Security

NCSC Minimum Cyber Security Standards: What NZ SMBs Need to Know

Mark Gillette
21 November 2025
9 min read

New Zealand's government cyber security standards set the baseline for protecting critical systems. While aimed at public sector agencies, these 10 standards provide a practical roadmap for any NZ business serious about security. Here's what they mean for SMBs.

Your business partner asks if you're compliant with NCSC standards. Your insurance company wants to know your security maturity level. A potential client requests evidence of your security controls before signing a contract.

You're not a government agency, so NCSC requirements don't technically apply to you. But increasingly, NZ businesses are being asked to demonstrate baseline security regardless of sector. Clients want assurance. Insurance companies want evidence. Partners want confidence.

The National Cyber Security Centre's Minimum Cyber Security Standards weren't written for SMBs. They're aimed at government agencies. But the 10 standards they've defined represent the baseline that any New Zealand organisation handling important data should meet. Here's what they cover and how to implement them without government-scale resources.

Why These Standards Matter for SMBs

The NCSC developed these standards based on actual incidents that have occurred and the most likely attack vectors. They're not theoretical. They're the security controls that would have prevented real breaches affecting New Zealand organisations.

While government agencies must implement these by October 2025, smart SMBs are using them as a practical roadmap. They provide clear, actionable requirements instead of vague "improve your security" advice. They align with international frameworks but are specifically designed for the NZ threat environment.

They're becoming the baseline that clients, insurers, and partners expect. When someone asks about your security, being able to say "we meet NCSC minimum standards" carries weight.

The 10 Minimum Standards

The standards align with the NCSC Cyber Security Framework's five functions: Identify, Protect, Detect, Respond, and Recover. Here's what each standard requires and how SMBs can implement them:

1. Risk Management

What it requires: Identify and assess cyber security risks. Understand what could go wrong and how likely it is.

For SMBs: Document your critical systems and data. Ask "what happens if this is compromised, unavailable, or leaked?" Prioritise based on business impact, not technical complexity. A simple risk register in a spreadsheet is better than nothing.

2. Security Awareness

What it requires: Staff understand cyber security risks and their role in managing them.

For SMBs: Regular (at least annual) security training covering phishing, password security, and data handling. Make it relevant to your business. Real examples of attacks affecting NZ companies resonate more than generic corporate videos. Test understanding through simulated phishing campaigns.

3. Assets and Their Importance

What it requires: Know what hardware, software, and data you have. Understand what's business-critical.

For SMBs: Maintain an inventory of devices, applications, and where data is stored. Tag what's business-critical vs nice-to-have. If you can't list your assets, you can't protect them. This feeds directly into risk management and incident response.

4. Secure Configuration of Software

What it requires: Software is configured securely before deployment. Default settings are rarely secure settings.

For SMBs: Disable unnecessary features and services. Remove default accounts. Use security baselines like CIS Benchmarks where available. For cloud services (Microsoft 365, Google Workspace), follow vendor security best practices rather than default setup wizards.

5. Patching

What it requires: Security updates are applied promptly to software and systems.

For SMBs: Enable automatic updates where possible (Windows, macOS, browsers, common applications). For business-critical systems that can't auto-update, establish a monthly patching cycle. Critical security patches should be deployed within 14 days. Unpatched software is the easiest way attackers get in.

6. Multi-Factor Authentication (MFA)

What it requires: MFA is enabled for all accounts, especially those with administrative access or accessing business-critical systems.

For SMBs: Enable MFA on everything that supports it. Start with Microsoft 365/Google Workspace, accounting software, banking, and administrative access. Use authenticator apps (Microsoft Authenticator, Google Authenticator) rather than SMS where possible. Passwords alone are no longer sufficient.

7. Detect Unusual Behaviour

What it requires: Monitoring systems to detect potential security incidents. Know when something abnormal is happening.

For SMBs: Enable logging on critical systems. Use built-in security monitoring in Microsoft 365 (Defender) or Google Workspace. Set up alerts for suspicious activity: failed login attempts, unusual data access, new admin accounts. You don't need a 24/7 SOC, but you need visibility.

8. Least Privilege

What it requires: Users and systems have only the minimum access needed to perform their role.

For SMBs: Don't make everyone an admin. Create role-based access groups. Remove access when staff change roles or leave. Review admin accounts quarterly. Most breaches exploit excessive permissions. Default to no access, grant what's needed, revoke when it's not.

9. Data Recovery

What it requires: Regular backups of critical data that can be restored when needed.

For SMBs: Automated daily backups of business-critical data. Test restoration at least quarterly. Follow the 3-2-1 rule: 3 copies, 2 different media types, 1 off-site. Ensure backups are protected from ransomware (offline or immutable). Backups you've never tested are backups that might not work.

10. Response Planning

What it requires: A documented plan for responding to cyber security incidents. Know what to do when something goes wrong.

For SMBs: Document who does what during an incident. Include contact details for key staff, IT providers, cyber insurance, and CERT NZ. Define what constitutes an incident. Run a tabletop exercise annually. The plan doesn't need to be complex, but it needs to exist and be accessible when systems are down.

The Maturity Model Approach

The NCSC standards use a maturity model with four levels. The minimum expectation is Level 2: "Planned & Tracked."

Level 1 - Ad hoc: Security happens inconsistently, usually in response to incidents.

Level 2 - Planned & Tracked: Security controls are documented and consistently applied. This is the baseline.

Level 3 - Well Defined: Security processes are standardised across the organisation and regularly reviewed.

Level 4 - Quantitatively Controlled: Security performance is measured and continuously improved.

For most SMBs, achieving Level 2 across all 10 standards is realistic and provides meaningful security improvement. Level 3 and 4 are aspirational for larger organisations with dedicated security teams.

Scope: What These Standards Apply To

The standards apply to business-critical and externally facing systems:

Business-critical: Systems and applications that must function for normal business operations. If it goes down and your business stops, it's business-critical. This includes email, accounting software, customer databases, file servers, and line-of-business applications.

Externally facing: Systems accessible from outside your organisation or connected to business-critical systems. Websites, remote access portals, cloud applications, and anything with internet connectivity.

For SMBs, this often means: your Microsoft 365 or Google Workspace environment, accounting software (Xero, MYOB), CRM systems, file storage (OneDrive, Dropbox), and any customer-facing applications or websites.

Making It Practical for SMBs

Government agencies have compliance mandates, dedicated security teams, and reporting requirements. SMBs have constrained budgets, limited IT staff, and competing priorities.

Practical approaches:

Start with what's already in place. You're probably already doing parts of these standards. Document what you have before assuming you need to build everything from scratch. MFA might already be enabled. Backups might already run nightly. Start with an honest assessment.

Prioritise by risk, not by standard number. Standard 6 (MFA) and Standard 9 (Data Recovery) deliver immediate risk reduction. Standard 7 (Detect Unusual Behaviour) is valuable but requires more setup. Focus on high-impact, achievable improvements first.

Use what's already included. Microsoft 365 E3/E5 and Google Workspace Enterprise include security features that address multiple standards. You've already paid for them. Enable security defaults, configure alerts, use the built-in monitoring. Don't buy third-party tools until you've exhausted what's included.

Document as you go. The standards require evidence of implementation. Document your configurations, policies, and procedures as you implement them. Screenshots of settings, process documents, risk registers—create these during implementation, not as an afterthought for an audit.

Accept "good enough" for now. Level 2 maturity (Planned & Tracked) is the baseline. You don't need perfect. You need consistent, documented, and improving. Aim for Level 2 across all standards before pursuing Level 3 on any single standard.

Why Bother?

These standards require time and sometimes money to implement. Why it's worth it:

Client requirements: Tender processes increasingly require evidence of security controls. Professional services firms, contractors, and suppliers are being asked to demonstrate security maturity. Meeting NCSC standards provides clear evidence.

Cyber insurance: Insurance companies are tightening requirements. MFA, backups, and incident response plans are now common prerequisites for coverage. Some insurers explicitly reference government security frameworks when assessing risk.

Regulatory alignment: While not legally mandated for private sector SMBs, these standards align with Privacy Act obligations around protecting personal information. If you're handling customer or employee data, many of these controls are already implied by privacy requirements.

Risk reduction: These standards were developed based on actual incidents. Implementing them reduces your risk of successful attacks. Patching, MFA, and backups prevent or mitigate most common attacks.

Competitive advantage: Demonstrating security maturity helps when clients are evaluating suppliers. "We meet NCSC minimum standards" is more credible than "we take security seriously."

Getting Started

Pick three standards to implement first. We recommend:

Standard 6 - Multi-Factor Authentication: Highest impact, relatively easy to implement. Enable it everywhere this week.

Standard 9 - Data Recovery: Critical for business continuity. Verify your backups work, implement if they don't exist.

Standard 10 - Response Planning: Document what you'd do during an incident. Doesn't require technology, just clarity.

Then build out from there based on your risk assessment and current maturity level.

Resources and Support

The NCSC provides detailed guidance on each standard, including suggested actions, measurable outcomes, and alignment with the New Zealand Information Security Manual (NZISM). These resources are available to all organisations, not just government agencies.

At magnumit, we help NZ businesses implement these standards. We assess where you are now, prioritise improvements based on your specific risks, and implement controls that fit SMB budgets and resources. We work with organisations that want better security without government-scale overhead.

The Minimum Cyber Security Standards provide a practical roadmap. They're not theory—they're the baseline that prevents real attacks. For SMBs serious about security, they're worth implementing regardless of whether you're technically required to.

If you're evaluating your security or need help implementing these standards, let's talk. We specialise in practical security for New Zealand businesses without dedicated security teams.

Topics

NCSC standards cyber security NZ risk management MFA patch management incident response security baseline
Mark Gillette

Mark Gillette

Founder & Principal Consultant, magnumit

Mark has been designing and deploying Apple-focused IT infrastructure for New Zealand schools and businesses since 2003. Apple Certified Solutions Architect with expertise in Apple device management, networking, security, and Linux systems.

Need help with your IT infrastructure?

Book a free 30-minute strategy call to discuss your Apple, Linux, and security needs.