonatype’s solutions and to discuss your organisation’s specific requirements, visit sonatype.com/contactus.