Virtus Group logo

Virtus Group - Security Overview (NZISM)

Version: v1.2 • Classification: Public Owner: Virtus Group Ltd
Audience: Clients, Reviewers & Operations • Next Review: 2027-02-23

Executive Summary

This document describes Virtus Group’s standard for this area and how it is applied in practice. It is derived from our internal policies and standards and is intended for both reviewers and operations.

Scope & Assumptions

Control Summary & Source References

DomainPracticesPrimary Sources
Governance & PolicyISMS-light approach; policies approved; annual review; risk mgmt integrated.Information Security Policy; Governance Policy; Risk Policy
Identity & AccessMFA for admins; RBAC; PAM; JML lifecycle; quarterly access reviews.IAM Standard
Endpoint & DeviceEDR; encryption; baseline hardening; monthly patch cycle; compliance ≥95%.End User Device Mgmt; Encryption Standard; Patch/Ops
NetworkSegmentation; secure configs; config backup; change control; Wi‑Fi WPA3/802.1X.Network Security Standard; Ops Runbook
Data ProtectionEncryption at rest/in transit; retention schedules; secure disposal.Encryption Standard; Doc & Record Control
Vulnerability MgmtMonthly authenticated scans; risk-based SLAs; exception handling.Cybersecurity Ops; Assurance Procedure
Backup & DRImmutable options; restore drills; RPO/RTO by tier; annual tests.BCM Standard; BCP; Backup Standard
PrivacyPrivacy policy; DPIA; breach response; processor due diligence.Privacy Policy; Privacy Pack; Vendor Mgmt
Incident ResponseSeverity matrix; RACI; evidence handling; tabletop schedule.Cybersecurity Ops; IR Plan
Physical & HRAccess control; visitor mgmt; HR onboarding & leavers; AUP.Physical Security; HR Security Standard; AUP
Key sources include: Information Security Policy (present), Governance Policy (present), IAM Standard (present), Network Security Standard (present), Encryption Standard (present), BCM/BCP (present), Privacy Policy (present), Cybersecurity Ops Standard (present), Assurance Procedure (present).

Requirements (Key Controls)

Procedures / Playbooks

Domain # of Controls (extract)
General195
BCDR69
Endpoint / MDM60
Asset Management48
Acceptable Use40
Collaboration / DLP39
Governance & Assurance37
Identity & Access36
Vendor Management36
Privacy & Breach24
SDLC / DevSecOps23
Encryption22
Physical Security22
Change Management20
Risk Management15
Network Security14
Incident Response13
Capacity Management10

Standards Mapping — NZISM ↔ PSR

This table maps our public artefacts to the PSR pillars and the most relevant NZISM chapters/sections.

DocumentPSR PillarsNZISM References
VirtusGroup_Security_Overview_NZISM_v1_2.htmlGovernance; Information Security; Personnel Security; Physical SecurityNZISM 3.9: ch.3 Roles & Responsibilities; ch.4 Certification & Accreditation; ch.5 System Security Plans; ch.7 Incidents; ch.16 Authentication & Access Controls
VirtusGroup_BCDR_Summary_v1_3.htmlInformation Security; GovernanceNZISM 6.4 Business Continuity & Disaster Recovery; 23.4.12 Cloud DR integration
VirtusGroup_Incident_Response_Plan_v1_3.htmlInformation Security; GovernanceNZISM ch.7 Information Security Incidents
VirtusGroup_Breach_Response_Procedure_v1_3.htmlInformation Security; GovernanceNZISM ch.7 Information Security Incidents; 5.4 System Security Plans (records)
VirtusGroup_MDM_Baseline_v1_2.htmlInformation SecurityNZISM ch.16 Authentication & Access Controls; ch.18.2 Wireless LANs
VirtusGroup_Cloud_Governance_Baseline_v1_2.htmlInformation Security; GovernanceNZISM 23.4 Data Protection in Public Cloud; 6.4 BCDR (RTO/RPO & backups)
VirtusGroup_Vulnerability_Management_Procedure_v1_2.htmlInformation Security; GovernanceNZISM ch.6 Risk & assurance context; ch.7 Incidents (detection/escalation linkages)
VirtusGroup_Runbook_Network_Ops_v1_2.htmlInformation Security; Physical SecurityNZISM ch.18 Network Security (incl. 18.2 WLAN)
VirtusGroup_Runbook_Infrastructure_Ops_v1_2.htmlInformation Security; GovernanceNZISM ch.16 Authentication & Access Controls; ch.6.4 BCDR (restore testing)
VirtusGroup_Runbook_EndUser_Support_v1_2.htmlInformation Security; Personnel SecurityNZISM ch.16 Authentication & Access Controls; ch.7 Incidents (reporting)
VirtusGroup_DPIA_Template_v1_2.htmlInformation Security; GovernanceNZISM ch.5 System Security Plans (records); ch.17 Cryptography (if using encryption)
VirtusGroup_DIA_MS_Evidence_Pack_v1.3.htmlInformation Security; GovernanceReferences a subset of the above artefacts and controls
VirtusGroup_DIA_CPS_Evidence_Pack_v1.3.htmlInformation Security; GovernanceReferences a subset of the above artefacts and controls

KPIs & Reporting

Evidence & Records

Records are maintained per the VGL Document & Record Control guidelines, including logs, approvals, test outputs, meeting minutes, and reports.

© Virtus Group Ltd — Final version.