Certification & Accreditation

We help organisations simplify the security certification and accreditation process with expert advice that actually fits your systems, goals, and timelines.
Talk to an expert
Uncover security risks

Ready to get your next system certified and accredited?

We make certification and accreditation smoother by focusing on clarity, accuracy and alignment with your agencies risk framework.
Discover our services

Your path to information security accreditation

Every system, every risk, every standard. Our certification and accreditation services help you identify, measure and manage your risk.
Continuous Certification
We support agencies and vendors in meeting NZISM continuous certification requirements, with regular reviews, updates, and assurance reporting.
Continuous Certification
Maintain NZISM certification over time
Controls Validation Audit
We independently assess implemented controls to confirm they’re operating as intended and provide assurance for certification or annual audits.
Controls Validation Audit
Validate that your controls are effective
Risk Assessment
We conduct structured risk assessments aligned to NZISM, supporting certification efforts by identifying threats, vulnerabilities, and effective risk treatments
Risk Assessment
Identify and assess risks to certification
System Security Plan
We develop or review System Security Plans (SSPs) aligned with NZISM, ensuring your system’s security posture is clearly defined and properly documented.
System Security Plan
Build a strong, certifiable security plan
Security Operations
Energy Sector
"Excellent customer engagement and a thorough understanding of our diverse requirements. Outstanding testing and communication throughout the testing phase."
Service detail

The details that make the difference

Behind every successful certification is smart preparation

Practical help at every stage

Certification & Accrediation

From risk assessments to ongoing certification reviews, we align to NZISM and other frameworks without adding friction.

  • Guidance on developing audit-ready documentation and SSPs
  • Long-term support for continuous certification and assurance reviews
  • Practical advice and audit-ready support
Our delivery process

Benefits

Setting Bastion information security accreditation apart

Partnering with Bastion for your certification and accreditation ensures expert guidance, tailored solutions and a strong foundation for lasting security.
Context comes first
We work with your specific systems, goals and requirements.
Technical and strategic expertise
Our consultants bring a unique mix of technical knowledge and certification experience, so nothing gets lost in translation.
Your long-term partner
Whether you’re preparing for your first information security accreditation or refining your ongoing strategy, we’re with you.
What comes next

Expand your
security coverage

Getting certified is just the start. We help you operationalise compliance, address feedback and strengthen your security long-term.

  • Pre-audit and post-audit advisory
  • Updates to support ongoing compliance
  • Integration with technical and risk services
Red Teaming
Red teaming simulates real attacks to test your systems, people, and physical security. Our red team penetration testing reveals how well your defences hold up.
Secure Development Training
We train developers and engineers to identify, avoid, and mitigate common security issues — making secure coding part of everyday practice.
Testimonials

Our customers

Look what our customers have to say
Security Operations
Energy Sector
"Excellent customer engagement and a thorough understanding of our diverse requirements. Outstanding testing and communication throughout the testing phase."
Cyber security news

Latest advisories

Stay ahead of emerging threats with our expert blog posts, research, and industry updates.
Silverstripe - Cross-Site Scripting (XSS) Vulnerability
A Cross-Site Scripting (XSS) vulnerability has been identified in the administrator panel of Silverstripe CMS, specifically in the handling of the user input within the form messages module.
Silverstripe - Host Header Injection
A Host header injection vulnerability in Silverstripe has been identified that allows an attacker to poison the password rese
Statamic CMS
Sam Schroder found a local file inclusion (write only) vulnerability inside of the upload functionality of Statamic CMS. This affects front end components like forms with `assets` fields.
Frequently asked questions

Frequently asked questions

From risk assessment to rapid response - we’re with you every step of the way.

Is Certification and Accreditation used outside of Government agencies?

Yes! Do you want to have a clear picture of the security of the systems and suppliers critical to your business? Do you need a consistent method to measure this and provide assurance to your board and key stakeholders? C&A might be for you, or a Security Risk Assessment Process as it's commonly called outside of Government, get in touch today about the right framework for you. We have experience in undertaking assessments and building security programmes aligned with international best practice frameworks including ISO 31000 Risk Management, ISO 27001 Information Security Management Systems, SOC 2, and ITIL.

Is Certification and Accreditation (C&A) mandatory?

New Zealand Government agencies and organisations. are expected to follow the NZISM and undertake C&A, while Crown entities, local government and private sector organisations are encouraged to use the NZISM. Whether it's mandatory for your organisation or not, as a process designed to provide confidence that technologies and suppliers are well-managed and that risks are properly identified and understood, it provides strong value to all forms of organisations.

Why is certification and accreditation important?

Because it gives you peace of mind. Certification and accreditation confirm that your systems are secure, meet required standards, and are officially approved to operate. Helping you avoid risks, protect your people and data, and stay ahead of compliance demands.

How long does the certification process take?

Timeframes vary depending on complexity, but most engagements span several weeks to a few months, including assessment, remediation, and approval.

Can you support us through the full lifecycle?

Absolutely. We offer full spectrum support, from initial assessment and remediation to ongoing compliance monitoring and renewals.

What is a risk assessment?

A risk assessment is a point-in-time assessment of your organisation and/or relevant systems. The process involves in-depth analysis and identification potential threats and vulnerabilities to your organisation and/or systems. The potential likelihood and impact of these risks are assessed, and tailored controls and recommendations are applied and provided to help remediate or mitigate them.

Should I get a risk assessment done?

A risk assessment is applicable to any individual, organisation, or entity that utilises and relies on digital systems, networks, and/or data. Risk assessments can apply to businesses of various sizes, financial institutions, healthcare providers, IT & Cybersecurity professionals, and even government agencies.

When do I get a risk assessment done?

A risk assessment can be initiated at anytime to gain a current understanding of potential risks. However, some key times to start a risk assessment are: Before launching a new system or website, after a security incident or breach, after major regulatory or compliance changes, after major IT infrastructure changes, and finally, risk assessments should be done on a regular basis (e.g., annually) to ensure ongoing compliance and keep up with an ever-evolving threat landscape.

How long does a risk assessment take?

The timeline of a risk assessment will vary depending on the nature of the assessment and the size of the assessment scope. A basic assessment only taking a few days, a standard one ranging from a week or two, to an in-depth one taking 3 weeks or more.

What is the outcome of a risk assessment?

A completed risk assessment will give you a clear understanding of the threats, vulnerabilities, and overall risks your organisation and/or systems face and how to mitigate and/or prevent them. The goal is to help prevent security breaches, ensure you’re compliant with laws and regulations, and prevent financial and reputational harm.

Contact us

Talk to an expert

Please call our office number during normal business hours or submit a form below
Where to find us
If you experience a security breach outside normal working hours, please complete the form and we will respond as soon as possible.